OXIESEC PANEL
- Current Dir:
/
/
snap
/
core24
/
888
/
usr
/
lib
/
sysctl.d
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
03/18/2025 08:12:15 AM
rwxr-xr-x
📄
10-apparmor.conf
708 bytes
07/14/2024 10:22:07 PM
rw-r--r--
📄
50-coredump.conf
1.79 KB
02/21/2025 09:18:31 PM
rw-r--r--
📄
50-pid-max.conf
649 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
99-protect-links.conf
372 bytes
09/26/2024 08:44:05 AM
rw-r--r--
Editing: 10-apparmor.conf
Close
# AppArmor restrictions of unprivileged user namespaces # Allows to restrict the use of unprivileged user namespaces to applications # which have an AppArmor profile loaded which specifies the userns # permission. All other applications (whether confined by AppArmor or not) will # be denied the use of unprivileged user namespaces. # # See # https://gitlab.com/apparmor/apparmor/-/wikis/unprivileged_userns_restriction # # If it is desired to disable this restriction, it is preferable to create an # additional file named /etc/sysctl.d/20-apparmor.conf which will override this # current file and sets this value to 0 rather than editing this current file kernel.apparmor_restrict_unprivileged_userns = 1