rhel 7.x システムで実行したがdmesg
取得したすべてのログは次のとおりです。
[12283.628766] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12286.352175] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12289.207620] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12291.932644] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12294.924467] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12297.758151] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12300.449455] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
。 。 。
sestatus
はい
sestatus
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: permissive
Mode from config file: disabled
Policy MLS status: enabled
Policy deny_unknown status: allowed
Max kernel policy version: 28
今、私は実際にselinuxを無効にしました。
more /etc/selinux/config
# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
# enforcing - SELinux security policy is enforced.
# permissive - SELinux prints warnings instead of enforcing.
# disabled - No SELinux policy is loaded.
SELINUX=disabled
# SELINUXTYPE= can take one of three two values:
# targeted - Targeted processes are protected,
# minimum - Modification of targeted policy. Only selected processes are protected.
# mls - Multi Level Security protection.
SELINUXTYPE=targeted
私が理解したところによると、permissive
モードは無効になっているようです。
dmesg
このすべてのラインの氾濫を防ぐ方法の提案がありますか?