rhel 7.x 시스템에서 실행했지만 dmesg
얻은 모든 로그는 다음과 같습니다.
[12283.628766] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12286.352175] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12289.207620] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12291.932644] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12294.924467] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12297.758151] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12300.449455] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
. . .
sestatus
예
sestatus
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: permissive
Mode from config file: disabled
Policy MLS status: enabled
Policy deny_unknown status: allowed
Max kernel policy version: 28
이제 실제로 selinux를 비활성화했습니다.
more /etc/selinux/config
# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
# enforcing - SELinux security policy is enforced.
# permissive - SELinux prints warnings instead of enforcing.
# disabled - No SELinux policy is loaded.
SELINUX=disabled
# SELINUXTYPE= can take one of three two values:
# targeted - Targeted processes are protected,
# minimum - Modification of targeted policy. Only selected processes are protected.
# mls - Multi Level Security protection.
SELINUXTYPE=targeted
내가 이해한 바에 따르면 permissive
모드는 비활성화된 것과 같습니다.
dmesg
이 모든 라인의 범람을 막는 방법에 대한 제안이 있으십니까 ?