security_disable(3) — Linux manual page


security_disable(3)       SELinux API documentation      security_disable(3)

NAME         top

       security_disable - disable the SELinux kernel code at runtime

SYNOPSIS         top

       #include <selinux/selinux.h>

       int security_disable(void);

DESCRIPTION         top

       security_disable() disables the SELinux kernel code, unregisters
       selinuxfs from /proc/filesystems, and then unmounts /sys/fs/selinux.

       This function can only be called at runtime and prior to the initial
       policy load. After the initial policy load, the SELinux kernel code
       cannot be disabled, but only placed in "permissive" mode by using

RETURN VALUE         top

       security_disable() returns zero on success or -1 on error.

AUTHOR         top

       This manual page has been written by Guido Trentalancia

SEE ALSO         top

       selinux(8), setenforce (8)

COLOPHON         top

       This page is part of the selinux (Security-Enhanced Linux user-space
       libraries and tools) project.  Information about the project can be
       found at ⟨⟩.  If you
       have a bug report for this manual page, see
       ⟨⟩.  This
       page was obtained from the project's upstream Git repository
       ⟨⟩ on 2020-09-18.  (At that
       time, the date of the most recent commit that was found in the repos‐
       itory was 2020-09-17.)  If you discover any rendering problems in
       this HTML version of the page, or you believe there is a better or
       more up-to-date source for the page, or you have corrections or
       improvements to the information in this COLOPHON (which is not part
       of the original manual page), send a mail to

                                 21 Nov 2009             security_disable(3)

Pages that refer to this page: security_load_policy(3)security_mkload_policy(3)selinux_init_load_policy(3)selinux_mkload_policy(3)