/dports/security/ossec-hids-server/ossec-hids-3.6.0/contrib/ossec-testing/tests/ |
H A D | apparmor.ini | 8 [Apparmor ALLOWED or STATUS] 15 [Apparmor DENIED] 22 [Apparmor DENIED mknod operation.] 29 [Apparmor DENIED exec operation.]
|
/dports/security/ossec-hids-local/ossec-hids-3.6.0/contrib/ossec-testing/tests/ |
H A D | apparmor.ini | 8 [Apparmor ALLOWED or STATUS] 15 [Apparmor DENIED] 22 [Apparmor DENIED mknod operation.] 29 [Apparmor DENIED exec operation.]
|
/dports/security/ossec-hids-agent/ossec-hids-3.6.0/contrib/ossec-testing/tests/ |
H A D | apparmor.ini | 8 [Apparmor ALLOWED or STATUS] 15 [Apparmor DENIED] 22 [Apparmor DENIED mknod operation.] 29 [Apparmor DENIED exec operation.]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 16 if !seccompEnabled() && !Apparmor() { 26 if Apparmor() {
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 16 if !seccompEnabled() && !Apparmor() { 26 if Apparmor() {
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 16 if !seccompEnabled() && !Apparmor() { 26 if Apparmor() {
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 16 if !seccompEnabled() && !Apparmor() { 26 if Apparmor() {
|
/dports/multimedia/libv4l/linux-5.13-rc2/Documentation/translations/zh_CN/process/ |
H A D | 3.Early-stage.rst | 95 - Apparmor安全模块以被认为不安全和不可靠的方式使用内部虚拟文件系统数据结构。 96 这种担心(包括其他)使Apparmor多年来无法进入主线。
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/Documentation/translations/zh_CN/process/ |
H A D | 3.Early-stage.rst | 95 - Apparmor安全模块以被认为不安全和不可靠的方式使用内部虚拟文件系统数据结构。 96 这种担心(包括其他)使Apparmor多年来无法进入主线。
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/Documentation/translations/zh_CN/process/ |
H A D | 3.Early-stage.rst | 95 - Apparmor安全模块以被认为不安全和不可靠的方式使用内部虚拟文件系统数据结构。 96 这种担心(包括其他)使Apparmor多年来无法进入主线。
|
/dports/astro/gpsd/gpsd-3.20/contrib/appamor/ |
H A D | README.md | 1 ## Apparmor profile for gpsd 8 Distributions using Apparmor are Debian, Ubuntu, various derivates, SuSE 10 SELinux, which does obviously not use Apparmor profiles.
|
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 11 testRequires(c, SameHostDaemon, seccompEnabled, Apparmor, DaemonIsLinux)
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 11 testRequires(c, SameHostDaemon, seccompEnabled, Apparmor, DaemonIsLinux)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 11 testRequires(c, SameHostDaemon, seccompEnabled, Apparmor, DaemonIsLinux)
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 11 testRequires(c, SameHostDaemon, seccompEnabled, Apparmor, DaemonIsLinux)
|
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 11 testRequires(c, SameHostDaemon, seccompEnabled, Apparmor, DaemonIsLinux)
|
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 11 testRequires(c, testEnv.IsLocalDaemon, seccompEnabled, Apparmor, DaemonIsLinux)
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/integration-cli/ |
H A D | docker_cli_info_unix_test.go | 13 testRequires(c, testEnv.IsLocalDaemon, seccompEnabled, Apparmor, DaemonIsLinux)
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/containerd/containerd/contrib/ |
H A D | README.md | 5 Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and…
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/containerd/containerd/containerd-1.4.3/contrib/ |
H A D | README.md | 5 Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and…
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/containerd/containerd/contrib/ |
H A D | README.md | 5 Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and…
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/containerd/containerd/contrib/ |
H A D | README.md | 5 Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and…
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/vendor/github.com/containerd/containerd/contrib/ |
H A D | README.md | 5 Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and…
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/containerd/containerd/contrib/ |
H A D | README.md | 5 Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and…
|
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/containerd/containerd/contrib/ |
H A D | README.md | 5 Package such as Apparmor or Selinux are placed in `contrib` because they are platform dependent and…
|