targeted policy: crond_t now invalid for initrc_t ?

Stephen Smalley sds at epoch.ncsc.mil
Wed Jan 26 17:08:51 UTC 2005


On Wed, 2005-01-26 at 11:42, Tom London wrote:
> Jan 26 08:33:18 localhost kernel: audit(1106757198.533:0):
> security_compute_sid:  invalid context user_u:system_r:system_crond_t
> for scontext=user_u:system_r:initrc_t
> tcontext=system_u:object_r:crond_exec_t tclass=process

The error message isn't a permission denial; it is an invalid context,
e.g. the role isn't authorized for the type in the targeted policy.  Got
a 'role system_r types system_crond_t;' anywhere?  Likely just a failure
to transfer over all of the necessary bits from the strict policy.

-- 
Stephen Smalley <sds at epoch.ncsc.mil>
National Security Agency




More information about the fedora-selinux-list mailing list