targeted policy: crond_t now invalid for initrc_t ?
Stephen Smalley
sds at epoch.ncsc.mil
Wed Jan 26 17:08:51 UTC 2005
On Wed, 2005-01-26 at 11:42, Tom London wrote:
> Jan 26 08:33:18 localhost kernel: audit(1106757198.533:0):
> security_compute_sid: invalid context user_u:system_r:system_crond_t
> for scontext=user_u:system_r:initrc_t
> tcontext=system_u:object_r:crond_exec_t tclass=process
The error message isn't a permission denial; it is an invalid context,
e.g. the role isn't authorized for the type in the targeted policy. Got
a 'role system_r types system_crond_t;' anywhere? Likely just a failure
to transfer over all of the necessary bits from the strict policy.
--
Stephen Smalley <sds at epoch.ncsc.mil>
National Security Agency
More information about the fedora-selinux-list
mailing list