NAME | SYNOPSIS | DESCRIPTION | RETURN VALUE | AUTHOR | SEE ALSO | COLOPHON

security_disable(3)       SELinux API documentation      security_disable(3)

NAME         top

       security_disable - disable the SELinux kernel code at runtime

SYNOPSIS         top

       #include <selinux/selinux.h>

       int security_disable(void);

DESCRIPTION         top

       security_disable() disables the SELinux kernel code, unregisters
       selinuxfs from /proc/filesystems, and then unmounts /sys/fs/selinux.

       This function can only be called at runtime and prior to the initial
       policy load. After the initial policy load, the SELinux kernel code
       cannot be disabled, but only placed in "permissive" mode by using
       security_setenforce(3).

RETURN VALUE         top

       security_disable() returns zero on success or -1 on error.

AUTHOR         top

       This manual page has been written by Guido Trentalancia
       <guido@trentalancia.com>

SEE ALSO         top

       selinux(8), setenforce (8)

COLOPHON         top

       This page is part of the selinux (Security-Enhanced Linux user-space
       libraries and tools) project.  Information about the project can be
       found at ⟨https://github.com/SELinuxProject/selinux/wiki⟩.  If you
       have a bug report for this manual page, see 
       ⟨https://github.com/SELinuxProject/selinux/wiki/Contributing⟩.  This
       page was obtained from the project's upstream Git repository 
       ⟨https://github.com/SELinuxProject/selinux⟩ on 2017-04-25.  If you
       discover any rendering problems in this HTML version of the page, or
       you believe there is a better or more up-to-date source for the page,
       or you have corrections or improvements to the information in this
       COLOPHON (which is not part of the original manual page), send a mail
       to man-pages@man7.org

                                 21 Nov 2009             security_disable(3)

Pages that refer to this page: security_load_policy(3)