dwww Home | Manual pages | Find package

AA-UNCONFINED(8)                    AppArmor                   AA-UNCONFINED(8)

NAME
       aa-unconfined - output a list of processes with tcp or udp ports that do
       not have AppArmor profiles loaded

SYNOPSIS
       aa-unconfined [options] [--with-ss | --with-netstat]

OPTIONS
       --paranoid
           Displays  all  processes  visible from /proc filesystem, and whether
           they are confined by a profile  or  "not  confined".  Equivalent  to
           --show=all.

       --show=(all|network|server|client)
           Determines the set of processes to be displayed.

           --show=all show all processes is equivalent to --paranoid

           --show=network show only process with any sockets open.

           --show=server  show only processes with listening sockets open. This
           is the default value if --show= or --paranoid are not specified.

           --show=client show only processes with non-listening sockets open.

       --with-ss
           Use the ss(8) command to find processes listening on network sockets
           (the default).

       --with-netstat
           Use the netstat(8) command to find processes  listening  on  network
           sockets.  This  is  also  what  aa-unconfined will fall back to when
           ss(8) is not available.

DESCRIPTION
       aa-unconfined will use netstat(8) to determine which processes have open
       network sockets and do  not  have  AppArmor  profiles  loaded  into  the
       kernel.

BUGS
       aa-unconfined  must  be  run  as root to retrieve the process executable
       link from the /proc filesystem. This  program  is  susceptible  to  race
       conditions   of   several  flavours:  an  unlinked  executable  will  be
       mishandled; an executable started before an AppArmor profile  is  loaded
       will  not  appear  in the output, despite running without confinement; a
       process that dies between the netstat(8)  and  further  checks  will  be
       mishandled.  This  program  only  lists  processes using TCP and UDP. In
       short, this program is unsuitable for forensics use and is provided only
       as an aid to profiling all network-accessible processes in the lab.

       If    you    find    any     bugs,     please     report     them     at
       <https://gitlab.com/apparmor/apparmor/-/issues>.

SEE ALSO
       ss(8),  netstat(8),  apparmor(7),  apparmor.d(5),  aa_change_hat(2), and
       <https://wiki.apparmor.net>.

AppArmor 4.1.0                     2025-04-10                  AA-UNCONFINED(8)

Generated by dwww version 1.16 on Tue Dec 16 05:05:55 CET 2025.