Home
last modified time | relevance | path

Searched refs:te (Results 1 – 25 of 83) sorted by relevance

1234

/ohos5.0/docs/zh-cn/device-dev/subsystems/
H A Dsubsys-security-selinux-faq.md9 …/updater/system.cil:3887 from ../../base/security/selinux_adapter/sepolicy/base/public/domain.te:96
36 ' on line 3350:rity/selinux_adapter/sepolicy/base/public/domain.te:16:ERROR 'unrecognized character…
48 dos2unix ./sepolicy/base/public/domain.te
56 …nux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te:2:ERROR 'unknown typ…
58 …../base/security/selinux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te"
75 排查是否在当前策略编译时不可见,将SELinux类型定义移到编译可见目录下,一般SELinux类型定义位置最好在public子目录下,且一般文件命名为type.te
H A Dsubsys-security-selinux-develop-intro.md10 │ │ └── type1.te
12 │ │ └── type2.te
14 │ └── type3.te
24 | *.te | SELinux策略文件,用于定义类型、配置allow策略、配置neverallow策略。 |
44 | glb_te_def.spt | te规则的全局宏定义,可用于简化策略语句。 |
H A Dsubsys-security-selinux-sample-file.md14 2. 在type.te中定义system_lib_file,使u:object_r:system_lib_file:s0是合法的。
31 2. 在type.te中定义data_service_el0_file,使u:object_r:data_service_el0_file:s0是合法的。
56 2. 在type.te中定义`proc_iomem_file`,使`u:object_r:proc_iomem_file:s0`是合法的。
H A Dsubsys-security-selinux-sample-domain.md24 2. 在type.te中定义SELinux标签u:r:demo:s0中的SELinux类型demo,使u:r:demo:s0是合法的。
56 2. 在type.te中定义SELinux标签u:r:demo:s0中的SELinux类型demo,使u:r:demo:s0是合法的。
83 2. 在type.te中定义SELinux标签u:r:demo:s0中的SELinux类型demo,使u:r:demo:s0是合法的。
101 2. 在type.te中定义`permissionmanager_hap`和`permissionmanager_hap_data_file`,使`u:r:permissionmanager_hap…
H A Dsubsys-ai-nnrt-guide.md279 2. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdf_service.te```文件中新增配置:
285 3. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdfdomain.te```文件中新增配置:
291 4. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/type.te```文件中新增配置:
297 5. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/hdf_devmgr.te```文件中新增配置:
306 6. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/init.te```文件中新增配置:
312 7. 在```base/security/selinux/sepolicy/ohos_policy/startup/init/public/chipset_init.te```文件中作如下修改:
323 8. 新建```nnrt_host.te```配置文件:
331 # 创建nnrt_host.te文件
332 touch base/security/selinux/sepolicy/ohos_policy/drivers/peripheral/nnrt/vendor/nnrt_host.te
335 9. 将所需的权限写入```nnrt_host.te```文件中:
H A Dsubsys-security-selinux-sample-sa.md16 2. 在type.te中定义对应的`sa_render_service`,使对应的标签合法。
35 2. 在type.te中定义对应的`hdf_thermal_interface_service`,使对应的标签合法。
H A Dsubsys-thermal_control.md185 …为触发热管控策略,先设置低温,再设置高温。使用```hidumper -s 3303 -a '-te [name] [num]'```指令上报模拟温度。其中name表示温度传感器名称,num表示该…
188 $ hidumper -s 3303 -a '-te battery 32000 charger 32000'
196 $ hidumper -s 3303 -a '-te battery 39000 charger 39000'
H A Dsubsys-security-selinux-sample-param.md38 2. 在type.te中定义对应的init_svc_param,使对应的标签合法。
H A Dsubsys-security-selinux-compile.md12 …_def.spt, glb_never_def.spt, mls, policy_cap, glb_te_def.spt, attributes, .te, glb_roles.spt, user…
H A Dsubsys-boot-init-sysparam.md109 … 为系统参数添加selinux标签,首先需要在文件/base/security/selinux_adapter/sepolicy/base/public/parameter.te中定义标签,例如:
121 …- 给init授权,允许map等操作,在文件/base/security/selinux/sepolicy/ohos_policy/startup/init/public/init.te中补充下面…
192 系统参数标签会在/base/security/selinux_adapter/sepolicy/base/public/parameter.te文件中定义:
H A Dsubsys-boot-init-service.md275 在base/security/selinux_adapter/sepolicy/base/public/type.te文件定义标签的作用域,如:
340 服务控制接口配置selinux,需要在init.te文件中添加该服务接口所需要的selinux权限,例如为init、samgr、hdf_devmgr等服务配置系统参数写权限:
/ohos5.0/docs/en/device-dev/subsystems/
H A Dsubsys-security-selinux-faq.md9 …/updater/system.cil:3887 from ../../base/security/selinux_adapter/sepolicy/base/public/domain.te:96
51 ' on line 3350:rity/selinux_adapter/sepolicy/base/public/domain.te:16:ERROR 'unrecognized character…
63 dos2unix ./sepolicy/base/public/domain.te
71 …nux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te:2:ERROR 'unknown typ…
73 …../base/security/selinux_adapter/sepolicy/ohos_policy/security/access_token/vendor/access_token.te"
90 …e rule. You are advised to define the SELinux types in a file named **type.te** in the **/public**…
H A Dsubsys-security-selinux-sample-domain.md24 2. In the **type.te** file, define the SELinux type **demo** in **SELinux tag u:r:demo:s0** to make…
56 2. In the **type.te** file, define the SELinux type **demo** in **SELinux tag u:r:demo:s0** to make…
83 2. In the **type.te** file, define the SELinux type **demo** in **SELinux tag u:r:demo:s0** to make…
105 2. Define **permissionmanager_hap** and **permissionmanager_hap_data_file** in **type.te** to make …
H A Dsubsys-security-selinux-sample-file.md14 2. Define **system_lib_file** in **type.te** to make **u:object_r:system_lib_file:s0** valid.
32 2. Define **data_service_el0_file** in **type.te** to make **u:object_r:data_service_el0_file:s0** …
61 2. Define **proc_iomem_file** in **type.te** to make **u:object_r:proc_iomem_file:s0** valid.
H A Dsubsys-security-selinux-sample-sa.md16 2. In the **type.te** file, add the type, for example, **isa_render_service**, to make the label va…
35 2. In the **type.te** file, add the type, for example, **hdf_thermal_interface_service**, to make t…
H A Dsubsys-ai-nnrt-guide.md279 …ion to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdf_service.te` file:
285 …ation to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdfdomain.te` file:
291 …figuration to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/type.te` file:
297 …tion to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/hdf_devmgr.te` file:
306 …figuration to the `base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/init.te` file:
312 …ation in the `base/security/selinux/sepolicy/ohos_policy/startup/init/public/chipset_init.te` file.
323 8. Create the `nnrt_host.te` configuration file.
331 # Create the `nnrt_host.te` file.
332 touch base/security/selinux/sepolicy/ohos_policy/drivers/peripheral/nnrt/vendor/nnrt_host.te
335 9. Write the following required permissions to the `nnrt_host.te` file:
H A Dsubsys-security-selinux-develop-intro.md10 │ │ └── type1.te
12 │ │ └── type2.te
14 │ └── type3.te
24 | *.te | SELinux policy source file, which defines the types and **allow** and **neverallow** rules…
H A Dsubsys-security-selinux-sample-param.md38 2. Add **init_svc_param** in **type.te** to make the label valid.
H A Dsubsys-security-selinux-compile.md16 …_def.spt, glb_never_def.spt, mls, policy_cap, glb_te_def.spt, attributes, .te, glb_roles.spt, user…
/ohos5.0/foundation/ai/neural_network_runtime/example/drivers/
H A DREADME_zh.md280 2. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdf_service.te```文件中新增配置:
286 3. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/hdfdomain.te```文件中新增配置:
292 4. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/public/type.te```文件中新增配置:
298 5. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/hdf_devmgr.te```文件中新增配置:
307 6. 在```base/security/selinux/sepolicy/ohos_policy/drivers/adapter/vendor/init.te```文件中新增配置:
313 7. 在```base/security/selinux/sepolicy/ohos_policy/startup/init/public/chipset_init.te```文件中作如下修改:
324 8. 新建```nnrt_host.te```配置文件:
332 # 创建nnrt_host.te文件
333 touch base/security/selinux/sepolicy/ohos_policy/drivers/peripheral/nnrt/vendor/nnrt_host.te
336 9. 将所需的权限写入```nnrt_host.te```文件中:
/ohos5.0/base/global/i18n_lite/tools/i18n-dat-tool/src/main/java/resource/
H A Dplural.txt62 te "", "= 1", "", "", "", ""
H A DdecimalPlurals.txt62 te "", "", "", "", "", ""
H A Dlocales.txt411 te
412 te-IN
/ohos5.0/commonlibrary/rust/ylong_http/ylong_http_client/src/async_impl/conn/
H A Dhttp2.rs166 let te = te_ref.to_string()?; in remove_connection_specific_headers() localVariable
167 if te.as_str() != "trailers" { in remove_connection_specific_headers()
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/resourceschedule/background_task_mgr/system/
H A Dbgtaskmgr_service.te125 # from security_selinux_adapter\sepolicy\base\te\device_usage_stats_service.te

1234