On Wed, 2005-01-26 at 11:42, Tom London wrote: > Jan 26 08:33:18 localhost kernel: audit(1106757198.533:0): > security_compute_sid: invalid context user_u:system_r:system_crond_t > for scontext=user_u:system_r:initrc_t > tcontext=system_u:object_r:crond_exec_t tclass=process The error message isn't a permission denial; it is an invalid context, e.g. the role isn't authorized for the type in the targeted policy. Got a 'role system_r types system_crond_t;' anywhere? Likely just a failure to transfer over all of the necessary bits from the strict policy. -- Stephen Smalley <sds@xxxxxxxxxxxxxx> National Security Agency