Difference between revisions of "AppArmor"
Jump to navigation
Jump to search
Line 7: | Line 7: | ||
May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.[[rocketchat-server]].rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 | May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.[[rocketchat-server]].rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 | ||
+ | |||
+ | |||
+ | To disable AppArmor: | ||
+ | sudo [[systemctl disable]] apparmor | ||
+ | [[reboot]] | ||
Revision as of 17:38, 1 May 2020
This article is a Draft. Help us to complete it.
apparmor_status
/etc/apparmor.d/libvirt
May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.rocketchat-server.rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
To disable AppArmor:
sudo systemctl disable apparmor reboot
Related terms
See also
- SELinux,
semanage
,sestatus
,getenforce
,chcon
, security context,setsebool
- AppArmor,
/etc/apparmor.d/libvirt
,apparmor_status
- Seccomp
- Mandatory access control: AppArmor, SELinux, seccomp, System Integrity Protection (macOS)
Advertising: