OXIESEC PANEL
- Current Dir:
/
/
snap
/
core
/
17200
/
etc
/
init.d
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
06/06/2024 02:31:58 PM
rwxr-xr-x
📄
.depend.boot
959 bytes
02/18/2024 07:56:28 PM
rw-r--r--
📄
.depend.start
386 bytes
02/18/2024 07:56:28 PM
rw-r--r--
📄
.depend.stop
411 bytes
02/18/2024 07:56:28 PM
rw-r--r--
📄
README
2.37 KB
01/19/2016 06:33:50 PM
rw-r--r--
📄
apparmor
6.08 KB
03/03/2017 10:52:31 PM
rwxr-xr-x
📄
bootmisc.sh
1.25 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
cgmanager
3.48 KB
09/14/2015 10:15:39 PM
rwxr-xr-x
📄
cgproxy
3.28 KB
09/14/2015 10:15:39 PM
rwxr-xr-x
📄
checkfs.sh
3.72 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
checkroot-bootclean.sh
1.07 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
checkroot.sh
9.13 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
console-setup
1.31 KB
04/04/2016 05:41:49 PM
rwxr-xr-x
📄
cron
2.98 KB
05/10/2022 10:15:22 PM
rwxr-xr-x
📄
dbus
2.75 KB
10/07/2019 11:29:04 AM
rwxr-xr-x
📄
halt
1.3 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
hostname.sh
1.39 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
hwclock.sh
3.72 KB
03/12/2016 03:14:57 PM
rwxr-xr-x
📄
keyboard-setup
1.76 KB
04/04/2016 05:41:49 PM
rwxr-xr-x
📄
killprocs
1.27 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
kmod
2.04 KB
11/12/2018 09:55:37 PM
rwxr-xr-x
📄
mountall-bootclean.sh
703 bytes
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
mountall.sh
2.25 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountdevsubfs.sh
1.43 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountkernfs.sh
1.53 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountnfs-bootclean.sh
711 bytes
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
mountnfs.sh
2.4 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
networking
4.66 KB
11/30/2016 05:16:19 PM
rwxr-xr-x
📄
ondemand
1.54 KB
10/16/2015 02:45:22 AM
rwxr-xr-x
📄
pppd-dns
612 bytes
01/27/2016 04:19:52 PM
rwxr-xr-x
📄
procps
1.16 KB
09/06/2015 05:30:20 AM
rwxr-xr-x
📄
rc
6.22 KB
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
rc.local
820 bytes
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
rcS
117 bytes
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
reboot
661 bytes
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
resolvconf
4.05 KB
11/29/2017 06:26:46 PM
rwxr-xr-x
📄
rsyslog
2.73 KB
02/03/2016 10:54:29 AM
rwxr-xr-x
📄
sendsigs
3.83 KB
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
single
597 bytes
01/19/2016 06:33:50 PM
rwxr-xr-x
📄
skeleton
1.06 KB
01/19/2016 06:33:51 PM
rw-r--r--
📄
ssh
3.98 KB
05/13/2020 02:12:28 PM
rwxr-xr-x
📄
ubuntu-fan
1.2 KB
10/28/2016 03:24:40 PM
rwxr-xr-x
📄
udev
5.94 KB
04/02/2021 02:39:40 AM
rwxr-xr-x
📄
umountfs
2.67 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
umountnfs.sh
2.15 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
umountroot
1.83 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
📄
urandom
3.04 KB
01/19/2016 06:33:51 PM
rwxr-xr-x
Editing: apparmor
Close
#!/bin/sh # ---------------------------------------------------------------------- # Copyright (c) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 # NOVELL (All rights reserved) # Copyright (c) 2008, 2009 Canonical, Ltd. # # This program is free software; you can redistribute it and/or # modify it under the terms of version 2 of the GNU General Public # License published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, contact Novell, Inc. # ---------------------------------------------------------------------- # Authors: # Steve Beattie <steve.beattie@canonical.com> # Kees Cook <kees@ubuntu.com> # # /etc/init.d/apparmor # ### BEGIN INIT INFO # Provides: apparmor # Required-Start: $local_fs # Required-Stop: umountfs # Default-Start: S # Default-Stop: # Short-Description: AppArmor initialization # Description: AppArmor init script. This script loads all AppArmor profiles. ### END INIT INFO . /lib/apparmor/functions . /lib/lsb/init-functions usage() { echo "Usage: $0 {start|stop|restart|reload|force-reload|status|recache}" } test -x ${PARSER} || exit 0 # by debian policy # LSM is built-in, so it is either there or not enabled for this boot test -d /sys/module/apparmor || exit 0 securityfs() { # Need securityfs for any mode if [ ! -d "${AA_SFS}" ]; then if cut -d" " -f2,3 /proc/mounts | grep -q "^${SECURITYFS} securityfs"'$' ; then log_action_msg "AppArmor not available as kernel LSM." log_end_msg 1 exit 1 else log_action_begin_msg "Mounting securityfs on ${SECURITYFS}" if ! mount -t securityfs none "${SECURITYFS}"; then log_action_end_msg 1 log_end_msg 1 exit 1 fi fi fi if [ ! -w "$AA_SFS"/.load ]; then log_action_msg "Insufficient privileges to change profiles." log_end_msg 1 exit 1 fi } handle_system_policy_package_updates() { apparmor_was_updated=0 if ! compare_previous_version ; then # On snappy flavors, if the current and previous versions are # different then clear the system cache. snappy will handle # "$PROFILES_CACHE_VAR" itself (on Touch flavors # compare_previous_version always returns '0' since snappy # isn't available). clear_cache_system apparmor_was_updated=1 elif ! compare_and_save_debsums apparmor ; then # If the system policy has been updated since the last time we # ran, clear the cache to prevent potentially stale binary # cache files after an Ubuntu image based upgrade (LP: # #1350673). This can be removed once all system image flavors # move to snappy (on snappy systems compare_and_save_debsums # always returns '0' since /var/lib/dpkg doesn't exist). clear_cache apparmor_was_updated=1 fi if [ -x /usr/bin/aa-clickhook ] || [ -x /usr/bin/aa-profile-hook ] ; then # If packages for system policy that affect click packages have # been updated since the last time we ran, run aa-clickhook -f force_clickhook=0 force_profile_hook=0 if ! compare_and_save_debsums apparmor-easyprof-ubuntu ; then force_clickhook=1 fi if ! compare_and_save_debsums apparmor-easyprof-ubuntu-snappy ; then force_clickhook=1 fi if ! compare_and_save_debsums click-apparmor ; then force_clickhook=1 force_profile_hook=1 fi if [ -x /usr/bin/aa-clickhook ] && ([ $force_clickhook -eq 1 ] || [ $apparmor_was_updated -eq 1 ]) ; then aa-clickhook -f fi if [ -x /usr/bin/aa-profile-hook ] && ([ $force_profile_hook -eq 1 ] || [ $apparmor_was_updated -eq 1 ]) ; then aa-profile-hook -f fi fi } # Allow "recache" even when running on the liveCD if [ "$1" = "recache" ]; then log_daemon_msg "Recaching AppArmor profiles" recache_profiles rc=$? log_end_msg "$rc" exit $rc fi # do not perform start/stop/reload actions when running from liveCD test -d /rofs/etc/apparmor.d && exit 0 rc=255 case "$1" in start) if systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then log_daemon_msg "Not starting AppArmor in container" log_end_msg 0 exit 0 fi log_daemon_msg "Starting AppArmor profiles" securityfs handle_system_policy_package_updates load_configured_profiles rc=$? log_end_msg "$rc" ;; stop) log_daemon_msg "Clearing AppArmor profiles cache" clear_cache rc=$? log_end_msg "$rc" cat >&2 <<EOM All profile caches have been cleared, but no profiles have been unloaded. Unloading profiles will leave already running processes permanently unconfined, which can lead to unexpected situations. To set a process to complain mode, use the command line tool 'aa-complain'. To really tear down all profiles, run the init script with the 'teardown' option." EOM ;; teardown) if systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then log_daemon_msg "Not tearing down AppArmor in container" log_end_msg 0 exit 0 fi log_daemon_msg "Unloading AppArmor profiles" securityfs running_profile_names | while read profile; do if ! unload_profile "$profile" ; then log_end_msg 1 exit 1 fi done rc=0 log_end_msg $rc ;; restart|reload|force-reload) if systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then log_daemon_msg "Not reloading AppArmor in container" log_end_msg 0 exit 0 fi log_daemon_msg "Reloading AppArmor profiles" securityfs clear_cache load_configured_profiles rc=$? log_end_msg "$rc" ;; status) securityfs if [ -x /usr/sbin/aa-status ]; then aa-status --verbose else cat "$AA_SFS"/profiles fi rc=$? ;; *) usage rc=1 ;; esac exit $rc