Upstream repository for the Security Enhanced Linux (SELinux) userland libraries and tools, complementing the kernel's mandatory access control features.
SELinux Userspace is the upstream repository for the userland libraries and tools that manage Security Enhanced Linux (SELinux). It provides the utilities and system libraries needed to configure, enforce, and analyze SELinux mandatory access control policies on Linux systems. This project complements the SELinux features integrated into the Linux kernel and is used by major Linux distributions.
Linux system administrators, security engineers, and distribution maintainers who need to implement and manage mandatory access control policies. It is also relevant for developers building security-sensitive applications that integrate with SELinux.
Developers choose SELinux Userspace because it is the authoritative, upstream source for SELinux userland components, ensuring compatibility and standardization across Linux distributions. It provides a comprehensive, tested set of tools and libraries for granular security policy management beyond standard Linux permissions.
This is the upstream repository for the Security Enhanced Linux (SELinux) userland libraries and tools. The software provided by this project complements the SELinux features integrated into the Linux kernel and is used by Linux distributions. All bugs and patches should be submitted to selinux@vger.kernel.org
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Serves as the canonical source for SELinux userland components across major Linux distributions, ensuring standardization and compatibility.
Provides utilities like policycoreutils and libraries (libselinux, libsepol) for full policy lifecycle management, from creation to enforcement.
Includes Python and Ruby bindings, enabling automation of SELinux operations through scripts, as supported by the build dependencies for swig and language dev packages.
Integrates OSS-Fuzz and CI-driven test suites, highlighted by badges in the README, to enhance code reliability and vulnerability detection.
Installing from source can overwrite system libraries and potentially render the system unusable, as warned in the README due to dependency mismatches.
Requires a long list of development packages on Fedora and Debian, making setup cumbersome and error-prone for new users.
Custom CFLAGS can easily break the build, as noted in the README, limiting flexibility in compilation environments and increasing maintenance overhead.