Bug 672308

Summary: SELinux is preventing /usr/bin/gnome-keyring-daemon from using the 'ipc_lock' capabilities.
Product: [Fedora] Fedora Reporter: Daniel Walsh <dwalsh>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED NOTABUG QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: rawhideCC: dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:d9c6f961dadf01737b6fe6edd442877657817947e47ca8ffb3cdfbd5766091fb
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-01-24 19:17:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Daniel Walsh 2011-01-24 19:17:06 UTC
SELinux is preventing /usr/bin/gnome-keyring-daemon from using the 'ipc_lock' capabilities.

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that gnome-keyring-daemon should have the ipc_lock capability by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep gnome-keyring-d /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                staff_u:staff_r:staff_t:s0-s0:c0.c1023
Target Context                staff_u:staff_r:staff_t:s0-s0:c0.c1023
Target Objects                Unknown [ capability ]
Source                        gnome-keyring-d
Source Path                   /usr/bin/gnome-keyring-daemon
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           gnome-keyring-2.91.4-4.fc15
Target RPM Packages           
Policy RPM                    selinux-policy-3.9.13-4.fc15
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed)
                              2.6.38-0.rc2.git0.1.fc15.x86_64 #1 SMP Sat Jan 22
                              19:02:39 UTC 2011 x86_64 x86_64
Alert Count                   4
First Seen                    Mon 24 Jan 2011 01:59:54 PM EST
Last Seen                     Mon 24 Jan 2011 02:01:16 PM EST
Local ID                      c7fcd043-7579-431f-b058-99f5fd911216

Raw Audit Messages
type=AVC msg=audit(1295895676.260:306): avc:  denied  { ipc_lock } for  pid=2094 comm="gnome-keyring-d" capability=14  scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=capability


type=SYSCALL msg=audit(1295895676.260:306): arch=x86_64 syscall=mlock success=yes exit=0 a0=7f73e3743000 a1=4000 a2=3 a3=22 items=0 ppid=1 pid=2094 auid=3267 uid=3267 gid=3267 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) ses=1 comm=gnome-keyring-d exe=/usr/bin/gnome-keyring-daemon subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)

Hash: gnome-keyring-d,staff_t,staff_t,capability,ipc_lock

audit2allow

#============= staff_t ==============
allow staff_t self:capability ipc_lock;

audit2allow -R

#============= staff_t ==============
allow staff_t self:capability ipc_lock;