Man page - security_disable(3)
Packages contas this manual
- security_compute_relabel(3)
- selinux_restorecon_get_skipped_errors(3)
- getpidprevcon(3)
- setexeccon_raw(3)
- security_get_boolean_active(3)
- security_disable(3)
- getfilecon(3)
- matchpathcon_init(3)
- avc_context_to_sid(3)
- selinux_path(3)
- avc_sid_to_context(3)
- security_load_policy(3)
- selinux_restorecon_set_alt_rootpath(3)
- selabel_lookup_best_match(3)
- selinux_file_context_homedir_path(3)
- selinux_getenforcemode(3)
- selinux_check_access(3)
- selinux_check_passwd_access(3)
- security_compute_av_raw(3)
- security_get_checkreqprot(3)
- selinux_status_policyload(3)
- security_av_perm_to_string(3)
- avc_add_callback(3)
- getexeccon(3)
- getpidprevcon_raw(3)
- matchpathcon_checkmatches(3)
- selabel_open(3)
- getpeercon(3)
- getfscreatecon_raw(3)
- selinux_mkload_policy(3)
- selinux_status_close(3)
- matchpathcon_index(3)
- avc_destroy(3)
- mode_to_security_class(3)
- security_get_boolean_names(3)
- security_class_to_string(3)
- selabel_close(3)
- security_deny_unknown(3)
- security_setenforce(3)
- setfilecon_raw(3)
- security_check_context(3)
- security_av_string(3)
- selinux_default_type_path(3)
- fini_selinuxmnt(3)
- getseuserbyname(3)
- getexeccon_raw(3)
- avc_compute_create(3)
- matchpathcon_fini(3)
- get_ordered_context_list(3)
- set_matchpathcon_flags(3)
- fgetfilecon_raw(3)
- avc_av_stats(3)
- context_type_get(3)
- fsetfilecon(3)
- fsetfilecon_raw(3)
- string_to_security_class(3)
- context_new(3)
- selinux_user_contexts_path(3)
- setcon(3)
- selinux_policy_root(3)
- freeconary(3)
- avc_netlink_close(3)
- selinux_media_context_path(3)
- selinux_failsafe_context_path(3)
- lsetfilecon_raw(3)
- avc_open(3)
- get_default_context_with_rolelevel(3)
- selinux_usersconf_path(3)
- avc_get_initial_sid(3)
- selabel_lookup(3)
- security_compute_av_flags_raw(3)
- selinux_restorecon_parallel(3)
- selinux_status_open(3)
- avc_entry_ref_init(3)
- manual_user_enter_context(3)
- getfscreatecon(3)
- context_role_get(3)
- selinux_binary_policy_path(3)
- security_compute_member_raw(3)
- fgetfilecon(3)
- selinux_securetty_types_path(3)
- security_set_boolean(3)
- selinux_file_context_verify(3)
- selinux_status_deny_unknown(3)
- context_free(3)
- selinux_check_securetty_context(3)
- avc_get_initial_context(3)
- avc_netlink_loop(3)
- getcon_raw(3)
- init_selinuxmnt(3)
- context_str(3)
- selabel_partial_match(3)
- selinux_default_context_path(3)
- setsockcreatecon(3)
- setfilecon(3)
- selinux_netfilter_context_path(3)
- get_default_context_with_role(3)
- selinux_init_load_policy(3)
- query_user_context(3)
- setfscreatecon_raw(3)
- get_ordered_context_list_with_level(3)
- getsockcreatecon_raw(3)
- is_context_customizable(3)
- getkeycreatecon(3)
- getprevcon(3)
- is_selinux_mls_enabled(3)
- set_matchpathcon_invalidcon(3)
- avc_compute_member(3)
- get_default_context(3)
- security_compute_user_raw(3)
- selinux_restorecon_set_sehandle(3)
- selabel_get_digests_all_partial_matches(3)
- selabel_digest(3)
- selinux_getpolicytype(3)
- security_getenforce(3)
- setkeycreatecon(3)
- selinux_set_callback(3)
- getcon(3)
- context_role_set(3)
- security_check_context_raw(3)
- context_type_set(3)
- selinux_restorecon_set_exclude_list(3)
- getfilecon_raw(3)
- lsetfilecon(3)
- print_access_vector(3)
- getpidcon(3)
- get_default_context_with_level(3)
- selinux_colors_path(3)
- sidput(3)
- security_validatetrans_raw(3)
- context_range_set(3)
- selinux_removable_context_path(3)
- setexeccon(3)
- matchmediacon(3)
- avc_audit(3)
- selinux_file_context_path(3)
- security_compute_create_name_raw(3)
- avc_has_perm_noaudit(3)
- lgetfilecon(3)
- string_to_av_perm(3)
- avc_netlink_release_fd(3)
- selinux_set_mapping(3)
- avc_sid_stats(3)
- security_mkload_policy(3)
- selinux_restorecon_default_handle(3)
- setcon_raw(3)
- avc_netlink_open(3)
- sidget(3)
- selabel_lookup_best_match_raw(3)
- selinux_restorecon_xattr(3)
- is_selinux_enabled(3)
- avc_netlink_check_nb(3)
- security_compute_av(3)
- security_get_initial_context_raw(3)
- selinux_x_context_path(3)
- context_user_get(3)
- selabel_stats(3)
- security_load_booleans(3)
- security_reject_unknown(3)
- security_compute_relabel_raw(3)
- security_commit_booleans(3)
- getprevcon_raw(3)
- setfscreatecon(3)
- getkeycreatecon_raw(3)
- avc_reset(3)
- context_range_get(3)
- getpidcon_raw(3)
- security_get_boolean_pending(3)
- freecon(3)
- avc_cleanup(3)
- selinux_homedir_context_path(3)
- selinux_boolean_sub(3)
- set_matchpathcon_printf(3)
- selinux_sepgsql_context_path(3)
- security_set_boolean_list(3)
- setsockcreatecon_raw(3)
- selinux_status_updated(3)
- avc_init(3)
- set_selinuxmnt(3)
- selinux_restorecon(3)
- rpm_execcon(3)
- selinux_contexts_path(3)
- setexecfilecon(3)
- getsockcreatecon(3)
- context_user_set(3)
- security_compute_create_name(3)
- selinux_lsetfilecon_default(3)
- selinux_file_context_local_path(3)
- selinux_raw_context_to_color(3)
- get_default_type(3)
- avc_has_perm(3)
- avc_netlink_acquire_fd(3)
- security_compute_user(3)
- matchpathcon(3)
- matchpathcon_filespec_destroy(3)
- avc_cache_stats(3)
- security_validatetrans(3)
- selinux_set_policy_root(3)
- matchpathcon_filespec_add(3)
- security_compute_member(3)
- selinux_file_context_cmp(3)
- security_compute_create(3)
- matchpathcon_filespec_eval(3)
- setkeycreatecon_raw(3)
- selinux_current_policy_path(3)
- getpeercon_raw(3)
- lgetfilecon_raw(3)
- security_policyvers(3)
- selinux_status_getenforce(3)
- security_get_initial_context(3)
- security_compute_create_raw(3)
- selabel_lookup_raw(3)
- security_compute_av_flags(3)
Package: libselinux1-dev
apt-get install libselinux1-dev
apt-get install libselinux1-dev
Manuals in package:
Documentations in package:
Manual
| security_disable(3) | SELinux API documentation | security_disable(3) |
NAME
security_disable - disable the SELinux kernel code at runtime
SYNOPSIS
#include <selinux/selinux.h>
int security_disable(void);
DESCRIPTION
security_disable() disables the SELinux kernel code, unregisters selinuxfs from /proc/filesystems, and then unmounts /sys/fs/selinux.
This function is only supported on Linux 6.3 and earlier, and can only be called at runtime and prior to the initial policy load. After the initial policy load, the SELinux kernel code cannot be disabled, but only placed in "permissive" mode by using security_setenforce(3).
RETURN VALUE
security_disable() returns zero on success or -1 on error.
AUTHOR
This manual page has been written by Guido Trentalancia <guido@trentalancia.com>
SEE ALSO
selinux(8), setenforce (8)
| 21 Nov 2009 |