Package: policycoreutils Version: 2.0.49-5 Severity: normal
=========== ROLES =============== role system_r types ssh_exec_t; The above policy is given as the output of audit2allow for the below kernel message: type=SELINUX_ERR msg=audit(1220928625.787:79): security_compute_sid: invalid context unconfined_u:system_r:user_t:s0-s0:c0.c1023 for scontext=unconfined_u:system_r:inetd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=process One possibility is to have the following, although it might be best to just flag the error and let the sys-admin decide on their own way of solving it (there are several possibilities that are equally valid): role_transition system_r ssh_exec_t user_r; -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]