Skip to content

Commit 8962f81

Browse files
authored
Merge pull request #48548 from xenolinux/selinux
BZ1807524: Adds a warning about disabling SELiux
2 parents 5a6fa6f + 533063b commit 8962f81

File tree

2 files changed

+12
-22
lines changed

2 files changed

+12
-22
lines changed

modules/installation-special-config-kargs.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,12 @@ to add kernel arguments during cluster installation so they take effect before
1313
the systems first boot up:
1414

1515
* You want to disable a feature, such as SELinux, so it has no impact on the systems when they first come up.
16+
17+
[WARNING]
18+
====
19+
Disabling SELinux on {op-system} is not supported.
20+
====
21+
1622
* You need to do some low-level network configuration before the systems start.
1723

1824
To add kernel arguments to master or worker nodes, you can create a `MachineConfig` object

modules/nodes-nodes-kernel-arguments.adoc

Lines changed: 6 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,7 @@
77
[id="nodes-nodes-kernel-arguments_{context}"]
88
= Adding kernel arguments to nodes
99

10-
In some special cases, you might want to add kernel arguments
11-
to a set of nodes in your cluster.
12-
This should only be done with caution and clear understanding
13-
of the implications of the arguments you set.
10+
In some special cases, you might want to add kernel arguments to a set of nodes in your cluster. This should only be done with caution and clear understanding of the implications of the arguments you set.
1411

1512
[WARNING]
1613
====
@@ -19,30 +16,17 @@ Improper use of kernel arguments can result in your systems becoming unbootable.
1916

2017
Examples of kernel arguments you could set include:
2118

22-
* **enforcing=0**: Configures Security Enhanced Linux (SELinux) to run in permissive mode.
23-
In permissive mode, the system acts as if SELinux is enforcing the loaded security policy,
24-
including labeling objects and emitting access denial entries in the logs,
25-
but it does not actually deny any operations. While not recommended for production systems,
26-
permissive mode can be helpful for debugging.
19+
* **enforcing=0**: Configures Security Enhanced Linux (SELinux) to run in permissive mode. In permissive mode, the system acts as if SELinux is enforcing the loaded security policy, including labeling objects and emitting access denial entries in the logs, but it does not actually deny any operations. While not supported for production systems, permissive mode can be helpful for debugging.
2720
28-
* **nosmt**: Disables symmetric multithreading (SMT) in the kernel.
29-
Multithreading allows multiple logical threads for each CPU.
30-
You could consider `nosmt` in multi-tenant environments to reduce
31-
risks from potential cross-thread attacks. By disabling SMT, you essentially choose security over performance.
21+
* **nosmt**: Disables symmetric multithreading (SMT) in the kernel. Multithreading allows multiple logical threads for each CPU. You could consider `nosmt` in multi-tenant environments to reduce risks from potential cross-thread attacks. By disabling SMT, you essentially choose security over performance.
3222
33-
* **systemd.unified_cgroup_hierarchy**: Enables
34-
link:https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html[Linux control groups version 2] (cgroups v2).
35-
Cgroup v2 is the next version of the kernel
36-
link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/resource_management_guide/ch01[control groups]
37-
and offers multiple improvements.
23+
* **systemd.unified_cgroup_hierarchy**: Enables link:https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html[Linux control groups version 2] (cgroups v2). Cgroup v2 is the next version of the kernel link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/resource_management_guide/ch01[control groups] and offers multiple improvements.
3824
39-
See link:https://www.kernel.org/doc/Documentation/admin-guide/kernel-parameters.txt[Kernel.org kernel parameters]
40-
for a list and descriptions of kernel arguments.
25+
See link:https://www.kernel.org/doc/Documentation/admin-guide/kernel-parameters.txt[Kernel.org kernel parameters] for a list and descriptions of kernel arguments.
4126

4227
In the following procedure, you create a `MachineConfig` object that identifies:
4328

44-
* A set of machines to which you want to add the kernel argument.
45-
In this case, machines with a worker role.
29+
* A set of machines to which you want to add the kernel argument. In this case, machines with a worker role.
4630
* Kernel arguments that are appended to the end of the existing kernel arguments.
4731
* A label that indicates where in the list of machine configs the change is applied.
4832

0 commit comments

Comments
 (0)