security_disable(3) SELinux API documentation security_disable(3)
security_disable - disable the SELinux kernel code at runtime
#include <selinux/selinux.h> int security_disable(void);
security_disable() disables the SELinux kernel code, unregisters selinuxfs from /proc/filesystems, and then unmounts /sys/fs/selinux. This function can only be called at runtime and prior to the initial policy load. After the initial policy load, the SELinux kernel code cannot be disabled, but only placed in "permissive" mode by using security_setenforce(3).
security_disable() returns zero on success or -1 on error.
This manual page has been written by Guido Trentalancia <email@example.com>
selinux(8), setenforce (8)
This page is part of the selinux (Security-Enhanced Linux user-space libraries and tools) project. Information about the project can be found at ⟨https://github.com/SELinuxProject/selinux/wiki⟩. If you have a bug report for this manual page, see ⟨https://github.com/SELinuxProject/selinux/wiki/Contributing⟩. This page was obtained from the project's upstream Git repository ⟨https://github.com/SELinuxProject/selinux⟩ on 2020-06-09. (At that time, the date of the most recent commit that was found in the repos‐ itory was 2020-06-04.) If you discover any rendering problems in this HTML version of the page, or you believe there is a better or more up-to-date source for the page, or you have corrections or improvements to the information in this COLOPHON (which is not part of the original manual page), send a mail to firstname.lastname@example.org 21 Nov 2009 security_disable(3)
Pages that refer to this page: security_load_policy(3), security_mkload_policy(3), selinux_init_load_policy(3), selinux_mkload_policy(3)