Comprobar si está activado:

# getenforce 
Enforcing

Para deshabilitar:

# setenforce 0

o

# echo 0 > /selinux/enforce

Resultado:

Permissive

Si obtenemos un error raro, por ejemplo apache que no arranca con un módulo nuevo, lo podemos ver en el log messages.
Al final nos indica el comando a lanzar e instrucciones a seguir:

Nov 18 13:01:48 setroubleshoot: SELinux is preventing /usr/sbin/httpd from execute access on the file /opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1. For complete SELinux messages. run sealert -l b46cdfd9-3c2e-4440-9967-16811bbfe75f

Si ejecutamos el sealert:

# sealert -l b46cdfd9-3c2e-4440-9967-16811bbfe75f
SELinux is preventing /usr/sbin/httpd from execute access on the file /opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1.

*****  Plugin restorecon (94.8 confidence) suggests  *************************

If you want to fix the label. 
/opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1 default label should be lib_t.
Then you can run restorecon.
Do
# /sbin/restorecon -v /opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1

*****  Plugin catchall_labels (5.21 confidence) suggests  ********************

If you want to allow httpd to have execute access on the libgcc_s.so.1 file
Then you need to change the label on /opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1
Do
# semanage fcontext -a -t httpd_modules_t '/opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1'
where FILE_TYPE is one of the following: httpd_suexec_exec_t, application_exec_type, mailman_cgi_exec_t, dirsrvadmin_unconfined_script_exec_t, httpd_unconfined_script_exec_t, bin_t, lib_t, httpd_rotatelogs_exec_t, ld_so_t, abrt_helper_exec_t, httpd_exec_t, shell_exec_t, textrel_shlib_t, antivirus_exec_t, httpd_helper_exec_t, httpd_php_exec_t, chroot_exec_t, httpd_modules_t, httpd_munin_script_exec_t, httpd_w3c_validator_script_exec_t, httpd_user_script_exec_t, httpd_dspam_script_exec_t, httpd_collectd_script_exec_t, httpd_apcupsd_cgi_script_exec_t, httpd_squid_script_exec_t, httpd_awstats_script_exec_t, prelink_exec_t, preupgrade_exec_t, passenger_exec_t, httpd_nagios_script_exec_t, httpdcontent, httpd_prewikka_script_exec_t, httpd_bugzilla_script_exec_t, httpd_dirsrvadmin_script_exec_t, httpd_sys_script_exec_t, httpd_openshift_script_exec_t, httpd_nutups_cgi_script_exec_t, httpd_git_script_exec_t, httpd_cvs_script_exec_t, httpd_cobbler_script_exec_t, httpd_mediawiki_script_exec_t, httpd_smokeping_cgi_script_exec_t. 
Then execute: 
restorecon -v '/opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1'


*****  Plugin catchall (1.44 confidence) suggests  ***************************

If you believe that httpd should be allowed execute access on the libgcc_s.so.1 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep httpd /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Para ver el contexto de una biblioteca, que no librería, de apache:

# ls -Z /etc/httpd/modules/mod_alias.so 
-rwxr-xr-x. root root system_u:object_r:httpd_modules_t:s0 /etc/httpd/modules/mod_alias.so

Le ponemos el contexto: httpd_modules_t

/sbin/restorecon -v '/opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1'
semanage fcontext -a -t httpd_modules_t '/opt/oracle/webgate/access/oblix/lib/libgcc_s.so.1'