> Of course this can be somewhat worked around by adjusting the SELinux policy
> (allowing blanket noatsecure permission for init_t and possibly others) or
> by pam_limits (for components using PAM).

Correction: pam_limits also usually doesn't help here, as it's often followed 
by another secureexec (for example when login (local_login_t) executes the 
shell with transition to unconfined_t).

2T

Reply via email to