The feature list first:
You can also join the SELinux Mailing list, detail on how to is available at "http://www.nsa.gov/research/selinux/subscribe.shtml".
- Per-file security labeling support for yaffs2,
- Filesystem images (yaffs2 and ext4) labeled at build time,
- Kernel permission checks controlling Binder IPC,
- Labeling of service sockets and socket files created by init,
- Labeling of device nodes created by ueventd,
- Flexible, configurable labeling of apps and app data directories,
- Userspace permission checks controlling use of the Zygote socket commands,
- Minimal port of SELinux userspace,
- SELinux support for the Android toolbox,
- Small TE policy written from scratch for Android,
- Confined domains for system services and apps,
- Use of MLS categories to isolate apps.
You can also join the SELinux Mailing list, detail on how to is available at "http://www.nsa.gov/research/selinux/subscribe.shtml".
No comments:
Post a Comment