/ohos5.0/docs/zh-cn/device-dev/subsystems/ |
H A D | subsys-security-selinux-faq.md | 9 …/updater/system.cil:3887 from ../../base/security/selinux_adapter/sepolicy/base/public/domain.te:96 36 ' on line 3350:rity/selinux_adapter/sepolicy/base/public/domain.te:16:ERROR 'unrecognized character… 48 dos2unix ./sepolicy/base/public/domain.te 56 …nux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te:2:ERROR 'unknown typ… 58 …../base/security/selinux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te" 75 排查是否在当前策略编译时不可见,将SELinux类型定义移到编译可见目录下,一般SELinux类型定义位置最好在public子目录下,且一般文件命名为type.te。
|
H A D | subsys-security-selinux-develop-intro.md | 10 │ │ └── type1.te 12 │ │ └── type2.te 14 │ └── type3.te 24 | *.te | SELinux策略文件,用于定义类型、配置allow策略、配置neverallow策略。 | 44 | glb_te_def.spt | te规则的全局宏定义,可用于简化策略语句。 |
|
H A D | subsys-security-selinux-sample-file.md | 14 2. 在type.te中定义system_lib_file,使u:object_r:system_lib_file:s0是合法的。 31 2. 在type.te中定义data_service_el0_file,使u:object_r:data_service_el0_file:s0是合法的。 56 2. 在type.te中定义`proc_iomem_file`,使`u:object_r:proc_iomem_file:s0`是合法的。
|
H A D | subsys-security-selinux-sample-domain.md | 24 2. 在type.te中定义SELinux标签u:r:demo:s0中的SELinux类型demo,使u:r:demo:s0是合法的。 56 2. 在type.te中定义SELinux标签u:r:demo:s0中的SELinux类型demo,使u:r:demo:s0是合法的。 83 2. 在type.te中定义SELinux标签u:r:demo:s0中的SELinux类型demo,使u:r:demo:s0是合法的。 101 2. 在type.te中定义`permissionmanager_hap`和`permissionmanager_hap_data_file`,使`u:r:permissionmanager_hap…
|
H A D | subsys-ai-nnrt-guide.md | 279 2. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdf_service.te```文件中新增配置: 285 3. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdfdomain.te```文件中新增配置: 291 4. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/type.te```文件中新增配置: 297 5. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/hdf_devmgr.te```文件中新增配置: 306 6. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/init.te```文件中新增配置: 312 7. 在```base/security/selinux/sepolicy/ohos_policy/startup/init/public/chipset_init.te```文件中作如下修改: 323 8. 新建```nnrt_host.te```配置文件: 331 # 创建nnrt_host.te文件 332 touch base/security/selinux/sepolicy/ohos_policy/drivers/peripheral/nnrt/vendor/nnrt_host.te 335 9. 将所需的权限写入```nnrt_host.te```文件中:
|
H A D | subsys-security-selinux-sample-sa.md | 16 2. 在type.te中定义对应的`sa_render_service`,使对应的标签合法。 35 2. 在type.te中定义对应的`hdf_thermal_interface_service`,使对应的标签合法。
|
H A D | subsys-thermal_control.md | 185 …为触发热管控策略,先设置低温,再设置高温。使用```hidumper -s 3303 -a '-te [name] [num]'```指令上报模拟温度。其中name表示温度传感器名称,num表示该… 188 $ hidumper -s 3303 -a '-te battery 32000 charger 32000' 196 $ hidumper -s 3303 -a '-te battery 39000 charger 39000'
|
H A D | subsys-security-selinux-sample-param.md | 38 2. 在type.te中定义对应的init_svc_param,使对应的标签合法。
|
H A D | subsys-security-selinux-compile.md | 12 …_def.spt, glb_never_def.spt, mls, policy_cap, glb_te_def.spt, attributes, .te, glb_roles.spt, user…
|
H A D | subsys-boot-init-sysparam.md | 109 … 为系统参数添加selinux标签,首先需要在文件/base/security/selinux_adapter/sepolicy/base/public/parameter.te中定义标签,例如: 121 …- 给init授权,允许map等操作,在文件/base/security/selinux/sepolicy/ohos_policy/startup/init/public/init.te中补充下面… 192 系统参数标签会在/base/security/selinux_adapter/sepolicy/base/public/parameter.te文件中定义:
|
H A D | subsys-boot-init-service.md | 275 在base/security/selinux_adapter/sepolicy/base/public/type.te文件定义标签的作用域,如: 340 服务控制接口配置selinux,需要在init.te文件中添加该服务接口所需要的selinux权限,例如为init、samgr、hdf_devmgr等服务配置系统参数写权限:
|
/ohos5.0/docs/en/device-dev/subsystems/ |
H A D | subsys-security-selinux-faq.md | 9 …/updater/system.cil:3887 from ../../base/security/selinux_adapter/sepolicy/base/public/domain.te:96 51 ' on line 3350:rity/selinux_adapter/sepolicy/base/public/domain.te:16:ERROR 'unrecognized character… 63 dos2unix ./sepolicy/base/public/domain.te 71 …nux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te:2:ERROR 'unknown typ… 73 …../base/security/selinux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te" 90 …e rule. You are advised to define the SELinux types in a file named **type.te** in the **/public**…
|
H A D | subsys-security-selinux-sample-domain.md | 24 2. In the **type.te** file, define the SELinux type **demo** in **SELinux tag u:r:demo:s0** to make… 56 2. In the **type.te** file, define the SELinux type **demo** in **SELinux tag u:r:demo:s0** to make… 83 2. In the **type.te** file, define the SELinux type **demo** in **SELinux tag u:r:demo:s0** to make… 105 2. Define **permissionmanager_hap** and **permissionmanager_hap_data_file** in **type.te** to make …
|
H A D | subsys-security-selinux-sample-file.md | 14 2. Define **system_lib_file** in **type.te** to make **u:object_r:system_lib_file:s0** valid. 32 2. Define **data_service_el0_file** in **type.te** to make **u:object_r:data_service_el0_file:s0** … 61 2. Define **proc_iomem_file** in **type.te** to make **u:object_r:proc_iomem_file:s0** valid.
|
H A D | subsys-security-selinux-sample-sa.md | 16 2. In the **type.te** file, add the type, for example, **isa_render_service**, to make the label va… 35 2. In the **type.te** file, add the type, for example, **hdf_thermal_interface_service**, to make t…
|
H A D | subsys-ai-nnrt-guide.md | 279 …ion to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdf_service.te` file: 285 …ation to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdfdomain.te` file: 291 …figuration to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/type.te` file: 297 …tion to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/hdf_devmgr.te` file: 306 …figuration to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/init.te` file: 312 …ation in the `base/security/selinux/sepolicy/ohos_policy/startup/init/public/chipset_init.te` file. 323 8. Create the `nnrt_host.te` configuration file. 331 # Create the `nnrt_host.te` file. 332 touch base/security/selinux/sepolicy/ohos_policy/drivers/peripheral/nnrt/vendor/nnrt_host.te 335 9. Write the following required permissions to the `nnrt_host.te` file:
|
H A D | subsys-security-selinux-develop-intro.md | 10 │ │ └── type1.te 12 │ │ └── type2.te 14 │ └── type3.te 24 | *.te | SELinux policy source file, which defines the types and **allow** and **neverallow** rules…
|
H A D | subsys-security-selinux-sample-param.md | 38 2. Add **init_svc_param** in **type.te** to make the label valid.
|
H A D | subsys-security-selinux-compile.md | 16 …_def.spt, glb_never_def.spt, mls, policy_cap, glb_te_def.spt, attributes, .te, glb_roles.spt, user…
|
/ohos5.0/foundation/ai/neural_network_runtime/example/drivers/ |
H A D | README_zh.md | 280 2. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdf_service.te```文件中新增配置: 286 3. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdfdomain.te```文件中新增配置: 292 4. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/type.te```文件中新增配置: 298 5. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/hdf_devmgr.te```文件中新增配置: 307 6. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/init.te```文件中新增配置: 313 7. 在```base/security/selinux/sepolicy/ohos_policy/startup/init/public/chipset_init.te```文件中作如下修改: 324 8. 新建```nnrt_host.te```配置文件: 332 # 创建nnrt_host.te文件 333 touch base/security/selinux/sepolicy/ohos_policy/drivers/peripheral/nnrt/vendor/nnrt_host.te 336 9. 将所需的权限写入```nnrt_host.te```文件中:
|
/ohos5.0/base/global/i18n_lite/tools/i18n-dat-tool/src/main/java/resource/ |
H A D | plural.txt | 62 te "", "= 1", "", "", "", ""
|
H A D | decimalPlurals.txt | 62 te "", "", "", "", "", ""
|
H A D | locales.txt | 411 te 412 te-IN
|
/ohos5.0/commonlibrary/rust/ylong_http/ylong_http_client/src/async_impl/conn/ |
H A D | http2.rs | 166 let te = te_ref.to_string()?; in remove_connection_specific_headers() localVariable 167 if te.as_str() != "trailers" { in remove_connection_specific_headers()
|
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/resourceschedule/background_task_mgr/system/ |
H A D | bgtaskmgr_service.te | 125 # from security_selinux_adapter\sepolicy\base\te\device_usage_stats_service.te
|