2010-12-20 13:47:09 -06:00
|
|
|
# This publication is intellectual property of Novell Inc. and Canonical
|
|
|
|
# Ltd. Its contents can be duplicated, either in part or in whole, provided
|
|
|
|
# that a copyright label is visibly located on each copy.
|
2006-04-11 21:52:54 +00:00
|
|
|
#
|
|
|
|
# All information found in this book has been compiled with utmost
|
|
|
|
# attention to detail. However, this does not guarantee complete accuracy.
|
2010-12-20 13:47:09 -06:00
|
|
|
# Neither SUSE LINUX GmbH, Canonical Ltd, the authors, nor the translators
|
|
|
|
# shall be held liable for possible errors or the consequences thereof.
|
2006-04-11 21:52:54 +00:00
|
|
|
#
|
|
|
|
# Many of the software and hardware descriptions cited in this book
|
|
|
|
# are registered trademarks. All trade names are subject to copyright
|
|
|
|
# restrictions and may be registered trade marks. SUSE LINUX GmbH
|
2010-12-20 13:47:09 -06:00
|
|
|
# and Canonical Ltd. essentially adhere to the manufacturer's spelling.
|
2006-04-11 21:52:54 +00:00
|
|
|
#
|
|
|
|
# Names of products and trademarks appearing in this book (with or without
|
|
|
|
# specific notation) are likewise subject to trademark and trade protection
|
|
|
|
# laws and may thus fall under copyright restrictions.
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2010-11-03 17:03:52 -07:00
|
|
|
aa-status - display various information about the current AppArmor
|
2006-04-11 21:52:54 +00:00
|
|
|
policy.
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
2010-11-03 17:03:52 -07:00
|
|
|
B<aa-status> [option]
|
2006-04-11 21:52:54 +00:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2010-11-03 17:03:52 -07:00
|
|
|
B<aa-status> will report various aspects of the current state of
|
2006-04-11 21:52:54 +00:00
|
|
|
AppArmor confinement. By default, it displays the same information as if
|
|
|
|
the I<--verbose> argument were given. A sample of what this looks like
|
|
|
|
is:
|
|
|
|
|
|
|
|
apparmor module is loaded.
|
|
|
|
110 profiles are loaded.
|
|
|
|
102 profiles are in enforce mode.
|
|
|
|
8 profiles are in complain mode.
|
|
|
|
Out of 129 processes running:
|
|
|
|
13 processes have profiles defined.
|
|
|
|
8 processes have profiles in enforce mode.
|
|
|
|
5 processes have profiles in complain mode.
|
|
|
|
|
|
|
|
Other argument options are provided to report individual aspects, to
|
|
|
|
support being used in scripts.
|
|
|
|
|
|
|
|
=head1 OPTIONS
|
|
|
|
|
2010-11-03 17:03:52 -07:00
|
|
|
B<aa-status> accepts only one argument at a time out of:
|
2006-04-11 21:52:54 +00:00
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item --enabled
|
|
|
|
|
|
|
|
returns error code if AppArmor is not enabled.
|
|
|
|
|
|
|
|
=item --profiled
|
|
|
|
|
|
|
|
displays the number of loaded AppArmor policies.
|
|
|
|
|
|
|
|
=item --enforced
|
|
|
|
|
|
|
|
displays the number of loaded enforcing AppArmor policies.
|
|
|
|
|
|
|
|
=item --complaining
|
|
|
|
|
|
|
|
displays the number of loaded non-enforcing AppArmor policies.
|
|
|
|
|
2020-04-26 04:32:43 -07:00
|
|
|
=item --kill
|
|
|
|
|
2023-05-02 03:22:33 -07:00
|
|
|
displays the number of loaded enforcing AppArmor policies that will
|
|
|
|
kill tasks on policy violations.
|
|
|
|
|
|
|
|
=item --prompt
|
|
|
|
|
|
|
|
displays the number of loaded enforcing AppArmor policies, with
|
|
|
|
fallback to userspace mediation.
|
2020-04-26 04:32:43 -07:00
|
|
|
|
|
|
|
=item --special-unconfined
|
2020-04-26 04:20:47 -07:00
|
|
|
|
2023-05-02 03:22:33 -07:00
|
|
|
displays the number of loaded non-enforcing AppArmor policies that are
|
|
|
|
in the special unconfined mode.
|
2020-04-26 04:32:43 -07:00
|
|
|
|
|
|
|
=item --process-mixed
|
2020-04-26 04:20:47 -07:00
|
|
|
displays the number of processes confined by profile stacks with
|
|
|
|
profiles in different modes.
|
|
|
|
|
2006-04-11 21:52:54 +00:00
|
|
|
=item --verbose
|
|
|
|
|
|
|
|
displays multiple data points about loaded AppArmor policy
|
|
|
|
set (the default action if no arguments are given).
|
|
|
|
|
2016-03-24 10:59:45 -04:00
|
|
|
=item --json
|
|
|
|
|
|
|
|
displays multiple data points about loaded AppArmor policy
|
|
|
|
set in a JSON format, fit for machine consumption.
|
|
|
|
|
|
|
|
=item --pretty-json
|
|
|
|
|
|
|
|
same as --json, formatted to be readable by humans as well
|
|
|
|
as by machines.
|
|
|
|
|
2023-05-02 03:22:33 -07:00
|
|
|
=item --show
|
|
|
|
|
|
|
|
what data sets to show information about. Currently I<processes>,
|
|
|
|
I<profiles>, I<all> for both processes and profiles. The default is
|
|
|
|
I<all>.
|
|
|
|
|
|
|
|
=item --count
|
|
|
|
|
|
|
|
display only counts for selected information.
|
|
|
|
|
|
|
|
=item --filter.mode=filter
|
|
|
|
|
|
|
|
Allows specifying a posix regular expression filter that will be
|
2025-02-18 11:54:42 -08:00
|
|
|
applied against the displayed processes and profiles apparmor profile
|
2023-05-02 03:22:33 -07:00
|
|
|
mode, reducing the output.
|
|
|
|
|
|
|
|
=item --filter.profiles=filter
|
|
|
|
|
|
|
|
Allows specifying a posix regular expression filter that will be
|
2025-02-18 11:54:42 -08:00
|
|
|
applied against the displayed processes and profiles confining
|
2023-05-02 03:22:33 -07:00
|
|
|
profile, reducing the output.
|
|
|
|
|
|
|
|
=item --filter.pid=filter
|
|
|
|
|
|
|
|
Allows specifying a posix regular expression filter that will be
|
|
|
|
applied against the displayed processes, so that only processes pids
|
|
|
|
matching the expression will be displayed.
|
|
|
|
|
|
|
|
=item --filter.exe=filter
|
|
|
|
|
|
|
|
Allows specifying a posix regular expression filter that will be
|
|
|
|
applied against the displayed processes, so that only processes
|
|
|
|
executable name matching the expression will be displayed.
|
|
|
|
|
2006-04-11 21:52:54 +00:00
|
|
|
=item --help
|
|
|
|
|
|
|
|
displays a short usage statement.
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
2017-07-31 17:44:52 +00:00
|
|
|
=head1 EXIT STATUS
|
2006-04-11 21:52:54 +00:00
|
|
|
|
2017-07-31 17:44:52 +00:00
|
|
|
Upon exiting, B<aa-status> will set its exit status to the
|
2007-05-24 04:59:06 +00:00
|
|
|
following values:
|
|
|
|
|
2010-11-04 14:27:30 -07:00
|
|
|
=over 4
|
|
|
|
|
2017-07-31 10:19:45 -05:00
|
|
|
=item B<0>
|
2007-05-24 04:59:06 +00:00
|
|
|
|
|
|
|
if apparmor is enabled and policy is loaded.
|
|
|
|
|
2017-07-31 10:19:45 -05:00
|
|
|
=item B<1>
|
2007-05-24 04:59:06 +00:00
|
|
|
|
|
|
|
if apparmor is not enabled/loaded.
|
|
|
|
|
2017-07-31 10:19:45 -05:00
|
|
|
=item B<2>
|
2007-05-24 04:59:06 +00:00
|
|
|
|
|
|
|
if apparmor is enabled but no policy is loaded.
|
|
|
|
|
2017-07-31 10:19:45 -05:00
|
|
|
=item B<3>
|
2007-05-24 04:59:06 +00:00
|
|
|
|
2023-05-02 03:22:33 -07:00
|
|
|
if the apparmor control files aren't available under
|
|
|
|
/sys/kernel/security/.
|
2007-05-24 04:59:06 +00:00
|
|
|
|
2017-07-31 10:19:45 -05:00
|
|
|
=item B<4>
|
2007-05-24 04:59:06 +00:00
|
|
|
|
|
|
|
if the user running the script doesn't have enough privileges to read
|
|
|
|
the apparmor control files.
|
|
|
|
|
2020-04-24 05:43:47 +00:00
|
|
|
=item B<42>
|
|
|
|
|
|
|
|
if an internal error occurred.
|
|
|
|
|
2010-11-04 14:27:30 -07:00
|
|
|
=back
|
|
|
|
|
2017-07-31 17:44:52 +00:00
|
|
|
=head1 BUGS
|
|
|
|
|
|
|
|
B<aa-status> must be run as root to read the state of the loaded
|
2023-05-02 03:22:33 -07:00
|
|
|
policy from the apparmor module. It uses the /proc filesystem to
|
|
|
|
determine which processes are confined and so is susceptible to race
|
|
|
|
conditions.
|
2017-07-31 17:44:52 +00:00
|
|
|
|
2010-12-20 13:47:09 -06:00
|
|
|
If you find any additional bugs, please report them at
|
2020-05-02 20:40:55 -07:00
|
|
|
L<https://gitlab.com/apparmor/apparmor/-/issues>.
|
2006-04-11 21:52:54 +00:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
apparmor(7), apparmor.d(5), and
|
2018-09-13 16:28:22 +00:00
|
|
|
L<https://wiki.apparmor.net>.
|
2006-04-11 21:52:54 +00:00
|
|
|
|
|
|
|
=cut
|