NAME |SYNOPSIS |DESCRIPTION |RETURN VALUE |AUTHOR |SEE ALSO |COLOPHON | |
security_disable(3) SELinux API documentationsecurity_disable(3)security_disable - disable the SELinux kernel code at runtime
#include <selinux/selinux.h>int security_disable(void);
security_disable() disables the SELinux kernel code, unregisters selinuxfs from/proc/filesystems, and then unmounts/sys/fs/selinux. This function is only supported on Linux 6.3 and earlier, and can only be called at runtime and prior to the initial policy load. After the initial policy load, the SELinux kernel code cannot be disabled, but only placed in "permissive" mode by usingsecurity_setenforce(3).
security_disable() returns zero on success or -1 on error.
This manual page has been written by Guido Trentalancia <guido@trentalancia.com>
selinux(8),setenforce(8)
This page is part of theselinux (Security-Enhanced Linux user- space libraries and tools) project. Information about the project can be found at ⟨https://github.com/SELinuxProject/selinux/wiki⟩. If you have a bug report for this manual page, see ⟨https://github.com/SELinuxProject/selinux/wiki/Contributing⟩. This page was obtained from the project's upstream Git repository ⟨https://github.com/SELinuxProject/selinux⟩ on 2025-08-11. (At that time, the date of the most recent commit that was found in the repository was 2025-08-04.) If you discover any rendering problems in this HTML version of the page, or you believe there is a better or more up-to-date source for the page, or you have corrections or improvements to the information in this COLOPHON (which isnot part of the original manual page), send a mail to man-pages@man7.org 21 Nov 2009security_disable(3)Pages that refer to this page:security_load_policy(3)
HTML rendering created 2025-09-06 byMichael Kerrisk, author ofThe Linux Programming Interface. For details of in-depthLinux/UNIX system programming training courses that I teach, lookhere. Hosting byjambit GmbH. | ![]() |