OXIESEC PANEL
- Current Dir:
/
/
etc
/
init.d
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/20/2025 05:23:23 PM
rwxr-xr-x
📄
acpid
2.22 KB
04/22/2017 01:14:06 PM
rwxr-xr-x
📄
apache-htcacheclean
2.43 KB
07/16/2019 06:14:45 PM
rwxr-xr-x
📄
apache2
7.99 KB
07/16/2019 06:14:45 PM
rwxr-xr-x
📄
apparmor
4.23 KB
03/22/2018 08:20:28 PM
rwxr-xr-x
📄
apport
2.85 KB
05/10/2022 01:23:35 PM
rwxr-xr-x
📄
atd
1.05 KB
08/21/2015 10:09:22 PM
rwxr-xr-x
📄
console-setup.sh
1.2 KB
04/19/2018 06:53:32 AM
rwxr-xr-x
📄
cron
2.98 KB
11/16/2017 05:29:19 AM
rwxr-xr-x
📄
cryptdisks
937 bytes
03/18/2018 01:01:09 AM
rwxr-xr-x
📄
cryptdisks-early
978 bytes
03/18/2018 01:01:09 AM
rwxr-xr-x
📄
cubhttpd
2.16 KB
02/03/2023 08:01:00 AM
rwxr-xr-x
📄
dbus
2.75 KB
11/15/2017 10:22:22 PM
rwxr-xr-x
📄
ebtables
4.38 KB
06/28/2018 04:42:04 PM
rwxr-xr-x
📄
grub-common
985 bytes
03/18/2019 04:11:57 PM
rwxr-xr-x
📄
hwclock.sh
3.72 KB
02/14/2018 10:20:24 PM
rwxr-xr-x
📄
irqbalance
2.39 KB
10/25/2017 02:27:49 PM
rwxr-xr-x
📄
iscsid
1.47 KB
12/12/2018 12:14:17 AM
rwxr-xr-x
📄
keyboard-setup.sh
1.44 KB
02/15/2018 10:16:55 PM
rwxr-xr-x
📄
kmod
2 KB
08/15/2017 06:35:54 PM
rwxr-xr-x
📄
lvm2
695 bytes
12/03/2017 10:16:08 AM
rwxr-xr-x
📄
lvm2-lvmetad
571 bytes
12/03/2017 10:16:07 AM
rwxr-xr-x
📄
lvm2-lvmpolld
586 bytes
12/03/2017 10:16:08 AM
rwxr-xr-x
📄
lxcfs
2.32 KB
11/23/2018 04:17:19 AM
rwxr-xr-x
📄
lxd
2.19 KB
11/23/2018 06:58:51 PM
rwxr-xr-x
📄
mdadm
2.59 KB
01/30/2019 02:51:36 PM
rwxr-xr-x
📄
mdadm-waitidle
1.22 KB
01/30/2019 02:51:36 PM
rwxr-xr-x
📄
mysql
5.48 KB
01/12/2018 10:57:39 AM
rwxr-xr-x
📄
open-iscsi
2.44 KB
12/12/2018 12:14:17 AM
rwxr-xr-x
📄
open-vm-tools
1.8 KB
04/05/2019 01:47:23 PM
rwxr-xr-x
📄
php7.2-fpm
4.68 KB
01/13/2020 06:39:59 PM
rwxr-xr-x
📄
plymouth
1.33 KB
04/04/2019 02:33:20 PM
rwxr-xr-x
📄
plymouth-log
752 bytes
04/04/2019 02:33:20 PM
rwxr-xr-x
📄
postfix
3.54 KB
10/11/2018 08:15:25 PM
rwxr-xr-x
📄
procps
1.16 KB
01/17/2018 10:35:48 PM
rwxr-xr-x
📄
rdcubot
5.77 KB
02/03/2023 08:01:00 AM
rwxr-xr-x
📄
rsync
4.25 KB
12/13/2017 06:34:49 AM
rwxr-xr-x
📄
rsyslog
2.8 KB
01/14/2018 04:19:35 PM
rwxr-xr-x
📄
screen-cleanup
1.19 KB
05/21/2017 07:04:46 PM
rwxr-xr-x
📄
slapd
5.31 KB
07/01/2020 07:38:55 PM
rwxr-xr-x
📄
ssh
3.75 KB
01/25/2018 11:13:31 PM
rwxr-xr-x
📄
udev
5.83 KB
04/20/2018 04:55:56 PM
rwxr-xr-x
📄
ufw
2.03 KB
08/15/2017 04:47:54 PM
rwxr-xr-x
📄
unattended-upgrades
1.36 KB
04/29/2019 10:13:14 AM
rwxr-xr-x
📄
uuidd
1.28 KB
08/22/2019 11:47:46 PM
rwxr-xr-x
📄
x11-common
2.69 KB
01/20/2017 07:52:26 AM
rwxr-xr-x
Editing: apparmor
Close
#!/bin/sh # ---------------------------------------------------------------------- # Copyright (c) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 # NOVELL (All rights reserved) # Copyright (c) 2008, 2009 Canonical, Ltd. # # This program is free software; you can redistribute it and/or # modify it under the terms of version 2 of the GNU General Public # License published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, contact Novell, Inc. # ---------------------------------------------------------------------- # Authors: # Steve Beattie <steve.beattie@canonical.com> # Kees Cook <kees@ubuntu.com> # # /etc/init.d/apparmor # ### BEGIN INIT INFO # Provides: apparmor # Required-Start: $local_fs # Required-Stop: umountfs # Default-Start: S # Default-Stop: # Short-Description: AppArmor initialization # Description: AppArmor init script. This script loads all AppArmor profiles. ### END INIT INFO . /lib/apparmor/functions . /lib/lsb/init-functions usage() { echo "Usage: $0 {start|stop|restart|reload|force-reload|status|recache}" } test -x ${PARSER} || exit 0 # by debian policy # LSM is built-in, so it is either there or not enabled for this boot test -d /sys/module/apparmor || exit 0 securityfs() { # Need securityfs for any mode if [ ! -d "${AA_SFS}" ]; then if cut -d" " -f2,3 /proc/mounts | grep -q "^${SECURITYFS} securityfs"'$' ; then log_action_msg "AppArmor not available as kernel LSM." log_end_msg 1 exit 1 else log_action_begin_msg "Mounting securityfs on ${SECURITYFS}" if ! mount -t securityfs none "${SECURITYFS}"; then log_action_end_msg 1 log_end_msg 1 exit 1 fi fi fi if [ ! -w "$AA_SFS"/.load ]; then log_action_msg "Insufficient privileges to change profiles." log_end_msg 1 exit 1 fi } # Allow "recache" even when running on the liveCD if [ "$1" = "recache" ]; then log_daemon_msg "Recaching AppArmor profiles" recache_profiles rc=$? log_end_msg "$rc" exit $rc fi # do not perform start/stop/reload actions when running from liveCD test -d /rofs/etc/apparmor.d && exit 0 rc=255 case "$1" in start) if [ -x /usr/bin/systemd-detect-virt ] && \ systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then log_daemon_msg "Not starting AppArmor in container" log_end_msg 0 exit 0 fi log_daemon_msg "Starting AppArmor profiles" securityfs load_configured_profiles rc=$? log_end_msg "$rc" ;; stop) log_daemon_msg "Clearing AppArmor profiles cache" clear_cache rc=$? log_end_msg "$rc" cat >&2 <<EOM All profile caches have been cleared, but no profiles have been unloaded. Unloading profiles will leave already running processes permanently unconfined, which can lead to unexpected situations. To set a process to complain mode, use the command line tool 'aa-complain'. To really tear down all profiles, run the init script with the 'teardown' option." EOM ;; teardown) if [ -x /usr/bin/systemd-detect-virt ] && \ systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then log_daemon_msg "Not tearing down AppArmor in container" log_end_msg 0 exit 0 fi log_daemon_msg "Unloading AppArmor profiles" securityfs running_profile_names | while read profile; do if ! unload_profile "$profile" ; then log_end_msg 1 exit 1 fi done rc=0 log_end_msg $rc ;; restart|reload|force-reload) if [ -x /usr/bin/systemd-detect-virt ] && \ systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then log_daemon_msg "Not reloading AppArmor in container" log_end_msg 0 exit 0 fi log_daemon_msg "Reloading AppArmor profiles" securityfs clear_cache load_configured_profiles rc=$? log_end_msg "$rc" ;; status) securityfs if [ -x /usr/sbin/aa-status ]; then aa-status --verbose else cat "$AA_SFS"/profiles fi rc=$? ;; *) usage rc=1 ;; esac exit $rc