Tag

SELinux

1 views collected around this technical thread.

IT Xianyu
IT Xianyu
Apr 27, 2025 · Operations

How to Migrate from CentOS 7 to AlmaLinux 8 and AlmaLinux 9: A Step‑by‑Step Guide

After CentOS 7 reaches end‑of‑life on June 30 2024, this guide explains why you must migrate, outlines three essential pre‑migration preparations, and provides detailed step‑by‑step commands to upgrade first to AlmaLinux 8 and then to AlmaLinux 9, including post‑migration checks and common pitfalls.

AlmaLinuxCentOSLeapp
0 likes · 8 min read
How to Migrate from CentOS 7 to AlmaLinux 8 and AlmaLinux 9: A Step‑by‑Step Guide
Raymond Ops
Raymond Ops
Apr 16, 2025 · Information Security

Boost Linux Server Security: Practical Hardening Steps for RHEL7

This guide walks through a comprehensive Linux hardening checklist for RHEL7, covering account locking, password policies, SSH port changes, SELinux activation, firewall tightening, and file attribute protections to elevate the system to a B1 security level.

HardeningLinuxRHEL7
0 likes · 12 min read
Boost Linux Server Security: Practical Hardening Steps for RHEL7
Linux Ops Smart Journey
Linux Ops Smart Journey
Nov 25, 2024 · Operations

Automate sysctl, SELinux, and Mount Configurations with Ansible

This guide shows how to use Ansible to automate Linux sysctl parameter tuning, manage SELinux policies, and configure filesystem mount points, providing step‑by‑step examples and code snippets that simplify operations and improve system stability and security.

AnsibleAutomationSELinux
0 likes · 7 min read
Automate sysctl, SELinux, and Mount Configurations with Ansible
DevOps Operations Practice
DevOps Operations Practice
Mar 6, 2024 · Information Security

Comprehensive Linux System Hardening Guide for Production Environments

This guide details practical Linux hardening steps—including disabling SELinux, trimming startup services, applying the principle of least privilege, configuring sudo, synchronizing time, adjusting file descriptor limits, locking critical files, disabling ping, optimizing SSH, changing hostnames, and preventing destructive rm commands—to improve security and stability in production deployments.

LinuxSELinuxSecurity
0 likes · 12 min read
Comprehensive Linux System Hardening Guide for Production Environments
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Feb 17, 2023 · Mobile Development

Optimizing Dynamically Loaded Dex Files Across Android Versions

The article explains how dynamically loaded dex files are optimized on Android 5.0 through 12—detailing AOT compilation via dex2oat, profile‑guided filters, runtime‑filter flags, class‑loader contexts, SELinux limits, and the use of PathClassLoader or the PMS performDexOptSecondary command to achieve performance comparable to installed APKs.

AOTAndroidClassLoader
0 likes · 17 min read
Optimizing Dynamically Loaded Dex Files Across Android Versions
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 27, 2022 · Operations

Resolving MySQL Service Startup Failure on CentOS 7 Due to SELinux Permission Denial

The article explains how a MySQL 5.7 service fails to start on a CentOS 7.9 server because SELinux blocks write access to err.log, walks through log inspection, strace tracing, SELinux context analysis, and provides a simple fix by disabling SELinux.

CentOSLinuxMySQL
0 likes · 7 min read
Resolving MySQL Service Startup Failure on CentOS 7 Due to SELinux Permission Denial
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Oct 29, 2021 · Information Security

Linux Security Module (LSM) Fundamentals and Implementation

The article explains the Linux Security Module (LSM) framework, detailing its origins, hook‑based architecture, kernel integration points, initialization process, and how it enables flexible, non‑intrusive security enhancements such as SELinux, allowing multiple security modules to coexist within the Linux kernel.

Kernel SecurityLSMLinux security
0 likes · 9 min read
Linux Security Module (LSM) Fundamentals and Implementation
ByteDance Dali Intelligent Technology Team
ByteDance Dali Intelligent Technology Team
Oct 20, 2021 · Mobile Development

Bypassing Android dex2oat Restrictions for targetSdkVersion ≥ 29: Analysis and Implementation

This article investigates the Android dex2oat compilation restrictions introduced for targetSdkVersion ≥ 29, analyzes their impact on app performance, explores SELinux enforcement, and presents a practical solution using system commands and binder calls to trigger dex2oat compilation for both primary and secondary APKs, improving load and runtime speed.

APKAndroidCompilation
0 likes · 19 min read
Bypassing Android dex2oat Restrictions for targetSdkVersion ≥ 29: Analysis and Implementation
ByteDance Terminal Technology
ByteDance Terminal Technology
Sep 29, 2021 · Mobile Development

Bypassing Android 10+ dex2oat Restrictions for Performance Optimization

This technical article investigates the Android 10+ dex2oat limitation that blocks app‑initiated compilation, analyzes its SELinux enforcement, and presents a practical solution using system commands and binder calls to trigger dex2oat for both primary and secondary APKs, achieving significant load‑time and runtime improvements.

ADBAndroidDex2oat
0 likes · 20 min read
Bypassing Android 10+ dex2oat Restrictions for Performance Optimization
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 4, 2021 · Information Security

Overview of SELinux and Its Use in Android

The article explains SELinux’s origins, core architecture, mandatory access control mechanisms such as type enforcement and MLS, and how Android incorporates SELinux as SEAndroid—detailing its evolution from permissive to enforcing mode, policy file structure, Android O’s split policies, and example domain and object transitions.

AndroidKernelMAC
0 likes · 17 min read
Overview of SELinux and Its Use in Android
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 8, 2021 · Information Security

Configuring SELinux for MySQL: Managing Access Controls and Directory Contexts

This article explains how SELinux enforces mandatory access control on Linux, describes its three modes, shows how to view and modify SELinux contexts for MySQL processes and data directories, and provides step‑by‑step commands to add custom paths, logs, PID files, and ports while preserving system security.

Database AdministrationLinux securityMySQL
0 likes · 8 min read
Configuring SELinux for MySQL: Managing Access Controls and Directory Contexts
Practical DevOps Architecture
Practical DevOps Architecture
Sep 6, 2017 · Information Security

Configuring SELinux and iptables on Red Hat/CentOS Systems

This guide explains how to permanently disable SELinux, temporarily change its mode, and provides a comprehensive tutorial on using iptables—including table concepts, basic commands, rule management, scripting, NAT configuration, and saving/restoring firewall rules—on Red Hat/CentOS Linux.

CentOSLinux securitySELinux
0 likes · 16 min read
Configuring SELinux and iptables on Red Hat/CentOS Systems