gnome-keyring-daemon couldn't allocate secure memory
Gnome-keyring-daemon is failing to allocate memory that cannot be swapped out (that's what it calls “secure memory”). The reason it tries to do that is that writing sensitive data (passwords or keys) to swap is a risk. It's only a risk against a specific threat, though: the threat that someone will steal your disk, but not your powered-on computer. It's irrelevant if you have no swap space or encrypt your swap space. It's also irrelevant if your computer is in a physically secure location. It is relevant if your computer is a laptop and you're worried about an unsophisticated thief, but unsophisticated thieves tend to care about your laptop's resale value and not your passwords (however, there is a burgeoning market for resale of corporate passwords). If you're worried about sophisticated thieves, you should be encrypting your confidential data and your swap space anyway.
Allocating memory that cannot be swapped out is done by the mlock
system call, which locks a memory page at its present physical location. This requires privileges because otherwise an application could saturate the RAM. Under Linux, the appropriate privilege is the CAP_IPC_LOCK
capability. Under Solaris, it's PRIV_SYS_CONFIG
.
Under Linux, any process can lock a small amount of memory, determined by the RLIMIT_MEMLOCK
limit. Under most shells, ulimit -l
will show how much memory each unprivileged process may lock (in kB). If the limit is 0, check whether it's a hard limit (imposed by root, listed with ulimit -Hl
) or a soft limit (self-imposed, listed by ulimit -Sl
). You can raise the soft limit up to the hard limit with e.g. ulimit -l 64
. To raise the hard limit, edit /etc/security/limits.conf
(the syntax is documented in the file); this file is read when you log in.
TL,DR: it's a security feature, which you probably don't care about. Don't sweat it.