Casey Schaufler wrote:
+static int smack_shm_associate(struct shmid_kernel *shp, int shmflg)
+{
+       smack_t *ssp = smack_of_shm(shp);
+       int rc;
+
+       if (ssp == NULL)
+               return 0;
+
+       rc = smk_curacc(ssp, MAY_READWRITE);
+       return rc;
+}
No read-only or write-only shm mappings?

Still thinking about it.


I think if you actually want to use this in a guard like policy you are going to need it (for at least shm and msgq). BTW, you never responded to my last email about the granularity required to make a high throughput front channel and a low bandwidth backchannel for guards.


-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to