This chapter discusses troubleshooting and customizing your SELinux policy and
presents a methodology for writing policy. Specific cautions are discussed.
When troubleshooting, use the kernel boot parameter
selinux=0 as a last resort. If using
setenforce during runtime is not sufficient, try
booting with enforcing=0 to switch to permissive
mode. You still have SELinux checking enabled and avc:
denied messages logged to $AUDIT_LOG, but the enforcing
is disabled.
By troubleshooting with SELinux enabled, you can more easily identify and
resolve problems. For example, if SELinux is fully disabled, the
-Z option is not available for finding the security
context of objects. You are not able to relabel a file or the file
system with SELinux disabled. Finally, any new files or directories you
create have no SELinux security attributes, causing more problems when you
boot into SELinux.
Save selinux=0 and
SELINUX=disabled in
/etc/sysconfig/selinux/ for longer-term disabling.