Difference between revisions of "AppArmor"
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
/etc/apparmor.d/[[libvirt]] | /etc/apparmor.d/[[libvirt]] | ||
+ | |||
+ | May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.[[rocketchat-server]].rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 | ||
Revision as of 17:35, 1 May 2020
This article is a Draft. Help us to complete it.
/etc/apparmor.d/libvirt
May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.rocketchat-server.rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
Related terms
See also
- SELinux,
semanage
,sestatus
,getenforce
,chcon
, security context,setsebool
- AppArmor,
/etc/apparmor.d/libvirt
,apparmor_status
- Seccomp
- Mandatory access control: AppArmor, SELinux, seccomp, System Integrity Protection (macOS)
Advertising: