You are hereSwitch SELinux "Enforcing" mode to "Permissive" mode
Switch SELinux "Enforcing" mode to "Permissive" mode
Security-Enhanced Linux (SELinux) is a security architecture integrated into the 2.6.x kernel using the Linux Security Modules (LSM). It is a project of the United States National Security Agency (NSA) and the SELinux community. SELinux integration into Red Hat Enterprise Linux was a joint effort between the NSA and Red Hat.
error while loading shared libraries: $ORACLE_HOME/lib/libnnz11.so: cannot restore segment prot after reloc: Permission denied
# setenforceusage: setenforce [ Enforcing | Permissive | 1 | 0 ]setenforce 1 — SELinux runs in enforcing mode.setenforce 0 — SELinux runs in permissive mode.
# getenforceEnforcing# setenforce 0# getenforcePermissive# sestatus -vSELinux status: enabledSELinuxfs mount: /selinuxCurrent mode: permissiveMode from config file: enforcingPolicy version: 18Policy from config file:targeted..
SELINUX=enforcing|permissive|disabledenforcing — The SELinux security policy is enforced.
permissive — The SELinux system prints warnings but does not enforce policy.This is useful for debugging and troubleshooting purposes. In permissive mode, more denials are logged because subjects can continue with actions that would otherwise be denied in enforcing mode. For example, traversing a directory tree in permissive mode produces avc: denied messages for every directory level read. In enforcing mode, SELinux would have stopped the initial traversal and kept further denial messages from occurring.
disabled — SELinux is fully disabled. SELinux hooks are disengaged from the kernel and the pseudo-file system is unregistered.