It's easy. Check /etc/default/grub
1) check status of Selinux
[root@localhost ~]# sestatus
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: enforcing
Mode from config file: enforcing
Policy MLS status: enabled
Policy deny_unknown status: allowed
Memory protection checking: actual (secure)
Max kernel policy version: 33
[root@localhost ~]# cat /etc/default/grub
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR="$(sed 's, release .*$,,g' /etc/system-release)"
GRUB_DEFAULT=saved
GRUB_DISABLE_SUBMENU=true
GRUB_TERMINAL_OUTPUT="console"
GRUB_CMDLINE_LINUX="crashkernel=auto resume=/dev/mapper/cs-swap rd.lvm.lv=cs/root rd.lvm.lv=cs/swap rhgb quiet selinux=0"
GRUB_DISABLE_RECOVERY="true"
GRUB_ENABLE_BLSCFG=true
2) generating grub
[root@localhost ~]# grub2-mkconfig -o /boot/grub2/grub.cfg
Generating grub configuration file ...
done
3) reboot and pray
[root@localhost ~]# reboot
login as: root
root@127.0.0.2's password:
Last login: Wed Feb 2 21:40:32 2022 from 10.0.2.2
4) check sestatu after the reboot
[root@localhost ~]# sestatus
SELinux status: disabled
[root@localhost ~]# uptime
21:47:44 up 2 min, 1 user, load average: 0.16, 0.26, 0.11
[root@localhost ~]#
Žiadne komentáre:
Zverejnenie komentára