Second, we analyzed the security of Linux system calls one
by one. Security inspection policies were given to those system
calls which involved in secure matter. Then corresponding
security inspection mechanisms were inserted. We also joined
some new system calls, such as audit, placing security level of
subjects/objects, reading security level of subjects/objects,
privilege manipulating.