mirror of
https://github.com/topjohnwu/selinux.git
synced 2024-11-27 13:30:48 +00:00
Minor manpages improvements
This commit is contained in:
parent
1524e15303
commit
2e93833b1b
@ -160,7 +160,7 @@ files_read_etc_files(myapp_t)
|
||||
# interface files.
|
||||
# You can create a te file and compile it by executing
|
||||
|
||||
$ make -f /usr/share/selinux/devel/Makefile local.pp
|
||||
$ make \-f /usr/share/selinux/devel/Makefile local.pp
|
||||
|
||||
|
||||
# This make command will compile a local.te file in the current
|
||||
|
@ -29,7 +29,7 @@ selinux(1), sepolicy(8), sepolicy-generate(8)
|
||||
Report bugs to <http://bugzilla.redhat.com>.
|
||||
|
||||
.SH LICENSE AND AUTHORS
|
||||
\fBselinux-polgengui\fP is licensed under the GNU Public License and
|
||||
\fBselinux-polgengui\fP is licensed under the GNU General Public License and
|
||||
is copyrighted by Red Hat, Inc.
|
||||
.br
|
||||
This man page was written by Daniel Walsh <dwalsh@redhat.com>
|
||||
|
@ -31,7 +31,7 @@ selinux(1), semanage(8)
|
||||
Report bugs to <http://bugzilla.redhat.com>.
|
||||
|
||||
.SH LICENSE AND AUTHORS
|
||||
\fBsystem-config-selinux\fP is licensed under the GNU Public License and
|
||||
\fBsystem-config-selinux\fP is licensed under the GNU General Public License and
|
||||
is copyrighted by Red Hat, Inc.
|
||||
.br
|
||||
This man page was written by Daniel Walsh <dwalsh@redhat.com>
|
||||
|
@ -4,7 +4,7 @@ load_policy \- load a new SELinux policy into the kernel
|
||||
|
||||
.SH SYNOPSIS
|
||||
.B load_policy
|
||||
[-qi]
|
||||
[\-qi]
|
||||
.br
|
||||
.SH DESCRIPTION
|
||||
.PP
|
||||
|
@ -14,10 +14,10 @@ program.
|
||||
This daemon reads /etc/selinux/{SELINUXTYPE}/setrans.conf configuration file, and communicates with libselinux via a socket in /var/run/setrans.
|
||||
.SH "OPTIONS"
|
||||
.TP
|
||||
-f
|
||||
\-f
|
||||
Run mcstransd in the foreground. Do not run as a daemon.
|
||||
.TP
|
||||
-h
|
||||
\-h
|
||||
Output a short summary of available command line options\&.
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
@ -60,11 +60,11 @@ Run a diff on the PREVIOUS_FILECONTEXT file to the currently installed one, and
|
||||
.TP
|
||||
.B \-N time
|
||||
Only act on files created after the specified date. Date must be specified in
|
||||
"YYYY-MM-DD HH:MM" format. Date field will be passed to find --newermt command.
|
||||
"YYYY\-MM\-DD HH:MM" format. Date field will be passed to find \-\-newermt command.
|
||||
|
||||
.TP
|
||||
.B -v
|
||||
Modify verbosity from progress to verbose. (Run restorecon with -v instead of -p)
|
||||
Modify verbosity from progress to verbose. (Run restorecon with \-v instead of \-p)
|
||||
|
||||
.SH "ARGUMENTS"
|
||||
One of:
|
||||
|
@ -31,7 +31,7 @@ shows the usage information for secon
|
||||
outputs data in a format suitable for a prompt
|
||||
.TP
|
||||
\fB\-C\fR, \fB\-\-color\fR
|
||||
outputs data with the associated ANSI color codes (requires -P)
|
||||
outputs data with the associated ANSI color codes (requires \-P)
|
||||
.TP
|
||||
\fB\-u\fR, \fB\-\-user\fR
|
||||
show the user of the security context
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-boolean" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
semanage boolean\- SELinux Policy Management boolean tool
|
||||
semanage\-boolean \- SELinux Policy Management boolean tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage boolean [\-h] [\-n] [\-N] [\-s STORE] [ \-\-extract | \-\-deleteall | \-\-list [\-C] | \-\-modify ( \-\-on | \-\-off ) boolean ]
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-dontaudit" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage dontaudit\- SELinux Policy Management dontaudit tool
|
||||
.B semanage\-dontaudit \- SELinux Policy Management dontaudit tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage dontaudit [\-h] [\-S STORE] [\-N] {on,off}
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-export" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage export\- SELinux Policy Management import tool
|
||||
.B semanage\-export \- SELinux Policy Management import tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage export [\-h] [\-S STORE] [\-f OUTPUT_FILE]
|
||||
|
||||
@ -23,10 +23,10 @@ Output file
|
||||
.SH EXAMPLE
|
||||
.nf
|
||||
Import semanage modifications from another machine
|
||||
# semanage export -f semanage.mods
|
||||
# semanage export \-f semanage.mods
|
||||
# scp semanage.mod remotemachine:
|
||||
# ssh remotemachine
|
||||
# semanage import -f semanage.mods
|
||||
# semanage import \-f semanage.mods
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.B selinux (8),
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-fcontext" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
semanage fcontext\- SELinux Policy Management file context tool
|
||||
semanage\-fcontext \- SELinux Policy Management file context tool
|
||||
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage fcontext [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) | \-\-delete ( \-t TYPE \-f FTYPE | \-e EQUAL ) FILE_SPEC ) | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) ]
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-import" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage import\- SELinux Policy Management import tool
|
||||
.B semanage\-import \- SELinux Policy Management import tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage import [\-h] [\-N] [\-S STORE] [\-f INPUT_FILE]
|
||||
|
||||
@ -25,7 +25,7 @@ Input file
|
||||
.SH EXAMPLE
|
||||
.nf
|
||||
Import semanage modifications from another machine
|
||||
# semanage import -f semanage.mods
|
||||
# semanage import \-f semanage.mods
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.B selinux (8),
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-interface" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage interface\- SELinux Policy Management network interface tool
|
||||
.B semanage\-interface \- SELinux Policy Management network interface tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage interface [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add \-t TYPE \-r RANGE interface | \-\-delete interface | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-r RANGE interface ]
|
||||
|
||||
@ -53,7 +53,7 @@ MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login ma
|
||||
.SH EXAMPLE
|
||||
.nf
|
||||
list all interface defitions
|
||||
# semanage interface -l
|
||||
# semanage interface \-l
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.B selinux (8),
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-login" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage login\- SELinux Policy Management linux user to SELinux User mapping tool
|
||||
.B semanage\-login \- SELinux Policy Management linux user to SELinux User mapping tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage login [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add \-s SEUSER \-r RANGE LOGIN | \-\-delete LOGIN | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-s SEUSER \-r RANGE LOGIN ]
|
||||
|
||||
@ -53,11 +53,11 @@ MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login ma
|
||||
.SH EXAMPLE
|
||||
.nf
|
||||
Modify the default user on the system to the guest_u user
|
||||
# semanage login -m -s guest_u __default__
|
||||
# semanage login \-m \-s guest_u __default__
|
||||
Assign gijoe user on an MLS machine a range and to the staff_u user
|
||||
# semanage login -a -s staff_u -rSystemLow-Secret gijoe
|
||||
# semanage login \-a \-s staff_u \-rSystemLow-Secret gijoe
|
||||
Assign all users in the engineering group to the staff_u user
|
||||
# semanage login -a -s staff_u %engineering
|
||||
# semanage login \-a \-s staff_u %engineering
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.B selinux (8),
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-module" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage module\\- SELinux Policy Management module mapping tool
|
||||
.B semanage\-module \- SELinux Policy Management module mapping tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage module [\-h] [\-n] [\-N] [\-S STORE] (\-a | \-r | \-e | \-d | \-\-extract | \-\-list [\-C] | \-\-deleteall) [module_name]
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-node" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage node\- SELinux Policy Management node mapping tool
|
||||
.B semanage\-node \- SELinux Policy Management node mapping tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage node [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node | \-\-delete \-M NETMASK \-p PROTOCOL node | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node ]
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-permissive" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage permissive \- SELinux Policy Management permissive mapping tool
|
||||
.B semanage\-permissive \- SELinux Policy Management permissive mapping tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage permissive [\-h] (\-a | \-d | \-l) [\-n] [\-N] [\-S STORE] [type]
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-port" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage port\- SELinux Policy Management port mapping tool
|
||||
.B semanage\-port \- SELinux Policy Management port mapping tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage port [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range | \-\-delete \-p PROTOCOL port_name | port_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range ]
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
.TH "semanage-user" "8" "20130617" "" ""
|
||||
.SH "NAME"
|
||||
.B semanage user\- SELinux Policy Management SELinux User mapping tool
|
||||
.B semanage\-user \- SELinux Policy Management SELinux User mapping tool
|
||||
.SH "SYNOPSIS"
|
||||
.B semanage user [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add ( \-L LEVEL \-R ROLES \-r RANGE \-s SEUSER selinux_name) | \-\-delete selinux_name | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-L LEVEL \-R ROLES \-r RANGE \-s SEUSER selinux_name ) ]
|
||||
|
||||
@ -60,7 +60,7 @@ List SELinux users
|
||||
Modify groups for staff_u user
|
||||
# semanage user \-m \-R "system_r unconfined_r staff_r" staff_u
|
||||
Add level for TopSecret Users
|
||||
# semanage user \-a \-R "staff_r" -rs0-TopSecret topsecret_u
|
||||
# semanage user \-a \-R "staff_r" \-rs0\-TopSecret topsecret_u
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.B selinux (8),
|
||||
|
@ -86,4 +86,4 @@ This man page was written by Daniel Walsh <dwalsh@redhat.com>
|
||||
and Russell Coker <rcoker@redhat.com>.
|
||||
.br
|
||||
Examples by Thomas Bleher <ThomasBleher@gmx.de>.
|
||||
usage: semanage [-h]
|
||||
usage: semanage [\-h]
|
||||
|
@ -54,7 +54,7 @@ Use \fBsepolicy generate\fP to generate an SELinux policy Module.
|
||||
|
||||
When specifying a \fBconfined application\fP you must specify a
|
||||
path. \fBsepolicy generate\fP will use the rpm payload of the
|
||||
application along with \fBnm -D APPLICATION\fP to help it generate
|
||||
application along with \fBnm \-D APPLICATION\fP to help it generate
|
||||
types and policy rules for your policy files.
|
||||
|
||||
.B Type Enforcing File NAME.te
|
||||
@ -75,7 +75,7 @@ file paths to the types. Tools like restorecon and RPM will use these paths to
|
||||
|
||||
.B RPM Spec File NAME_selinux.spec
|
||||
.br
|
||||
This file is an RPM SPEC file that can be used to install the SELinux policy on to machines and setup the labeling. The spec file also installs the interface file and a man page describing the policy. You can use \fBsepolicy manpage -d NAME\fP to generate the man page.
|
||||
This file is an RPM SPEC file that can be used to install the SELinux policy on to machines and setup the labeling. The spec file also installs the interface file and a man page describing the policy. You can use \fBsepolicy manpage \-d NAME\fP to generate the man page.
|
||||
|
||||
.B Shell File NAME.sh
|
||||
.br
|
||||
@ -158,9 +158,7 @@ Generate Policy for Minimal X Windows Login User Role
|
||||
.br
|
||||
Generating Policy for /usr/sbin/rwhod named rwhod
|
||||
.br
|
||||
Created the following files in:
|
||||
.br
|
||||
./
|
||||
Created the following files:
|
||||
.br
|
||||
rwhod.te # Type Enforcement file
|
||||
.br
|
||||
|
@ -25,7 +25,7 @@ check whether the file contexts are all set as specified by the active policy
|
||||
If a file object does not have a context, restorecon will write the default
|
||||
context to the file object's extended attributes. If a file object has a
|
||||
context, restorecon will only modify the type portion of the security context.
|
||||
The -F option will force a replacement of the entire context.
|
||||
The \-F option will force a replacement of the entire context.
|
||||
.P
|
||||
It is the same executable as
|
||||
.BR setfiles
|
||||
@ -50,7 +50,7 @@ display usage information and exit.
|
||||
ignore files that do not exist.
|
||||
.TP
|
||||
.B \-n
|
||||
don't change any file labels (passive check). To display the files whose labels would be changed, add -v.
|
||||
don't change any file labels (passive check). To display the files whose labels would be changed, add \-v.
|
||||
.TP
|
||||
.B \-o outfilename
|
||||
Deprecated, SELinux policy will probably block this access. Use shell redirection to save list of files with incorrect context in filename.
|
||||
|
Loading…
Reference in New Issue
Block a user