From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 35D54C282C2 for ; Thu, 7 Feb 2019 21:03:40 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 0B8592175B for ; Thu, 7 Feb 2019 21:03:40 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727485AbfBGVDj (ORCPT ); Thu, 7 Feb 2019 16:03:39 -0500 Received: from mx1.polytechnique.org ([129.104.30.34]:51348 "EHLO mx1.polytechnique.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727132AbfBGVDj (ORCPT ); Thu, 7 Feb 2019 16:03:39 -0500 Received: from mail-ot1-f48.google.com (mail-ot1-f48.google.com [209.85.210.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ssl.polytechnique.org (Postfix) with ESMTPSA id 03829564798 for ; Thu, 7 Feb 2019 22:03:35 +0100 (CET) Received: by mail-ot1-f48.google.com with SMTP id s13so2335039otq.4 for ; Thu, 07 Feb 2019 13:03:35 -0800 (PST) X-Gm-Message-State: AHQUAuZHhczO+ATybENLtHfc7qsgtMcN9CDuniu1Ij9L9aGD3ABO4Acv DeJDTVCGw9IQPXL5d1W9Kl93ehQrmiIZfEIToBE= X-Google-Smtp-Source: AHgI3IaGbGaWg7yPr6CrauBj5lDvxl9y3XyfIJi4eAQjilI8c4q6xZS1bsOpvBfQHUrzr0RXc+2q+DUHGb/+9P/2BAc= X-Received: by 2002:a9d:60cf:: with SMTP id b15mr9482661otk.144.1549573414837; Thu, 07 Feb 2019 13:03:34 -0800 (PST) MIME-Version: 1.0 References: <20190207102545.28580-1-vmojzis@redhat.com> In-Reply-To: <20190207102545.28580-1-vmojzis@redhat.com> From: Nicolas Iooss Date: Thu, 7 Feb 2019 22:03:23 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] checkpolicy: Update manpage To: Vit Mojzis Cc: selinux@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-AV-Checked: ClamAV using ClamSMTP at svoboda.polytechnique.org (Thu Feb 7 22:03:36 2019 +0100 (CET)) X-Org-Mail: nicolas.iooss.2010@polytechnique.org Sender: selinux-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux@vger.kernel.org On Thu, Feb 7, 2019 at 11:25 AM Vit Mojzis wrote: > > - Add description of -S option > - Sort the option descriptions based on the synopsis > - Add missing options to synopsis > > Signed-off-by: Vit Mojzis Acked-by: Nicolas Iooss > --- > checkpolicy/checkpolicy.8 | 19 +++++++++++-------- > checkpolicy/checkpolicy.c | 2 +- > 2 files changed, 12 insertions(+), 9 deletions(-) > > diff --git a/checkpolicy/checkpolicy.8 b/checkpolicy/checkpolicy.8 > index 1c8805d5..8f7dad41 100644 > --- a/checkpolicy/checkpolicy.8 > +++ b/checkpolicy/checkpolicy.8 > @@ -3,7 +3,7 @@ > checkpolicy \- SELinux policy compiler > .SH SYNOPSIS > .B checkpolicy > -.I "[\-b[F]] [\-C] [\-d] [\-M] [\-c policyvers] [\-o output_file] [input_file]" > +.I "[\-b[F]] [\-C] [\-d] [\-U handle_unknown (allow,deny,reject)] [\-M] [\-c policyvers] [\-o output_file] [\-S] [\-t target_platform (selinux,xen)] [\-V] [input_file]" > .br > .SH "DESCRIPTION" > This manual page describes the > @@ -21,30 +21,33 @@ policy.conf or policy, depending on whether the \-b flag is specified. > .B \-b,\-\-binary > Read an existing binary policy file rather than a source policy.conf file. > .TP > +.B \-F,\-\-conf > +Write policy.conf file rather than binary policy file. Can only be used with binary policy file. > +.TP > .B \-C,\-\-cil > Write CIL policy file rather than binary policy file. > .TP > .B \-d,\-\-debug > Enter debug mode after loading the policy. > .TP > -.B \-F,\-\-conf > -Write policy.conf file rather than binary policy file. Can only be used with binary policy file. > +.B \-U,\-\-handle-unknown > +Specify how the kernel should handle unknown classes or permissions (deny, allow or reject). > .TP > .B \-M,\-\-mls > Enable the MLS policy when checking and compiling the policy. > .TP > +.B \-c policyvers > +Specify the policy version, defaults to the latest. > +.TP > .B \-o,\-\-output filename > Write a binary policy file to the specified filename. > .TP > -.B \-c policyvers > -Specify the policy version, defaults to the latest. > +.B \-S,\-\-sort > +Sort ocontexts before writing out the binary policy. This option makes output of checkpolicy consistent with binary policies created by semanage and secilc. > .TP > .B \-t,\-\-target > Specify the target platform (selinux or xen). > .TP > -.B \-U,\-\-handle-unknown > -Specify how the kernel should handle unknown classes or permissions (deny, allow or reject). > -.TP > .B \-V,\-\-version > Show version information. > .TP > diff --git a/checkpolicy/checkpolicy.c b/checkpolicy/checkpolicy.c > index 14dc91a3..e0a00f7c 100644 > --- a/checkpolicy/checkpolicy.c > +++ b/checkpolicy/checkpolicy.c > @@ -113,7 +113,7 @@ static __attribute__((__noreturn__)) void usage(const char *progname) > printf > ("usage: %s [-b[F]] [-C] [-d] [-U handle_unknown (allow,deny,reject)] [-M] " > "[-c policyvers (%d-%d)] [-o output_file] [-S] " > - "[-t target_platform (selinux,xen)] [input_file]\n", > + "[-t target_platform (selinux,xen)] [-V] [input_file]\n", > progname, POLICYDB_VERSION_MIN, POLICYDB_VERSION_MAX); > exit(1); > } > -- > 2.17.2 >