NAME | SYNOPSIS | DESCRIPTION | OPTIONS | SEE ALSO | AUTHOR | COLOPHON

CHECKPOLICY(8)             System Manager's Manual            CHECKPOLICY(8)

NAME         top

       checkpolicy - SELinux policy compiler

SYNOPSIS         top

       checkpolicy [-b[F]] [-C] [-d] [-M] [-c policyvers] [-o output_file]
       [input_file]

DESCRIPTION         top

       This manual page describes the checkpolicy command.

       checkpolicy is a program that checks and compiles a SELinux security
       policy configuration into a binary representation that can be loaded
       into the kernel.  If no input file name is specified, checkpolicy
       will attempt to read from policy.conf or policy, depending on whether
       the -b flag is specified.

OPTIONS         top

       -b,--binary
              Read an existing binary policy file rather than a source
              policy.conf file.

       -C,--cil
              Write CIL policy file rather than binary policy file.

       -d,--debug
              Enter debug mode after loading the policy.

       -F,--conf
              Write policy.conf file rather than binary policy file. Can
              only be used with binary policy file.

       -M,--mls
              Enable the MLS policy when checking and compiling the policy.

       -o,--output filename
              Write a binary policy file to the specified filename.

       -c policyvers
              Specify the policy version, defaults to the latest.

       -t,--target
              Specify the target platform (selinux or xen).

       -U,--handle-unknown <action>
              Specify how the kernel should handle unknown classes or
              permissions (deny, allow or reject).

       -V,--version
              Show version information.

       -h,--help
              Show usage information.

SEE ALSO         top

       SELinux documentation at http://www.nsa.gov/research/selinux,
       especially "Configuring the SELinux Policy".

AUTHOR         top

       This manual page was written by Arpad Magosanyi
       <mag@bunuel.tii.matav.hu>, and edited by Stephen Smalley
       <sds@tycho.nsa.gov>.  The program was written by Stephen Smalley
       <sds@tycho.nsa.gov>.

COLOPHON         top

       This page is part of the selinux (Security-Enhanced Linux user-space
       libraries and tools) project.  Information about the project can be
       found at ⟨https://github.com/SELinuxProject/selinux/wiki⟩.  If you
       have a bug report for this manual page, see 
       ⟨https://github.com/SELinuxProject/selinux/wiki/Contributing⟩.  This
       page was obtained from the project's upstream Git repository 
       ⟨https://github.com/SELinuxProject/selinux⟩ on 2017-09-15.  If you
       discover any rendering problems in this HTML version of the page, or
       you believe there is a better or more up-to-date source for the page,
       or you have corrections or improvements to the information in this
       COLOPHON (which is not part of the original manual page), send a mail
       to man-pages@man7.org

                                                              CHECKPOLICY(8)

Pages that refer to this page: restorecon(8)setfiles(8)