2
0
mirror of https://gitlab.com/apparmor/apparmor synced 2025-08-22 10:07:12 +00:00

Update ancient paths in apparmor and apparmor.d manpage

- replace example calls of /etc/init.d/apparmor with apparmor.service
- drop /etc/init.d/apparmor in filelist
- replace /var/lib/apparmor/ with /var/cache/apparmor/
This commit is contained in:
Christian Boltz 2024-03-03 18:18:12 +01:00
parent a367c07437
commit 7452f34279
No known key found for this signature in database
GPG Key ID: C6A682EA63C82F1C
2 changed files with 5 additions and 10 deletions

View File

@ -2037,8 +2037,6 @@ An example AppArmor profile:
=over 4 =over 4
=item F</etc/init.d/boot.apparmor>
=item F</etc/apparmor.d/> =item F</etc/apparmor.d/>
=back =back

View File

@ -36,12 +36,11 @@ of resources. AppArmor's unique security model is to bind access control
attributes to programs rather than to users. attributes to programs rather than to users.
AppArmor confinement is provided via I<profiles> loaded into the kernel AppArmor confinement is provided via I<profiles> loaded into the kernel
via apparmor_parser(8), typically through the F</etc/init.d/apparmor> via apparmor_parser(8), typically through the F<apparmor.service>
SysV initscript, which is used like this: systemd unit, which is used like this:
# /etc/init.d/apparmor start # systemctl start apparmor
# /etc/init.d/apparmor stop # systemctl reload apparmor
# /etc/init.d/apparmor restart
AppArmor can operate in two modes: I<enforcement>, and I<complain or learning>: AppArmor can operate in two modes: I<enforcement>, and I<complain or learning>:
@ -273,11 +272,9 @@ Else, if auditd is running, see auditd(8) and auditd.conf(5).
=over 4 =over 4
=item F</etc/init.d/apparmor>
=item F</etc/apparmor.d/> =item F</etc/apparmor.d/>
=item F</var/lib/apparmor/> =item F</var/cache/apparmor/>
=item F</var/log/audit/audit.log> =item F</var/log/audit/audit.log>