On Thu, 2007-11-15 at 14:58 +0000, David Howells wrote: > David Howells <dhowells@xxxxxxxxxx> wrote: > > > Does it need to be accessible from kernel space? Can I pass a userspace > > buffer pointer through to the LSM? > > In fact, is the best way to do it to have a prototype like: > > int security_key_getsecurity(struct key *key, char **_buffer); > > Where the buffer is allocated by this function and attached to *_buffer and > the length returned if successful (though that last is unnecessary if a > NUL-terminated string is being returned); and if an error occurs, then that is > returned instead. Yes, sounds very similar to selinux_getprocattr(), just for keys rather than tasks and w/o a name distinguisher for multiple attributes on the task. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.