This is a variation of the question #13: how do user applications request security services from the kernel.