This package provides the static libraries and header files needed for developing SELinux applications. Security-enhanced Linux is a patch of the Linux kernel and a number of utilities with enhanced security functionality designed to add mandatory access controls to Linux. The Security-enhanced Linux kernel contains new architectural components originally developed to improve the security of the Flask operating system. These architectural components provide general support for the enforcement of many kinds of mandatory access control policies, including those based on the concepts of Type Enforcement, Role-based Access Control, and Multi-level Security.
Original maintainer | Debian SELinux maintainers |
---|---|
Homepage | http://userspace.selinuxproject.org/ |
3.0

2.9

2.8



2.7


2.6

2.4

Distribution | Version | Since | Package | Installed | Packager | |
---|---|---|---|---|---|---|
![]() | deb | 2.8-1+b1 | 2019-01-12 | 165 kiB | 748 kiB | Debian SELinux maintainers |
![]() | deb | 2.6-3+b3 | 2017-11-10 | 179 kiB | 761 kiB | Debian SELinux maintainers |
![]() | deb | 2.7-1 | 2017-11-10 | 146 kiB | 747 kiB | Ubuntu Developers |
![]() | deb | 2.7-2build2 | 2018-03-07 | 146 kiB | 747 kiB | Ubuntu Developers |
![]() | deb | 2.8-1build1 | 2019-01-14 | 146 kiB | 747 kiB | Ubuntu Developers |
![]() | deb | 2.8-1build2 | 2019-01-14 | 146 kiB | 748 kiB | Ubuntu Developers |
![]() | deb | 2.9-2 | 2019-07-17 | 147 kiB | 761 kiB | Ubuntu Developers |
![]() | deb | 3.0-1build2 | 2020-03-24 | 148 kiB | 765 kiB | Ubuntu Developers |
![]() | deb | 2.4-3build2 | 2017-11-10 | 120 kiB | 670 kiB | Ubuntu Developers |
Manual pages
avc_add_callback(3)
avc_add_callback - additional event notification for SELinux userspace object managers
avc_cache_stats(3)
avc_cache_stats, avc_av_stats, avc_sid_stats - obtain userspace SELinux AVC statistics
avc_compute_create(3)
avc_compute_create, avc_compute_member - obtain SELinux label for new object
avc_context_to_sid(3)
avc_context_to_sid, avc_sid_to_context, avc_get_initial_sid - obtain and manipulate SELinux security ID’s
avc_has_perm(3)
avc_has_perm, avc_has_perm_noaudit, avc_audit, avc_entry_ref_init - obtain and audit SELinux access decisions
avc_init(3)
avc_init - legacy userspace SELinux AVC setup
avc_netlink_loop(3)
avc_netlink_open, avc_netlink_close, avc_netlink_acquire_fd, avc_netlink_release_fd, avc_netlink_check_nb, avc_netlink_loop - SELinux netlink processing
avc_open(3)
avc_open, avc_destroy, avc_reset, avc_cleanup - userspace SELinux AVC setup and teardown
context_new(3)
context_new, context_str, context_free, context_type_get, context_type_set, context_range_get, context_range_set,context_role_get, context_role_set, context_user_get, context_user_set - Routines to manipulate SELinux security contexts
getcon(3)
getcon, getprevcon, getpidcon - get SELinux security context of a process
freecon, freeconary - free memory associated with SELinux security contexts
getpeercon - get security context of a peer socket
setcon - set current security context of a process
getexeccon(3)
getexeccon, setexeccon - get or set the SELinux security context used for executing a new process
rpm_execcon - run a helper for rpm in an appropriate security context
getfilecon(3)
getfilecon, fgetfilecon, lgetfilecon - get SELinux security context of a file
getfscreatecon(3)
getfscreatecon, setfscreatecon - get or set the SELinux security context used for creating a new file system object
getkeycreatecon(3)
getkeycreatecon, setkeycreatecon - get or set the SELinux security context used for creating a new kernel keyrings
getseuserbyname(3)
getseuserbyname - get SELinux username and level for a given Linux username
getsockcreatecon(3)
getsockcreatecon, setsockcreatecon - get or set the SELinux security context used for creating a new labeled sockets
init_selinuxmnt(3)
init_selinuxmnt - initialize the global variable selinux_mnt
is_context_customizable(3)
is_context_customizable - check whether SELinux context type is customizable by the administrator
is_selinux_enabled(3)
is_selinux_mls_enabled - check whether SELinux is enabled for (Multi Level Security) MLS
matchmediacon(3)
matchmediacon - get the default SELinux security context for the specified mediatype from the policy
matchpathcon(3)
matchpathcon, matchpathcon_index - get the default SELinux security context for the specified path from the file contexts configuration
matchpathcon_checkmatches(3)
matchpathcon_checkmatches, matchpathcon_filespec_add, matchpathcon_filespec_destroy, matchpathcon_filespec_eval - check and report whether any specification index has no matches with any inode. Maintenance and statistics on inode associations
security_check_context(3)
security_check_context - check the validity of a SELinux context
security_disable(3)
security_disable - disable the SELinux kernel code at runtime
security_getenforce(3)
security_getenforce, security_setenforce, security_deny_unknown, security_reject_unknown, security_get_checkreqprot - get or set the enforcing state of SELinux
security_load_booleans(3)
security_set_boolean, security_commit_booleans, security_get_boolean_names, security_get_boolean_active, security_get_boolean_pending - routines for manipulating SELinux boolean values
security_load_policy(3)
security_load_policy - load a new SELinux policy
security_policyvers(3)
security_policyvers - get the version of the SELinux policy
selabel_digest(3)
selabel_digest - Return digest of specfiles and list of files used
selabel_get_digests_all_partial_matches(3)
selabel_get_digests_all_partial_matches - retrieve the partial matches digest and the xattr digest that applies to the supplied path - Only supported on file backend.
selabel_lookup(3)
selabel_lookup - obtain SELinux security context from a string label
selabel_lookup_best_match(3)
selabel_lookup_best_match - obtain a best match SELinux security context - Only supported on file backend.
selabel_open(3)
selabel_open, selabel_close - userspace SELinux labeling interface
selabel_partial_match(3)
selabel_partial_match - determine whether a direct or partial match is possible on a file path - Only supported on file backend.
selabel_stats(3)
selabel_stats - obtain SELinux labeling statistics
selinux_boolean_sub(3)
selinux_boolean_sub - Search the translated name for a boolean_name record
selinux_check_securetty_context(3)
selinux_check_securetty_context - check whether a SELinux tty security context is defined as a securetty context
selinux_colors_path(3)
selinux_colors_path - Return a path to the active SELinux policy color configuration file
selinux_file_context_cmp(3)
selinux_file_context_cmp - Compare two SELinux security contexts excluding the ’user’ component
selinux_file_context_verify(3)
selinux_file_context_verify - Compare the SELinux security context on disk to the default security context required by the policy file contexts file
selinux_getenforcemode(3)
selinux_getenforcemode - get the enforcing state of SELinux
selinux_getpolicytype(3)
selinux_getpolicytype - get the type of SELinux policy running on the system
selinux_lsetfilecon_default(3)
selinux_lsetfilecon_default - set the file context to the system defaults
selinux_policy_root(3)
selinux_policy_root - return the path of the SELinux policy files for this machine selinux_set_policy_root - Set an alternate SELinux root path for the SELinux policy files for this machine.
selinux_raw_context_to_color(3)
selinux_raw_context_to_color - Return RGB color string for an SELinux security context
selinux_restorecon(3)
selinux_restorecon - restore file(s) default SELinux security contexts
selinux_restorecon_default_handle(3)
selinux_restorecon_default_handle - sets default parameters for selinux_restorecon(3)
selinux_restorecon_set_alt_rootpath(3)
selinux_restorecon_set_alt_rootpath - set an alternate rootpath.
selinux_restorecon_set_exclude_list(3)
selinux_restorecon_set_exclude_list - set list of directories to be excluded from relabeling.
selinux_restorecon_set_sehandle(3)
selinux_restorecon_set_sehandle - set a labeling handle for use by selinux_restorecon(3)
selinux_restorecon_xattr(3)
selinux_restorecon_xattr - manage default security.sehash extended attribute entries added by selinux_restorecon(3), setfiles(8) or restorecon(8).
selinux_set_callback(3)
selinux_set_callback - userspace SELinux callback facilities
selinux_set_mapping(3)
selinux_set_mapping - establish dynamic object class and permission mapping
selinux_status_open(3)
selinux_status_open, selinux_status_close, selinux_status_updated, selinux_status_getenforce, selinux_status_policyload and selinux_status_deny_unknown - reference the SELinux kernel status without invocation of system calls
setfilecon(3)
setfilecon, fsetfilecon, lsetfilecon - set SELinux security context of a file
set_matchpathcon_flags(3)
set_matchpathcon_flags, set_matchpathcon_invalidcon, set_matchpathcon_printf - set flags controlling the operation of matchpathcon or matchpathcon_index and configure the behaviour of validity checking and error displaying
Latest updates

Ubuntu 20.04 focal-proposed/main: Version 3.0-1build2 removed
2020-03-24

Ubuntu 20.04 focal/main: Updated from 3.0-1build1 to 3.0-1build2
2020-03-24

Ubuntu 20.04 focal-proposed/main: Version 3.0-1build2 introduced
2020-02-26

Ubuntu 20.04 focal-proposed/main: Version 3.0-1build1 removed
2020-02-26

Ubuntu 20.04 focal/main: Updated from 3.0-1 to 3.0-1build1
2020-02-26

Ubuntu 20.04 focal-proposed/main: Version 3.0-1build1 introduced
2020-02-18

Ubuntu 20.04 focal/main: Version 3.0-1 introduced
2020-01-07

Ubuntu 19.10 eoan/main: Version 2.9-2 reintroduced
2019-08-19

Ubuntu 19.10 eoan/main: Version 2.9-2 removed
2019-08-19

Ubuntu 19.10 eoan/main: Version 2.9-2 reintroduced
2019-08-14

Ubuntu 19.10 eoan/main: Version 2.9-2 removed
2019-08-14

Ubuntu 19.10 eoan/main: Version 2.9-2 reintroduced
2019-08-02

Ubuntu 19.10 eoan/main: Version 2.9-2 removed
2019-08-01

Ubuntu 19.10 eoan/main: Updated from 2.9-1 to 2.9-2
2019-07-17

Ubuntu 19.10 eoan-proposed/main: Version 2.9-2 removed
2019-07-17

Ubuntu 19.10 eoan-proposed/main: Version 2.9-2 introduced
2019-07-09

Debian experimental experimental/main: Version 2.9-1 removed
2019-07-07

Ubuntu 19.10 eoan/main: Version 2.9-1 introduced
2019-06-17

Debian experimental experimental/main: Version 2.9-1 introduced
2019-03-17
Laurent Bigonville
- New upstream release
- Bump libsepol1-dev build-dependency to >= 2.9 to match the release
- debian/ruby.mk: Do not override RUBYLIBS anymore, upstream build system seems to do the right thing now
- debian/control: Bump Standards-Version to 4.3.0 (no further changes)
- debian/watch: Adjust the URL
- debian/selinux-utils.install: Install manpages in Russian
- debian/libselinux1.symbols: Add new exported symbol
- debian/patches/python_nodefs.patch: Do not FTBFS if we have missing symbols because we are not linking against the libpython
Michael Biebl
- Build against PCRE2. (Closes: #913921, LP: #1792544)

Ubuntu 19.04 disco/main: Version 2.8-1build2 introduced
2019-01-14
Related packages
libselinux1 - SELinux runtime shared libraries