在我们的 rhel 7.x 机器上,我们已经运行,dmesg
但我们得到的所有日志为
[12283.628766] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12286.352175] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12289.207620] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12291.932644] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12294.924467] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12297.758151] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[12300.449455] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
。 。 。
是sestatus
sestatus
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: permissive
Mode from config file: disabled
Policy MLS status: enabled
Policy deny_unknown status: allowed
Max kernel policy version: 28
现在我们实际上禁用了selinux
more /etc/selinux/config
# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
# enforcing - SELinux security policy is enforced.
# permissive - SELinux prints warnings instead of enforcing.
# disabled - No SELinux policy is loaded.
SELINUX=disabled
# SELINUXTYPE= can take one of three two values:
# targeted - Targeted processes are protected,
# minimum - Modification of targeted policy. Only selected processes are protected.
# mls - Multi Level Security protection.
SELINUXTYPE=targeted
据我了解,permissive
模式类似于禁用
有什么建议如何阻止dmesg
所有这些线路泛滥吗?