The feature list first:
You can also join the SELinux Mailing list, detail on how to is available at "http://www.nsa.gov/research/selinux/subscribe.shtml".
- Per-file security labeling support for yaffs2,
 - Filesystem images (yaffs2 and ext4) labeled at build time,
 - Kernel permission checks controlling Binder IPC,
 - Labeling of service sockets and socket files created by init,
 - Labeling of device nodes created by ueventd,
 - Flexible, configurable labeling of apps and app data directories,
 - Userspace permission checks controlling use of the Zygote socket commands,
 - Minimal port of SELinux userspace,
 - SELinux support for the Android toolbox,
 - Small TE policy written from scratch for Android,
 - Confined domains for system services and apps,
 - Use of MLS categories to isolate apps.
 
You can also join the SELinux Mailing list, detail on how to is available at "http://www.nsa.gov/research/selinux/subscribe.shtml".

No comments:
Post a Comment