| NAME | SYNOPSIS | DESCRIPTION | RETURN VALUE | AUTHOR | SEE ALSO | COLOPHON | |
|  | 
security_disable(3)     SELinux API documentation     security_disable(3)
       security_disable - disable the SELinux kernel code at runtime
       #include <selinux/selinux.h>
       int security_disable(void);
       security_disable() disables the SELinux kernel code, unregisters
       selinuxfs from /proc/filesystems, and then unmounts
       /sys/fs/selinux.
       This function is only supported on Linux 6.3 and earlier, and can
       only be called at runtime and prior to the initial policy load.
       After the initial policy load, the SELinux kernel code cannot be
       disabled, but only placed in "permissive" mode by using
       security_setenforce(3).
       security_disable() returns zero on success or -1 on error.
       This manual page has been written by Guido Trentalancia
       <guido@trentalancia.com>
       selinux(8), setenforce (8)
       This page is part of the selinux (Security-Enhanced Linux user-
       space libraries and tools) project.  Information about the project
       can be found at ⟨https://github.com/SELinuxProject/selinux/wiki⟩.
       If you have a bug report for this manual page, see
       ⟨https://github.com/SELinuxProject/selinux/wiki/Contributing⟩.
       This page was obtained from the project's upstream Git repository
       ⟨https://github.com/SELinuxProject/selinux⟩ on 2025-08-11.  (At
       that time, the date of the most recent commit that was found in
       the repository was 2025-08-04.)  If you discover any rendering
       problems in this HTML version of the page, or you believe there is
       a better or more up-to-date source for the page, or you have
       corrections or improvements to the information in this COLOPHON
       (which is not part of the original manual page), send a mail to
       man-pages@man7.org
                               21 Nov 2009            security_disable(3)
Pages that refer to this page: security_load_policy(3)