Hide Forgot
SELinux is preventing /bin/dbus-daemon from read, open access on the file /usr/bin/gnome-keyring-daemon. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that dbus-daemon should be allowed read open access on the gnome-keyring-daemon file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep dbus-daemon /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:xdm_dbusd_t:s0-s0:c0.c1023 Target Context system_u:object_r:gkeyringd_exec_t:s0 Target Objects /usr/bin/gnome-keyring-daemon [ file ] Source dbus-daemon Source Path /bin/dbus-daemon Port <Unknown> Host (removed) Source RPM Packages dbus-1.4.6-5.fc15 Target RPM Packages gnome-keyring-3.0.3-1.fc15 Policy RPM selinux-policy-3.9.16-48.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.41.1-1.fc15.i686 #1 SMP Fri Nov 11 21:50:36 UTC 2011 i686 i686 Alert Count 1 First Seen Sat 10 Dec 2011 08:04:21 AM IST Last Seen Sat 10 Dec 2011 08:04:21 AM IST Local ID da36d415-f1b4-4980-9b84-095127bc0f10 Raw Audit Messages type=AVC msg=audit(1323484461.564:49): avc: denied { read open } for pid=1429 comm="dbus-daemon" name="gnome-keyring-daemon" dev=dm-1 ino=143514 scontext=system_u:system_r:xdm_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:gkeyringd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1323484461.564:49): arch=i386 syscall=execve success=no exit=EACCES a0=215caeb8 a1=215bef68 a2=215caf30 a3=1a items=0 ppid=1428 pid=1429 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm=dbus-daemon exe=/bin/dbus-daemon subj=system_u:system_r:xdm_dbusd_t:s0-s0:c0.c1023 key=(null) Hash: dbus-daemon,xdm_dbusd_t,gkeyringd_exec_t,file,read,open audit2allow #============= xdm_dbusd_t ============== allow xdm_dbusd_t gkeyringd_exec_t:file { read open }; audit2allow -R #============= xdm_dbusd_t ============== allow xdm_dbusd_t gkeyringd_exec_t:file { read open };
*** This bug has been marked as a duplicate of bug 708510 ***