Mini Shell

Direktori : /usr/share/locale/zh_CN/LC_MESSAGES/
Upload File :
Current File : //usr/share/locale/zh_CN/LC_MESSAGES/selinux-python.mo

���$�,,�:�:%�:,%;,R;%;�;,�;�;I<IJ<I�<3�< =E3=:y=(�=�=�=d>^q>��>)�?�@�@M�@<AMUA�AH�AG�AFBG^B�BQ�BCJ'C
rC}C"�CN�C�CD.D4@D$uD!�D%�DM�D0EAEJE/bE�E�E�E�E�E�EFF<+F'hF"�F��FQHeH!|H,�H!�H,�HI'IFI&LIsI�I2�I�I�I�I1�I)JBJ2YJ#�J1�J�J�J�K��K�DMN(N=1NoN �N�N�N�N!�N+O+1O]O"xO!�O(�O$�O-P%9P(_P1�P@�P;�P;7Q*sQ2�Q1�Q%R$)RNR=lR.�R)�R1S5SRS/rS+�S3�S$T2'T2ZT!�T�T%�T�T(
U 6U WUxU(�U�U$�U3�U./V^V%|V$�V$�V2�VW>W![W}W�W'�W�W�WX4XNXlX�X�X�X�X1�X$Y>YUY"oY�Y�Y �Y �YZ%Z@Z YZzZ�Z$�Z3�Z.[7[%U[${[�[�[#�[2�[-/\]\#z\�\�\*�\5]9]X]!w](�]!�]!�]7^7>^&v^�^$�^/�^/_E<_E�_4�_;�_9`W`?q`-�`)�`)	a?3a?sa.�a5�a)b)Bb?lb?�b.�b5c)Qc){c?�c?�c.%d5Td$�d!�d�d�dee
&eJ4ee3�e�e�e�e%
f3fOfkf-�f*�f.�fVg_gsgg�g�g�g�g�g(�ghAhNVhO�h\�h;RiH�iA�iNj1hj!�j)�j�j�j�jk	k>"k6ak^�kE�k:=l-xl;�l(�l0m+<mXhm?�mDnFn'Wn'n�n�n�nV�nQ/ob�oi�oNpcp jp;�p�p�p�p		q	qq%8q�^q�+r �s-�st##t;Gt"�to�tu(%u.Nu
}u4�uM�u)v8v>v4Pv)�v/�v�v�vww?0w'pw�w+�w�w�wx,x&Hxox�x'�x�x�x�x&�x&y&Fymy�y�y	�yO�yzz+.zZz
bzmz�z4�z�z�z{ {-{:{N{3i{�{�{�{�{�{|"&|I|XR|
�|
�|�|'�|<�|#9}
]}h}	|}	�}�}�}	�}�}
�}�}��}�~D�~�~3�~'0+X)�D�)�$�$B�$g� �� ��!΀�#�+��2�PP�d�Ly�ƂJ�,�UL���%��݃���M*�x����3 �7T�������!���
����+�O2�������6��5�C�Ba�����ˇ·��(�@�R�[�g�����O��
߈�$��� �	,�6�'G�#o�;��"ω8�+�2�
;�I�O�tX�0͊(��3'�[�*k�����&΋���" �C�^�d�k�lz���	��b��
�&�<�U�l��������2ю�
�o$�����ɏ֏����
�*�:�K�a�r�:��"ː7�&�E�W�_�n�}�J��Jϑ��'��2ޒ
�m�U��_�EC�s��4��T2�E��.͕5��T2�	��(��$��ߖ���("�
K�	Y�Xc�h��_%����V$�{�����3��
�E��8�$�+�?�W�p�=��
țA֛U�:n�9��,���1!�)S�'}�'��-͝���%�6�'<�d�����������˞�)�+�&F�'m���0��ן
ݟ�]�f�u�0y�%��;С"�</�El�0��3�E�	]�g�s�������4��#�
��	�'(�
P�[�q�	��J��1�-�-D�Er�,�����/�+H�t���
��������<æ7�78�p���3��cȧF,�s�������E�=e�%��<ɩ7�>�J�
`�n���������%��$��#��!�3��Q��(
�6�+T�$���� ��٭@�@1�@r�/��%�F	�7P�(����ůYٯR3����L�P�W�<^���C����<�<I���:��۳N��F�E\�����´<��;�U�6h�����(ݵB�I�]�j�5~���ɶ	�	���	�	�#�;;� w������?�X�q�!����$͹����("�K�_�9y���	ֺ̺(ݺ��,/�\�-x������ɻ�u������$��B۾�/�	K�U�t�"��*��*׿��!8�&Z�$��0��#�'��7#�?[�:��:�$�46�4k���"����9��*4�%_�-������,��(�0?�"p�.��.�����%�E�%^�����������"
�/0�*`�����!����*�-�D�Z�y������������$�@�\�x�����'�������!"�D�]�p�����������	��"7�/Z�*������!��
�"�"A�/d�*����!�����$,�6Q�����"����"�"+�8N�8��"����"��3 �3T�F��F��3�?J�����6��.��.)�.X�D��D��.�:@�.{�.��D��D�.c�:��.��.��D+�Dp�.��:���#<�`�w�������S���3�N�j���%��������$�$3�.X�E������������"�5�*B�	m�?w�Q��6	�?@�-��6��3��<�%V�!|���������	����9��<*�Wg�0��/��$ �0E�!v�5��/��H��*G�<r�����������K"�Hn�K��K�O�_�$f�-��������	����$)��N�}��!c�*������C��%�cE���'��'���0�DN�������2����$�	9�C�Y�l�?��!����#���=�S�o�������������$-�!R�!t���������E��*�1�$D�i�p�}���6���������*�7�G�/Z�	�������������!�C(�l�	y�����C����	��
,�
7�B�U�
Y�d�i�x����;�NK���*��!��*�%,�CR����������(�!G�i�����~��<"�C_���<����=
�K�Ng���%�����(�<;�x�{��!�+*�V�c�p�����������-��[��R�Y�f�$y�$��-��-���1�C�G�`�s�3������������	��K�	O�Y�a�}�	������%����B��!1�8S���	��������_��0�!I�3k���%����'�/�>�"X�{�������o��� ���g�1�L�[�p���������4�(�=�lL���������1�C�R�d�u��� ��6���?�W�s���������I��I���F��9�	E�TO�H��T�<B�u�9��B/6r!�'�H�<Ib{���-���U^XK�~3����.�
!-/�](AZ1t	�;�F�232f$���1�0�(/(X3������.5BOf|&�,��)
	(4	]	2j	�	�	�	i�	?
O
�S
(M9v*�0�@#M3qA���	


,
49
#n
�
�
�
"�
	�
�
�
	D/['�'�?�*F!Uw�,��%�&**.-Y'���*�H�6H��f�6
1D*v:�7�$1>NRY]&d%�$�	����\�+C����c�+OQ7K��z��'a��6is�M)ex_�������]�},V�=���I�����Z�DN�S"����W'E.��R����9��w��v���Dl��w�T��)�0:|u��zk2��L���J�}�G[��h$�PLot�|
�Af�E�>P`n3��"��T8�*	�QWP�4d���Ubl����7�aQ8�3q���K�~���	>���9_�6�e�r�t-�����\�!)T���L�mp5f�y*"�'�@#��I:��8\^�O�Ou �j`W�����&2�m���x�?�I��4Rd�����jjp�V�S������w0�b#��!sk��(v:,C����ifp�o+�eU��2�X�n��i�~cq�x9��/�����H
���g��<��������{]|��a
��%��
�-�5�?�y�Y���SB��b���34�X&XlM�s���?H;�H�M�<����r�Y��� �U�,�/@��Z�� ��g���-���~�	[�od��=��>�ug�^���J����[�N�A]#���t/{�R�q��������1��k`Z�N���(@v���Y5m_����}&��r�%B����J;$�C�6�.��<
��F�E���1�;yG�1Dh����cF^G{��(K�%!�*Vz��0�h��B�7$�FA���=��.n
��
Compile test for %s failed.

Compile test for %s has not run. %s

Compiling of %s interface is not supported.
SELinux Distribution fcontext Equivalence 

SELinux Local fcontext Equivalence 
%s is not a valid domain'%s' policy modules require existing domains-- Allowed %s [ %s ]-a option can not be used with '%s' domains. Read usage for more details.-d option can not be used with '%s' domains. Read usage for more details.-t option can not be used with '%s' domains. Read usage for more details.-w option can not be used with the --newtype option<b>...SELECT TO VIEW DATA...</b><b>Deny all processes from ptracing or debugging other processes?</b><b>Disable ability to run unconfined system processes?</b><b>Disable all permissive processes?</b><b>System Configuration</b><b>System Mode</b><operation> File Labeling for <selected domain>. File labels will be created when update is applied.<operation> Network Port for <selected domain>.  Ports will be created when update is applied.<small>
To change from Disabled to Enforcing mode
- Change the system mode from Disabled to Permissive
- Reboot, so that the system can relabel
- Once the system is working as planned
  * Change the system mode to Enforcing</small>
A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them.  Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed.ActionAddAdd File Equivalency Mapping. Mapping will be created when update is applied.Add File Labeling for %sAdd File Labeling for %s. File labels will be created when update is applied.Add Login MappingAdd Login Mapping. Login Mapping will be created when update is applied.Add Login Mapping. User Mapping will be created when Update is applied.Add Network Port for %sAdd Network Port for %s.  Ports will be created when update is applied.Add SELinux File EquivalencyAdd SELinux User Role. SELinux user roles will be created when update is applied.Add SELinux UsersAdd User Roles. SELinux User Roles will be created when Update is applied.Add a fileAdd a moduleAdd a record of the %s object typeAdd file Equivalence Mapping.  Mapping will be created when Update is applied.Add file equiv labeling.Add file labeling for %sAdd login mappingAdd new %(TYPE)s file path for '%(DOMAIN)s' domains.Add new File Equivalence definition.Add new Login Mapping definition.Add new SELinux User/Role definition.Add new port definition to which the '%(APP)s' domain is allowed to %(PERM)s.Add ports for %sAdd userAddr %s already definedAddr %s is defined in policy, cannot be deletedAddr %s is not definedAdministrator Login User RoleAdvanced <<Advanced >>Advanced Search <<Advanced Search >>All domainsAllow {subject} to {rest}Alternate SELinux policy, defaults to /sys/fs/selinux/policyAlternate root directory, defaults to /Alternative root needs to be setupAn unconfined domain is a process label that allows the process to do what it wants, without SELinux interfering.  Applications started at boot by the init system that SELinux do not have defined SELinux policy will run as unconfined if this module is enabled.  Disabling it means all daemons will now be confined.  To disable the unconfined_t user you must first remove unconfined_t from the users/login screens.Analyzing Policy...Application File TypesApplication Transitions From '%s'Application Transitions From 'select domain'Application Transitions Into '%s'Application Transitions Into 'select domain'ApplicationsApplications - Advanced SearchApplyBad format {filename}: Record {record}Boolean
EnabledBoolean %s Allow RulesBoolean %s is defined in policy, cannot be deletedBoolean %s is not definedBooleansBrowseBrowse to select the file/directory for labeling.Builtin Permissive TypesCalling Process DomainCan not combine +/- with other types of categoriesCan not have multiple sensitivitiesCan not modify sensitivity levels using '+' on %sCancelCannot read policy store.Changing the policy type will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system.  Do you wish to continue?Changing to SELinux disabled requires a reboot.  It is not recommended.  If you later decide to turn SELinux back on, the system will be required to relabel.  If you just want to see if SELinux is causing a problem on your system, you can go to permissive mode which will only log errors and not enforce SELinux policy.  Permissive mode does not require a reboot.  Do you wish to continue?Changing to SELinux enabled will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system.  Do you wish to continue?ClassCommand required for this type of policyCommit all changes in your current transaction to the server.Compiling %s interfaceConfined Root Administrator RoleContextCould not add SELinux user %sCould not add addr %sCould not add file context for %sCould not add ibendport {ibdev_name}/{port}Could not add ibpkey {subnet_prefix}/{pkey}Could not add interface %sCould not add login mapping for %sCould not add port {proto}/{port}Could not add prefix {prefix} for {role}Could not add role {role} for {name}Could not check if SELinux user %s is definedCould not check if addr %s is definedCould not check if boolean %s is definedCould not check if file context for %s is definedCould not check if ibendport {ibdev_name}/{ibendport} is definedCould not check if ibendport {ibdev_name}/{port} is definedCould not check if ibpkey {subnet_prefix}/{pkey} is definedCould not check if interface %s is definedCould not check if login mapping for %s is definedCould not check if port {proto}/{port} is definedCould not commit semanage transactionCould not create SELinux user for %sCould not create a key for %sCould not create a key for ibendport {ibdev_name}/{ibendport}Could not create a key for {ibdev_name}/{port}Could not create a key for {proto}/{port}Could not create a key for {subnet_prefix}/{pkey}Could not create addr for %sCould not create context for %sCould not create context for {ibendport}/{port}Could not create context for {proto}/{port}Could not create context for {subnet_prefix}/{pkey}Could not create file context for %sCould not create ibendport for {ibdev_name}/{port}Could not create ibpkey for {subnet_prefix}/{pkey}Could not create interface for %sCould not create key for %sCould not create login mapping for %sCould not create module keyCould not create port for {proto}/{port}Could not create semanage handleCould not delete SELinux user %sCould not delete addr %sCould not delete all interface  mappingsCould not delete boolean %sCould not delete file context for %sCould not delete ibendport {ibdev_name}/{ibendport}Could not delete ibpkey {subnet_prefix}/{pkey}Could not delete interface %sCould not delete login mapping for %sCould not delete port {proto}/{port}Could not delete the file context %sCould not delete the ibendport {ibdev_name}/{port}Could not delete the ibpkey %sCould not delete the port %sCould not deleteall node mappingsCould not disable module %sCould not enable module %sCould not establish semanage connectionCould not extract key for %sCould not get module enabledCould not get module lang_extCould not get module nameCould not get module priorityCould not list SELinux modulesCould not list SELinux usersCould not list addrsCould not list booleansCould not list file contextsCould not list file contexts for home directoriesCould not list ibendportsCould not list ibpkeysCould not list interfacesCould not list local file contextsCould not list login mappingsCould not list portsCould not list roles for user %sCould not list the file contextsCould not list the ibendportsCould not list the ibpkeysCould not list the portsCould not modify SELinux user %sCould not modify addr %sCould not modify boolean %sCould not modify file context for %sCould not modify ibendport {ibdev_name}/{ibendport}Could not modify ibpkey {subnet_prefix}/{pkey}Could not modify interface %sCould not modify login mapping for %sCould not modify port {proto}/{port}Could not query addr %sCould not query file context %sCould not query file context for %sCould not query ibendport {ibdev_name}/{ibendport}Could not query ibpkey {subnet_prefix}/{pkey}Could not query interface %sCould not query port {proto}/{port}Could not query seuser for %sCould not query user for %sCould not remove module %s (remove failed)Could not remove permissive domain %s (remove failed)Could not set MLS level for %sCould not set MLS range for %sCould not set SELinux user for %sCould not set active value of boolean %sCould not set addr context for %sCould not set file context for %sCould not set ibendport context for {ibdev_name}/{port}Could not set ibpkey context for {subnet_prefix}/{pkey}Could not set interface context for %sCould not set mask for %sCould not set message context for %sCould not set mls fields in addr context for %sCould not set mls fields in file context for %sCould not set mls fields in ibendport context for {ibdev_name}/{port}Could not set mls fields in ibpkey context for {subnet_prefix}/{pkey}Could not set mls fields in interface context for %sCould not set mls fields in port context for {proto}/{port}Could not set module key nameCould not set name for %sCould not set permissive domain %s (module installation failed)Could not set port context for {proto}/{port}Could not set role in addr context for %sCould not set role in file context for %sCould not set role in ibendport context for {ibdev_name}/{port}Could not set role in ibpkey context for {subnet_prefix}/{pkey}Could not set role in interface context for %sCould not set role in port context for {proto}/{port}Could not set type in addr context for %sCould not set type in file context for %sCould not set type in ibendport context for {ibdev_name}/{port}Could not set type in ibpkey context for {subnet_prefix}/{pkey}Could not set type in interface context for %sCould not set type in port context for {proto}/{port}Could not set user in addr context for %sCould not set user in file context for %sCould not set user in ibendport context for {ibdev_name}/{port}Could not set user in ibpkey context for {subnet_prefix}/{pkey}Could not set user in interface context for %sCould not set user in port context for {proto}/{port}Could not start semanage transactionCould not test MLS enabled statusCreated the following files:
Customized Permissive TypesDBUS System DaemonDefaultDefault LevelDefault SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only)DeleteDelete %(TYPE)s file paths for '%(DOMAIN)s' domain.Delete Modified File LabelingDelete Modified PortsDelete Modified Users Mapping.Delete a record of the %s object typeDelete file equiv labeling.Delete file labeling for %sDelete login mappingDelete modified File Equivalence definitions.Delete modified Login Mapping definitions.Delete modified SELinux User/Role definitions.Delete modified port definitions to which the '%(APP)s' domain is allowed to %(PERM)s.Delete ports for %sDelete userDescriptionDesktop Login User RoleDestination ClassDisableDisable a moduleDisable the booleanDisable/Enable dontaudit rules in policyDisabledDisplay applications that can transition into or out of the '%s'.Display applications that can transition into or out of the 'selected domain'.Display boolean information that can be used to modify the policy for the '%s'.Display boolean information that can be used to modify the policy for the 'selected domain'.Display file type information that can be used by the '%s'.Display file type information that can be used by the 'selected domain'.Display network ports to which the '%s' can connect or listen to.Display network ports to which the 'selected domain' can connect or listen to.Do not print heading when listing %s object typesDo not reload policy after commitDomain name(s) of man pages to be createdEnableEnable a moduleEnable the booleanEnabledEnforcingEnter Default Level for SELinux User to login with. Default s0Enter MLS/MCS Range for this SELinux User.
s0-s0:c1023Enter MLS/MCS Range for this login User.  Defaults to the range for the Selected SELinux User.Enter SELinux role(s) to which the administror domain will transitionEnter SELinux user(s) which will transition to this domainEnter domain type which you will be extendingEnter domain(s) which this confined admin will administrateEnter interface names, you wish to queryEnter the MLS Label to assign to this file path.Enter the MLS Label to assign to this port.Enter the login user name of the user to which you wish to add SELinux User confinement.Enter the path to which you want to setup an equivalence label.Enter the port number or range to which you want to add a port type.Equivalence PathEquivalence class for %s already existsEquivalence class for %s does not existEquivalence: %sExecutable FileExecutable FilesExecutables which will transition to '%s', when executing selected domains entrypoint.Executables which will transition to a different domain, when '%s' executes them.Executables which will transition to a different domain, when the 'selected domain' executes them.Executables which will transition to the 'selected domain', when executing a selected domains entrypoint.Existing Domain TypeExportExport system settings to a fileExtract customizable commands, for use within a transactionFailed to read %s policy fileFile Contexts fileFile EquivalenceFile NameFile PathFile Transitions From '%s'File Transitions From 'select domain'File Transitions define what happens when the current domain creates the content of a particular class in a directory of the destination type. Optionally a file name could be specified for the transition.File Type. This is used with fcontext. Requires a file type as shown in the mode field by ls, e.g. use d to match only directories or f to match only regular files. The following file type options can be passed: f (regular file), d (directory), c (character device), b (block device), s (socket), l (symbolic link), p (named pipe). If you do not specify a file type, the file type will default to "all files".File Types defined for the '%s'.File Types defined for the 'selected domain'.File class: %sFile context for %s already definedFile context for %s is defined in policy, cannot be deletedFile context for %s is not definedFile equivalence cause the system to label content under the new path as if it were under the equivalence path.File path : %sFile path used to enter the '%s' domain.File path used to enter the 'selected domain'.File path: %sFile spec %s conflicts with equivalency rule '%s %s'File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' insteadFile specification can not include spacesFilesFiles EquivalenceFiles by '%s' with transitions to a different label.Files to which the '%s' domain can write.Files to which the 'selected domain' can write.FilterFound circular interface classGenerate '%s' policyGenerate '%s' policy Generate HTML man pages structure for selected SELinux man pageGenerate SELinux Policy module templateGenerate SELinux man pagesGraphical User Interface for SELinux PolicyHelp: Application Types PageHelp: Booleans PageHelp: Executable Files PageHelp: File Equivalence PageHelp: Inbound Network Connections PageHelp: Lockdown PageHelp: Login PageHelp: Outbound Network Connections PageHelp: SELinux User PageHelp: Start PageHelp: Systems PageHelp: Transition application file PageHelp: Transition from application PageHelp: Transition into application PageHelp: Writable Files PageIB Device NameIB device name is requiredIMPORTANTIf-Then-Else rules written in policy that can
allow alternative access control.ImportImport local customizationsImport system settings from another machineInboundInput fileInterface %s already definedInterface %s does not exist.Interface %s is defined in policy, cannot be deletedInterface %s is not definedInterface fileInternet Services DaemonInvalid PkeyInvalid PortInvalid Port NumberInvalid file specificationInvalid priority %d (needs to be between 1 and 999)LabelingLanguageLinux Group %s does not existLinux User %s does not existList %s local customizationsList SELinux Policy interfacesList records of the %s object typeLockdownLockdown the SELinux System.
This screen can be used to turn up the SELinux Protections.Login MappingLogin NameLogin Name : %sLogin mapping for %s is already definedLogin mapping for %s is defined in policy, cannot be deletedLogin mapping for %s is not definedLogin nameLoss of data DialogMCS LevelMCS RangeMISSING FILE PATHMLSMLS RangeMLS/MLS/MCS RangeMLS/MCS Range: %sMLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0.Make Path RecursiveManage SELinux confined users (Roles and levels for an SELinux user)Manage SELinux policy modulesManage booleans to selectively enable functionalityManage file context mapping definitionsManage infiniband end port type definitionsManage infiniband ibpkey type definitionsManage login mappings between linux users and SELinux confined usersManage network interface type definitionsManage network node type definitionsManage network port type definitionsManage process type enforcement modeManage the SELinux configurationMinimal Terminal Login User RoleMinimal X Windows Login User RoleMislabeled files existMissing interface definition for %sModifyModify %(TYPE)s file path for '%(DOMAIN)s' domain. Only bolded items in the list can be selected, this indicates they were modified previously.Modify File Equivalency Mapping. Mapping will be created when update is applied.Modify File Labeling for %s. File labels will be created when update is applied.Modify Login MappingModify Login Mapping. Login Mapping will be modified when Update is applied.Modify Network Port for %sModify Network Port for %s.  Ports will be created when update is applied.Modify SELinux File EquivalencyModify SELinux User Role. SELinux user roles will be modified when update is applied.Modify SELinux UsersModify a record of the %s object typeModify file equiv labeling.Modify file labeling for %sModify login mappingModify port definitions to which the '%(APP)s' domain is allowed to %(PERM)s.Modify ports for %sModify selected modified File Equivalence definitions. Only bolded items in the list can be selected, this indicates they were modified previously.Modify selected modified Login Mapping definitions.Modify selected modified SELinux User/Role definitions.Modify userModule NameModule does not exist: %s Module information for a new typeMore DetailsMore TypesMore...NameName for the specified infiniband end port.Name must be alphanumeric with no spaces. Consider using option "-n MODULENAME"NetworkNetwork MaskNetwork Port DefinitionsNetwork Ports to which the '%s' is allowed to connect.Network Ports to which the '%s' is allowed to listen.Network Ports to which the 'selected domain' is allowed to connect.Network Ports to which the 'selected domain' is allowed to listen.Network ports: %sNetwork protocol: %sNoNo SELinux Policy installedNode Address is requiredNot yet implementedOnly Daemon apps can use an init script.Options Error %s OutboundOutput fileOutput local customizationsPathPath  Path to be labeled (may be in the form of a Perl compatible regular expression)PermissivePkey NumberPolicy types which require a commandPortPort NumberPort TypePort is requiredPort number must be between 1 and 65536Port {proto}/{port} already definedPort {proto}/{port} is defined in policy, cannot be deletedPort {proto}/{port} is not definedPorts must be numbers or ranges of numbers from 1 to %d PrefixPriorityProcess TypesProtoProtocolProtocol for the specified port (tcp|udp|dccp|sctp) or internet protocol version for the specified node (ipv4|ipv6).Protocol has to be one of udp, tcp, dccp or sctpQuery SELinux policy network informationRelabel all files back to system defaults on rebootRemove a moduleRemove all %s objects local customizationsRequires at least one categoryRequires prefix or rolesRequires prefix, roles, level or rangeRequires setypeRequires setype or serangeRequires setype, serange or seuserRequires seuser or serangeRetryRevertRevert ChangesRevert button will launch a dialog window which allows you to revert changes within the current transaction.Review the updates you have made before committing them to the system.  To reset an item, uncheck the checkbox.  All items checked will be updated in the system when you select update.Roles: %sRun restorecon on %(PATH)s to change its type from %(CUR_CONTEXT)s to the default %(DEF_CONTEXT)s?SELinux Application TypeSELinux ConfigurationSELinux Destination TypeSELinux Directory TypeSELinux File LabelSELinux File TypeSELinux IB End Port TypeSELinux IB Pkey TypeSELinux InterfaceSELinux MLS Label you wish to assign to this path.SELinux Port TypeSELinux RolesSELinux Roles. You must enclose multiple roles within quotes, separate by spaces. Or specify -R multiple times.SELinux Type for the objectSELinux Type is requiredSELinux UserSELinux User : %sSELinux User NameSELinux User: %sSELinux UsernameSELinux UsersSELinux booleanSELinux fcontextSELinux file type: %sSELinux name: %sSELinux node type is requiredSELinux policy is not managed or store cannot be accessed.SELinux user %s is already definedSELinux user %s is defined in policy, cannot be deletedSELinux user %s is not definedSELinux user nameSandboxSave to UpdateSave to updateSelectSelect <b>tcp</b> if the port type should be assigned to tcp port numbers.Select <b>udp</b> if the port type should be assigned to udp port numbers.Select Make Path Recursive if you want to apply this label to all children of the specified directory path. objects under the directory to have this label.Select a priority for module operationsSelect an alternate SELinux Policy Store to manageSelect domainSelect file equivalence labeling to delete. File equivalence labeling will be deleted when update is applied.Select file labeling to delete. File labeling will be deleted when update is applied.Select login user mapping to delete. Login user mapping will be deleted when update is applied.Select ports to delete. Ports will be deleted when update is applied.Select the SELinux User to assign to this login user.  Login users by default get assigned by the __default__ user.Select the SELinux file type to assign to this path.Select the file class to which this label will be applied.  Defaults to all classes.Select the port type you want to assign to the specified port number.Select the system mode for the current sessionSelect the system mode when the system first boots upSelect users mapping to delete.Users mapping will be deleted when update is applied.Select...Semanage transaction already in progressSemanage transaction not in progressServiceSetup ScriptShow Modified OnlyShow mislabeled files onlyShow ports defined for this SELinux typeSource DomainSpec fileSpecify a new SELinux user name.  By convention SELinux User names usually end in an _u.Specify the MLS Range for this user to login in with.  Defaults to the selected SELinux Users MLS Range.Specify the default level that you would like this SELinux user to login with.  Defaults to s0.Specify the mapping between the new path and the equivalence path.  Everything under this new path will be labeled as if they were under the equivalence path.Specify the path using regular expressions that you would like to modify the labeling.Standard Init DaemonStateSubnet Prefix is requiredSubnet prefix for  the specified infiniband ibpkey.Subnet_PrefixSubstitute %s is not valid. Substitute is not allowed to end with '/'Substitute target path with sourcepath when generating default label. This is used with fcontext. Requires source and target path arguments. The context labeling for the target subtree is made equivalent to that defined for the source.SystemSystem Policy Type:System Status: DisabledSystem Status: EnforcingSystem Status: PermissiveTarget %s is not valid. Target is not allowed to end with '/'Target DomainThe entry '%s' is not a valid path.  Paths must begin with a '/'.The entry that was entered is incorrect.  Please try again in the ex:/.../... format.To disable this transition, go to the %sBoolean section%s.To enable this transition, go to the %sBoolean section%s.To make this policy package active, execute:TransitionsTypeType %s is invalid, must be a file or device typeType %s is invalid, must be a ibpkey typeType %s is invalid, must be a node typeType %s is invalid, must be a port typeType %s is invalid, must be an ibendport typeType Enforcement fileType field requiredType is requiredTypesUSER Types automatically get a tmp typeUnknown or missing protocolUpdateUpdate ChangesUsage %s -LUsage %s -L -l userUsage %s -d File ...Usage %s -l -d user ...Usage %s -l CATEGORY user ...Usage %s -l [[+|-]CATEGORY],...] user ...Usage %s CATEGORY File ...Usage %s [[+|-]CATEGORY],...] File ...Use -- to end option list.  For exampleUser ApplicationUser Role types can not be assigned executables.UsersValid Types:
Web Application/Script (CGI)With this flag, alternative root path needs to include file context files and policy.xml fileWritable filesYesYou are attempting to close the application without applying your changes.
    *    To apply changes you have made during this session, click No and click Update.
    *    To leave the application without applying your changes, click Yes.  All changes that you have made during this session will be lost.You must add at least one role for %sYou must enter a name for your policy module for your '%s'.You must enter a valid policy typeYou must enter the executable path for your confined processYou must regenerate interface info by running /usr/bin/sepolgen-ifgenYou must specify one of the following values: %sYou need to define a new type which ends with: 
 %sYou need to install policycoreutils-gui package to use the gui optionall filesapplicationblock devicebooleanboolean to get descriptioncharacter devicechcat -- -CompanyConfidential /docs/businessplan.odtchcat -l +CompanyConfidential jusercommandsconnectdirectorydontaudit requires either 'on' or 'off'executableexecutable to confineget all booleans descriptionsibendportibendport {ibdev_name}/{ibendport} is defined in policy, cannot be deletedibendport {ibdev_name}/{ibendport} is not definedibendport {ibdev_name}/{port} already definedibpkey {subnet_prefix}/{pkey} already definedibpkey {subnet_prefix}/{pkey} is defined in policy, cannot be deletedibpkey {subnet_prefix}/{pkey} is not definedinterface_speclist all SELinux port typeslisten for inbound connectionslogin_name | %%groupnamemanage_krb5_rcache must be a boolean value name of policy to generatename of the OS for man pagesnamed pipenodeoffonpath in which the generated SELinux man pages will be storedpath in which the generated policy files will be storedpath to which the confined processes will need to writepkey | pkey_rangeport | port_rangequery SELinux Policy to see description of booleansquery SELinux Policy to see how a source process domain can transition to the target process domainquery SELinux policy to see if domains can communicate with each otherradiobuttonregular fileselinux_namesemanage is used to configure certain elements of SELinux policy with-out requiring modification or recompilation from policy source.semanage permissive: error: the following argument is required: type
sepolicy generate: error: one of the arguments %s is requiredshow SELinux type related to the portshow ports to which this application can bind and/or connectshow ports to which this domain can bind and/or connectsocket filesource process domainsymbolic linktarget process domaintcptypeudpunknownuse_kerberos must be a boolean value use_resolve must be a boolean value use_syslog must be a boolean value writable{target} is already in {category}{target} is not in {category}Project-Id-Version: PACKAGE VERSION
Report-Msgid-Bugs-To: 
PO-Revision-Date: 2023-09-09 11:21+0000
Last-Translator: Tony Fu <tfu@redhat.com>
Language-Team: Chinese (Simplified) <https://translate.fedoraproject.org/projects/selinux/python/zh_CN/>
Language: zh_CN
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=1; plural=0;
X-Generator: Weblate 4.18.2

%s 编译测试失败。

%s 的编译测试还没有运行。%s

不支持编译 %s 接口。
SELinux Distribution fcontext Equivalence

SELinux Local fcontext Equivalence
%s 不是有效域'%s' 策略模块需要已有域-- 允许的 %s [ %s ]在 '%s' 域中不能使用 -a 选项。详情请阅读用法。在 '%s' 域中不能使用 -d 选项。详情请阅读用法。在 '%s' 域中不能使用 -t 选项。详情请阅读用法。-w 选项不能与 --newtype 选项一同使用<b>...选择要查看的数据...</b><b>禁用所有 ptracing 或者 debugging 其他进程的进程?</b><b>禁用可运行未限制系统进程的功能?</b><b>禁用所有 permissive 进程?</b><b>系统配置</b><b>系统模式</b><operation> File Labeling for <selected domain>。应用此更新时生成文件标签。<operation> Network Port for <selected domain>。应用此更新是生成端口。<small>
从 Disabled 改为 Enforcing 模式
- 将系统模式从 Disabled 改为 Permissive
- 重启以便重新标记系统
- 系统如预期工作后
  * 将系统模式改为 Enforcing</small>
Permissive 域是一个进程标签,可允许进程执行其想要的操作,SELinux 只记录拒绝的操作但不会强制其执行。通常 permissive 域代表实验性策略,禁用该模块将导致 SELinux 拒绝对某个本应允许域的访问。动作添加添加文件等价映射。应用更新时将生成映射。为 %s 添加文件标签为 %s 添加文件标签。应用更新时将生成文件标签。添加登录映射添加登录映射。应用更新时会生成登录映射。添加登录映射。应用更新时将生成用户映射。为 %s 添加网络端口为 %s 添加网络端口。应用更新时生成端口。添加 SELinux 文件等价添加 SELinux 用户角色。应用更新时将生成 SELinux 用户角色。添加 SELinux 用户提交用户角色。应用更新时将生成 SELinux 用户角色。添加文件删除一个模块添加 %s 对象类型的记录添加文件等价映射。应用更新时将生成映射。添加文件等价标签。为 %s 添加文件标签添加登录映射为 '%(DOMAIN)s' 域添加新 %(TYPE)s 文件路径。添加新文件等价定义。添加新登录映射定义。添加新 SELinux 用户/角色定义。添加新的端口定义以便 %(PERM)s 可允许 '%(APP)s' 域。为 %s 添加端口添加用户地址 %s 已定义已在策略中定义了 addr %s,无法将其删除没有定义 addr %s管理员登录用户角色高级 <<高级 >>高级搜索 <<高级搜索 >>所有域允许 {subject} {rest}备选的 SELinux 策略,默认至 /sys/fs/selinux/policy备选 root 目录,默认为 /需要设置可替换 root未限制的域是一个进程标签,可允许进程执行其想要的操作而没有任何 SELinux 干预。引导时由 init system 启动且没有 SELinux 策略定义的程序,如果已启用该模块,则将作为未限制程序运行。禁用它意味着限制将限制所有守护进程。要禁用 unconfined_t 用户,您必须首先在用户/登录页面中移除 unconfined_t。正在分析策略......应用程序文件类型由 '%s' 转换为应用程序由‘选择域’转换的程序应用程序转换为 '%s'应用程序转换为‘所选域’应用程序应用程序 - 高级搜索应用格式错误 {filename}: 记录 {record}布尔值
已启用布尔值 %s 允许规则已在策略中定义了布尔值 %s,无法将其删除尚未定义布尔值 %s布尔值浏览浏览选择要标记的文件/目录。内嵌 Permissive 类型调用进程域无法把 +/- 和其它类型的类别相连不能有多个 sensitivity无法使用 '+' 在 %s 上修改敏感级别取消无法读取策略存储。更改策略类型将导致在下一次引导时重新标记整个文件系统。重新标记需要一定的时间,具体要看文件系统的大小。您要继续吗?将 SELinux 改为禁用的状态需要重启方可生效。不推荐使用此选项。如果您以后决定重新启用 SELinux,则需要重新标记该系统。如果您要看是否因为 SELinux 造成您系统中的错误,您可以选择 permissive 模式,这个模式只记录出错信息,且不强制执行 SELinux 策略。Permissive 策略不要求重启。您要继续吗?更改为启用 SELinux 将导致在下一次引导时重新标记整个文件系统。重新标记需要一定的时间,具体要看文件系统的大小。您要继续吗?等级对于此类型策略所需的命令将您在当前转换过程中的所有更改提交到服务器。编译 %s 接口受限 Root 管理员角色上下文无法添加 SELinux 用户 %s无法添加 addr %s无法为 %s 添加文件上下文无法添加 ibendport {ibdev_name}/{port}无法添加 ibpkey {subnet_prefix}/{pkey}无法添加接口 %s无法为 %s 添加登录映射无法添加端口 {proto}/{port}无法为 {role} 添加前缀 {prefix}无法为 {name} 添加角色 {role}无法检查是否已定义了 SELinux 用户 %s无法检查是否定义了 addr %s无法检查是否已定义布尔值 %s如果已定义 %s 的文件上下文,则无法检查无法检查 ibendport {ibdev_name}/{ibendport} 是否已定义无法检查 ibendport {ibdev_name}/{port} 是否已定义无法检查 ibpkey {subnet_prefix}/{pkey} 是否已定义无法检查是否已定义接口 %s无法检查是否已经为 %s 规定了登录映射如果端口 {proto}/{port} 已定义,无法检查无法提交 semanage 事务无法为 %s 创建 SELinux 用户无法为 %s 创建密钥无法为 ibendport {ibdev_name}/{ibendport} 创建密钥无法为 {ibdev_name}/{port} 创建密钥无法为 {proto}/{port} 创建密钥无法为 {subnet_prefix}/{pkey} 创建密钥无法为 %s 创建 addr无法为 %s 创建上下文无法为 {ibendport}/{port} 创建上下文无法为 {proto}/{port} 创建上下文无法为 {subnet_prefix}/{pkey} 创建上下文无法为 %s 创建文件上下文无法为 {ibdev_name}/{port} 创建 ibendport无法为 {subnet_prefix}/{pkey} 创建 ibpkey无法为 %s 创建接口无法为 %s 创建密钥无法为 %s 创建登录映射无法创建模块密钥无法为 {proto}/{port} 创建端口无法创建 semanage 句柄无法删除 SELinux 用户 %s无法删除 addr %s无法删除所有接口映射无法删除布尔值 %s无法为 %s 删除文件上下文无法删除 ibendport {ibdev_name}/{ibendport}无法删除 ibpkey {subnet_prefix}/{pkey}无法删除接口 %s无法删除 %s 的登录映射无法删除端口 {proto}/{port}无法删除文件上下文 %s无法删除 ibendport {ibdev_name}/{port}无法删除 ibpkey %s无法删除端口 %s无法删除所有节点映射无法禁用模块 %s无法启用模块 %s无法建立 semanage 连接无法为 %s 提取密钥无法启用模块无法获取模块 lang_ext无法获取模块名称无法获取模块优先级无法列出 SELinux 模块无法列出 SELinux 用户无法列出 addr无法列出布尔值无法列出文件上下文无法为主目录列出文件上下文无法列出 ibendport无法列出 ibpkey无法列出接口无法列出本地文件上下文无法列出登录映射无法列出端口无法为用户 %s 列出角色无法列出文件上下文无法列出 ibendport无法列出 ibpkey无法列出端口无法修改 SELinux 用户 %s无法修改 addr %s无法修改布尔值 %s无法为 %s 修改文件上下文无法修改 ibendport {ibdev_name}/{ibendport}无法修改 ibpkey {subnet_prefix}/{pkey}无法修改接口 %s无法为 %s 修改登录映射无法修改端口 {proto}/{port}无法查询 addr %s无法查询文件上下文 %s无法为 %s 查询文件上下文无法查询 ibendport {ibdev_name}/{ibendport}无法查询 ibpkey {subnet_prefix}/{pkey}无法查询接口 %s无法查询端口 {proto}/{port}无法为 %s 查询 seuser无法为 %s 查询用户无法删除模块 %s (删除失败)无法删除 permissive 域 %s(删除操作失败)无法为 %s 设置 MLS 级别无法为 %s 设置 MLS 范围无法为 %s 设置 SELinux 用户无法设定活跃布尔值 %s无法为 %s 设置 addr 上下文无法为 %s 设置文件上下文无法为 {ibdev_name}/{port} 设置 ibendport 上下文无法为 {subnet_prefix}/{pkey} 设置 ibpkey 上下文无法为 %s 设置接口上下文无法为 %s 设置掩码无法为 %s 设置信息上下文无法在 addr 上下文中为 %s 设置 mls 字段无法在文件 context 中为 %s 设置 mls 字段无法为 {ibdev_name}/{port} 在 ibendport 上下文中设置 mls 项无法为 {subnet_prefix}/{pkey} 在 ibpkey 上下文中设置 mls 项无法在接口上下文中为 %s 设置 mls 字段无法为 {proto}/{port} 在端口上下文中设置 mls 字段无法设置模块密钥名称无法为 %s 设置名称无法设定 permissive 域 %s(模块安装失败)无法为 {proto}/{port} 设置端口上下文无法在 addr 上下文中为 %s 设置角色无法在文件 context 中为 %s 设置角色无法为 {ibdev_name}/{port} 在 ibendport 上下文中设置角色无法为 {subnet_prefix}/{pkey} 在 ibpkey 上下文中设置角色无法在接口 context 中为 %s 设置角色无法为 {proto}/{port} 在端口上下文中设置角色无法在 addr 上下文中为 %s 设置类型无法在文件 context 中为 %s 设置类型无法为 {ibdev_name}/{port} 在 ibendport 上下文中设置类型无法为 {subnet_prefix}/{pkey} 在 ibpkey 上下文中设置类型无法在接口 context 中为 %s 设置类型无法为 {proto}/{port} 在端口上下文中设置类型无法在 addr 上下文中为 %s 设置用户无法在文件 context 中为 %s 设置用户无法为 {ibdev_name}/{port} 在 ibendport 上下文中设置用户无法为 {subnet_prefix}/{pkey} 在 ibpkey 上下文中设置用户无法在接口 context 中为 %s 设置用户无法为 {proto}/{port} 在端口上下文中设置用户无法启动 semanage 事务无法测试启用了 MLS 的状态创建以下文件:
自定义 Permissive 类型DBUS 系统守护进程默认默认等级SELinux 用户的默认 SELinux 级别,s0 Default。(仅限于 MLS/MCS系统)删除为 '%(DOMAIN)s' 域删除 %(TYPE)s 文件路径。删除修改的文件标签删除修改的端口删除修改的用户映射。删除 %s 对象类型的一个记录删除文件等价标签。为 %s 删除文件标签删除登录映射删除修改的文件等价定义。删除修改的登录映射定义。删除修改的 SELinux 用户/角色定义。删除修改的端口定义以便 %(PERM)s 可允许 '%(APP)s' 域。为 %s 删除端口删除用户描述桌面登录用户角色目标类型禁用禁用一个模块禁用布尔在策略中启用/禁用 dontaudit 规则已禁用显示可转换为 '%s' 或者从 '%s' 转换的应用程序。显示可转换为‘所选域’或者从‘所选域’转换的应用程序。显示可用来修改 '%s' 策略的布尔值信息。显示可用来修改‘所选域’策略的布尔值信息。显示 '%s' 可使用的文件类型信息。显示‘所选域’可使用的文件类型信息。显示 '%s' 可连接或者侦听的网络端口。显示‘所选域’可连接或者侦听的网络端口。列出 %s 对象类型时不打印头提交后不要重新加载策略生成 man page 的域名启用启用一个模块启用布尔已启用强制输入 SELinux 用户登录的默认级别。默认为 s0输入这个 SELinux 用户的 MLS/MCS 范围。
s0-s0:c1023为这个登录用户输入 MSL/MCS 范围。默认为所选 SELinux 用户的范围。输入管理员域将要转换的 SELinux 角色输入将转移至此域的 SELinux 用户(们)输入您将要延伸至的域类型输入这个受限制管理员将要管理的域输入您要查询的接口名称输入要为这个文件路径分配的 MLS 标签。输入要为这个端口分配的 MLS 标签。输入您要添加到 SELinux 用户限制的用户的登录用户名。输入您要设置对等标签的路径。输入您要添加到端口类型的端口号或者范围。对等路径已存在 %s 的等效类型和 %s 相等的类不存在等价:%s可执行文件可执行文件在执行所选域进入点时,将会转变为 '%s' 的可执行代码。当 '%s' 执行它们时,会转到一个不同域的可执行代码。当‘所选域’执行它们时可转换为不同域的可执行文件。执行所选域切入点时可转换为‘所选域’的可执行文件。已有域类型导出将系统设置导出为一个文件提取可定制的命令以在事务中使用读取 %s 策略文件失败文件上下文文件文件等价文件名文件路径由 '%s' 转换的文件来自‘选择域’的文件转换文件转换规定当目前域在目标类型的目录中生成特定类型内容时会出现什么情况。或者可为该转换指定文件名称。文件类型。用于 fcontext。需要一个文件类型,如 ls 命令输出中的 mode 字段中的值,例如,d 只匹配目录,f 只匹配普通文件。可以使用以下文件类型:f (普通文件), d (目录), c (字符设备), b (块设备), s (socket), l (symbolic 链接), p (named pipe),如果没有指定文件类型,文件类型默认为"所有文件"。为 '%s' 定义的文件类型。为‘所选域’定义的文件类型。文件类型:%s%s 的文件上下文已定义已在策略中定义了 %s 的文件上下文,无法将其删除未定义 %s 的文件上下文文件等价造让该系统将那个新路径中的内容如等价路径中的内容一般标记。文件路径:%s用来进入 '%s' 域的文件路径。进入‘所选域’的文件路径。文件路径:%s文件 spec %s 与相当的规则 '%s %s' 冲突文件 spec %s 与等效规则 '%s %s' 冲突;请尝试添加 '%s'文件说明不能有空格文件文件等价'%s' 会转换到一个不同的标签的文件。'%s' 域可写入的文件。‘所选域’可写入的文件。过滤器发现圆形接口类生成 '%s' 策略生成 '%s' 策略 为选中的 SELinux 手册页面生成 HTML 手册页面结构生成 SELinux 策略模块模板生成 SELinux man pageSELinux 策略的图形用户界面帮助:应用程序类型页帮助:布尔值页帮助:可执行文件页帮助:文件等价页帮助:进入网络连接页帮助:锁定页帮助:登录页帮助:外出网络连接页帮助:SELinux 用户页帮助:起始页帮助:系统页帮助:转换应用程序文件页帮助:从应用程序转换页帮助:转换为应用程序页帮助:可写入文件页IB设备名称IB 设备名称是必需的重要策略中写入的 If-Then-Else 规则
可允许备选访问控制。导入导入本地定制从另一台机器导入系统设置流入输入文件接口 %s 已定义接口 %s 不存在。已在策略中定义了接口 %s,无法将其删除未定义接口 %s接口文件互联网服务守护进程无效的 Pkey无效端口端口号无效无效文件说明无效优先级 %d(应在 1 到 999 之间)标记中语言Linux 组群 %s 不存在Linux用户 %s 不存在列出 %s 本地定制列出 SELinux 策略接口列出 %s 对象类型的记录锁定锁定 SELinux 系统。
本页面可用来打开 SELinux 保护。登录映射登录名登录名:%s%s 的登录映射已定义已经在策略中规定了 %s 的登录映射,无法将其删除未定义 %s 的登录映射登录名丢失数据对话MCS 级别MCS 范围缺少文件路径MLSMLS 范围MLS/MLS/MCS 范围MLS/MCS 范围:%sMLS/MCS安全范围(仅限 MLS/MCS系统)SELinux 登录映射的 SELinux 范围被默认为 SELinux 用户的记录范围。SELinux 用户的 SELinux 范围默认为S0。使路径递归管理受 SELinux 限制的用户(一个 SELinux 用户的角色和级别)管理SELinux策略模块管理布尔值来有选择地启用功能管理文件上下文映射定义管理 InfiniBand 结束端口类型定义管理 infiniband ibpkey 类型定义管理 Linux 用户和受 SELinux 限制的用户间的登录映射管理网络接口类型定义管理网络节点类型定义管理网络端口类型定义管理进程类型强制模式管理 SELinux 配置最小终端登录用户角色最小 X 窗口登录用户角色有错误标记的文件缺少 %s 的端口定义修改为 '%(DOMAIN)s' 域修改 %(TYPE)s 文件路径。只选择列表中黑体字部分,黑体字代表之前修改过他们。修改文件等价映射。应用更新时将生成映射。为 %s 修改文件标签。应用更新时将生成文件标签。修改登录映射修改登录映射。应用更新时将修改登录映射。为 %s 修改网络端口为 %s 修改网络端口。应用更新时将生成端口。修改 SELinux 文件等价修改 SELinux 用户角色。应用更新时将修改 SELinux 用户角色。修改 SELinux 用户修改 %s 对象类型的一个记录修改文件等价标签。为 %s 修改文件标签修改登录映射修改端口定义以便 %(PERM)s 可允许 '%(APP)s' 域。为 %s 修改端口修改所选修改的文件等价定义。值选择列表中黑体字的项目,黑体字代表它们之前被修改过。修改所选登录映射定义。修改所选 SELinux 用户/角色定义。修改用户模块名称模块不存在: %s 新类型的模块信息详情更多类型更多......名称指定的 InfiniBand 结束端口的名称。名称必须是数字字母组合,且没有空格。请考虑使用选项 "-n MODULENAME"网络网络掩码网络端口定义允许 '%s' 连接的网络端口。允许 '%s' 侦听的网络端口。允许‘所选域’连接的网络端口。允许‘所选域’侦听的网络端口。网络端口:%s网络协议:%s否未安装 SELinux 策略需要节点地址尚未实施只有守护进程程序可以使用 init 脚本。选项错误 %s 外出输出结果文件输出本地定制路径路径.  要标记的路径(可能采用 Perl 兼容的正则表达式的形式)允许的PKEY号需要命令的策略类型端口端口号端口类型需要端口端口号必须在 1 到 65536 之间端口 {proto}/{port} 已定义已在策略中定义了端口 {proto}/{port},无法将其删除没有定义端口 {proto}/{port}端口必须是从 1 到 %d 的数字或者一组数字 前缀优先级进程类型协议协议指定端口的协议(tcp|udp|dccp|sctp)或指定节点的互联网协议(IPv4|IPv6)。协议需要是 udp、tcp、dccp 或 sctp 之一查询 SELinux 策略网络信息重启后将所有文件重新标记为系统默认删除一个模块删除所有 %s 对象的本地定制需要至少一个分类需要前缀或角色需要前缀、角色、级别或范围需要 settype需要 setype 或 serange需要 setype、serange 或 seuser需要 seuser 或 serange重试恢复恢复更改恢复按钮将打开一个对话窗口,您可以在该窗口中恢复当前转换过程中进行的修改。在向提供提交更新前要进行检查。要重新设置某个项目,只要取消其选择即可。您选择更新后将更新所有选择的项目。角色:%s在 %(PATH)s 中运行 restorecon 将其类型从 %(CUR_CONTEXT)s 改为默认的 %(DEF_CONTEXT)s》?SELinux 应用程序类型SELinux 配置SELinux 目标类型SELinux 目录类型SELinux 文件标签SELinux 文件类型SELinux IB 结束端口类型SELinux IB Pkey 类型SELinux 接口您要为这个路径分配的 SELinux MLS 标签。SELinux 端口类型SELinux 角色SELinux 角色。您需要使用引号来包括多个角色,由空格分开。或使用 -R 多次指定。对象的 SELinux 类型需要 SELinux 类型SELinux 用户SELinux 用户:%sSELinux 用户名SELinux 用户:%sSELinux 用户名SELinux 用户SELinux 布尔值SELinux fcontextSELinux 文件类型:%sSELinux 名称:%sSELinux 节点类型是必选的没有管理 SELinux 策略或者无法访问存储。SELinux 用户 %s 已定义已在策略中定义了 SELinux 用户 %s,无法将其删除未定义 SELinux 用户 %sSELinux的用户名沙箱保存到更新保存更新选择如果应将端口类型分配为 tcp 端口号则请选择 <b>tcp</b>。如果应将端口类型分配为 tcp 端口号则请选择 <b>udp</b>。如果您要将这个标签应用到指定目录路径中的所有子文件中,请选择生成路径递,以便该目录中的所有项目都使用这个标签。选择模块操作的优先级选择一个备选的 SELinux 策略存储来进行管理选择域选择要删除的文件等价标签。应用更新时将删除文件等价标签。选择要删除的文件标签。应用更新时将删除文件标签。选择要删除的登录用户映射。应用更新时将删除登录用户映射。选择要删除的端口。应用更新时将删除端口。选择要为其分配这个登录用户的 SELinux 用户。默认情况下登录用户由 __default__ user 分配。选择要为这个路径分配的 SELinux 文件类型。选择要应用此标签的文件类型。默认为所有等级。选择您要为指定端口号分配的端口类型。为当前会话选择系统模式系统首次引导时选择文件模式选择要删除的用户映射。应用更新时将删除用户映射。选择......Semanage 事务进行中Semanage 事务未进行服务设置脚本只显示修改的只显示错误标记的文件显示为这个 SELinux 类型定义的端口源域Spec 文件这次那个新的 SELinux 用户名称。通常 SELinux 用户名称以 _u 结尾。为这个用户指定用来登录的 MLS 范围。默认为所选 SELinux 用户 MLS 范围。指定您希望这个 SELinux 用户登录的默认级别。默认为 s0。指定新路径与对等路径之间的映射。新路径中的所有内容如果也在对等路径中,则都将被标记。指定您要修改标签的正则表达式路径。标准初始化守护进程状态子网前缀是必需的指定的 InfiniBand ibpkey 的子网前缀。Subnet_Prefix替换 %s 无效。替换不能以 '/' 结尾生成默认标签时使用源路径替代目标路径。这是使用fcontext。需要源和目标路径参数。为目标的子树上下文标签等效于用于源定义。系统文件策略类型:系统状态:已禁用系统状态:Enforcing系统状态:Permissive目标 %s 无效。目标不能以 ‘/’ 结尾目标域条目 '%s' 是无效路径。路径必须以 '/' 开始。该条目未正确输入。请使用 ex:/.../... 格式再试一次。使用 %sBoolean 项中的%s 禁用这个转换。使用 %sBoolean 项中的%s 启用这个转换。要激活这个策略包,执行:转换类型类型 %s 无效,必须是文件或设备类型类型 %s 无效,必须是一个 ibpkey 类型类型 %s 无效,必须是节点类型类型 %s 无效,必须是端口类型类型 %s 无效,需要是一个 ibendport 类型输入强制文件需要填写类型字段需要类型类型USER 类型自动为 tmp 类型未知或者缺少协议更新更新更改使用 %s -L用法 %s -L -l 用户用法 %s -d File ...用法 %s -l -d 用户...使用方法 %s -l CATEGORY 用户 ...用法 %s -l [[+|-]CATEGORY],...] 用户 ...用法 %s CATEGORY 文件……用法 %s [[+|-]CATEGORY],...] 文件 ...使用 -- 来结束选项列表。例如用户程序不能讲用户角色类型设定为 executable。用户有效类型:
网页应用程序/脚本 (CGI)使用这个标签,需要在文件上下文文件以及 policy.xml 文件中包含可替换 root 路径可写入文件是您要关闭该程序而不进行任何更改。
* 要应用您在此会话中进行的更改,请点击否,并点击更新。
* 要让程序不采用您所做的更改,请点击是。这样您将丢失所有您在此会话中进行的更改。您必须至少为 %s 添加一个角色您必须在您 '%s' 的策略模块输入一个名称。您必须输入一个有效的策略类型您必须输入要限制进程的可执行路径您必须运行 /usr/bin/sepolgen-ifgen 创新生成接口信息您必需指定以下值之一:%s您需要定义一个新类型,其结尾为:
%s您需要安装 policycoreutils-gui 软件包使用该 gui 选项所有文件应用程序块设备boolean获取描述的布尔值字符设备chcat -- -CompanyConfidential /docs/businessplan.odtchcat -l +CompanyConfidential juser命令连接目录dontaudit 需为 'on' 或者 'off'可执行要限制的可执行文件获取所有布尔值描述ibendportibendport {ibdev_name}/{ibendport} 在策略中定义,不能删除ibendport {ibdev_name}/{ibendport} 没有定义ibendport {ibdev_name}/{port} 已定义ibpkey {subnet_prefix}/{pkey} 已定义ibpkey {subnet_prefix}/{pkey} 在策略中定义,不能删除ibpkey {subnet_prefix}/{pkey} 没有定义interface_spec列出所有 SELinux 端口类型侦听进入的连接login_name | %%groupnamemanage_krb5_rcache 必须是一个布尔值 生成策略的名称man 手册对应的操作系统名称命名的管道节点关开保存生成的 SELinux man page 的路径保存生成的 SELinux 策略文件的路径需要写入到受限制进程的路径pkey | pkey_range端口| port_range查询 SELinux 策略查看布尔值描述查询 SELinux 策略看看如何将源进程域转换为目标进程域查询 SELinux 策略看看域之间是否互相联络单选按钮常规文件selinux_namesemanage 用于配置特定的 SELinux 策略项,而无需来自策略源的修改或重新编译。semanage permissive: 错误: 需要以下参数: type
生成 sepolicy:错误:需要参数 %s 之一显示与该端口关联的 SELinux 类型显示这个程序可绑定和(/或者)连接的端口显示这个域可捆绑和(/或者)连接的端口套接字文件源进程域符号链接目标进程域tcp类型udp未知use_kerberos 必须是一个布尔值 use_resolve 必须是一个布尔值 use_syslog 必须是一个布尔值 可写入{target} 已在 {category}{target} 没有在 {category}

Zerion Mini Shell 1.0