Comments

30 Comments

@bojan, thank you that's exactly what happened. Sorry about that!

Evolution fails to start, running from a command line results in: evolution: symbol lookup error: /lib64/libebook-contacts-1.2.so.4: undefined symbol: _ZNK4i18n12phonenumbers15PhoneNumberUtil20ParseAndKeepRawInputERKNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEES9_PNS0_11PhoneNumberE

Evolution was setup with my gmail account.

Problem: cannot install the best update candidate for package rpmdistro-repoquery-0^20231102git539d4c0-4.fc41.noarch - nothing provides dnf4 needed by rpmdistro-repoquery-0^20241122git5c26eb4-2.fc41.noarch from updates-testing

https://bugzilla.redhat.com/show_bug.cgi?id=2209408

Looks like there was a pull request submitted a while ago... https://src.fedoraproject.org/rpms/rpmdistro-repoquery/pull-request/1

karma

Resolved avc denials that were observed attempting to run a W11 VM from gnome boxes Both issues were observed with with swtpm-0.8.1-7 Thanks

BZ#2278905 Creating AND using VMs not working IF swtpm is used AND IF SELinux is enabled; virt-manager is used; creating and using swtpm VMs causes different AVC denial logs
karma

After updating to swtpm-0.8.1.7. Windows 11 VM on gnome boxes failed to start, observed the following avc denials:

May 04 09:16:35 grumpey0 audit[3411]: AVC avc: denied { create } for pid=3411 comm="swtpm" name="1-win11-2-swtpm.sock" scontext=unconfined_u:unconfined_r:svirt_t:s0:c31,c772 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=sock_file permissive=0 May 04 09:16:35 grumpey0 audit[3420]: AVC avc: denied { create } for pid=3420 comm="swtpm" name="2-win11-2-swtpm.sock" scontext=unconfined_u:unconfined_r:svirt_t:s0:c256,c313 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=sock_file permissive=0 May 04 09:16:51 grumpey0 audit[3522]: AVC avc: denied { create } for pid=3522 comm="swtpm" name="3-win11-2-swtpm.sock" scontext=unconfined_u:unconfined_r:svirt_t:s0:c477,c1002 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=sock_file permissive=0 May 04 09:18:14 grumpey0 audit[3679]: AVC avc: denied { create } for pid=3679 comm="swtpm" name="4-win11-2-swtpm.sock" scontext=unconfined_u:unconfined_r:svirt_t:s0:c521,c560 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=sock_file permissive=0 May 04 09:20:55 grumpey0 audit[4478]: AVC avc: denied { create } for pid=4478 comm="swtpm" name="5-win11-2-swtpm.sock" scontext=unconfined_u:unconfined_r:svirt_t:s0:c423,c863 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=sock_file permissive=0

After installing swtpm-0.8.1.8, I was able to start the VM and I am not currently observing any denials.

karma

Thanks

karma

Works, thanks!

BZ#2118287 Updating kernel arguments with grubby --update-kernel=ALL results in kernel not booting after kernel upgrade

I'm still able to reproduce, BZ#2118287 Thanks

BZ#2113883 grub2-mkconfig -o /boot/grub2.cfg doesn't update pre-installed kernel cmdline after changing GRUB_CMDLINE_LINUX
BZ#2118287 Updating kernel arguments with grubby --update-kernel=ALL results in kernel not booting after kernel upgrade
BZ#2118292 when installing a custom kernel rhgb quiet are added to kernel argument

During upgrade observed the following:

Upgrading : container-selinux-2:2.189.0-1.fc36.noarch 34/78 Running scriptlet: container-selinux-2:2.189.0-1.fc36.noarch 34/78 neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10384 (neverallow base_typeattr_18 scsi_generic_device_t (blk_file (write append))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2389 (allow container_domain device_node (blk_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10383 (neverallow base_typeattr_18 scsi_generic_device_t (chr_file (write append))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2297 (allow container_device_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2300 (allow container_device_plugin_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2316 (allow container_device_plugin_init_t device_node (chr_file (ioctl read write getattr lock append open))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2390 (allow container_domain device_node (chr_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10382 (neverallow base_typeattr_17 scsi_generic_device_t (blk_file (read))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2389 (allow container_domain device_node (blk_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10381 (neverallow base_typeattr_17 scsi_generic_device_t (chr_file (read))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2297 (allow container_device_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2300 (allow container_device_plugin_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2316 (allow container_device_plugin_init_t device_node (chr_file (ioctl read write getattr lock append open))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2390 (allow container_domain device_node (chr_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10380 (neverallow base_typeattr_16 fixed_disk_device_t (blk_file (write append))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2389 (allow container_domain device_node (blk_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10379 (neverallow base_typeattr_16 fixed_disk_device_t (chr_file (write append))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2297 (allow container_device_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2300 (allow container_device_plugin_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2316 (allow container_device_plugin_init_t device_node (chr_file (ioctl read write getattr lock append open))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2390 (allow container_domain device_node (chr_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10378 (neverallow base_typeattr_15 fixed_disk_device_t (blk_file (read))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2389 (allow container_domain device_node (blk_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:10377 (neverallow base_typeattr_15 fixed_disk_device_t (chr_file (read))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2297 (allow container_device_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2300 (allow container_device_plugin_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2316 (allow container_device_plugin_init_t device_node (chr_file (ioctl read write getattr lock append open))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2390 (allow container_domain device_node (chr_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:7770 (neverallow base_typeattr_7 unlabeled_t (file (entrypoint))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:1931 (allow spc_t unlabeled_t (file (entrypoint)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:4890 (neverallow base_typeattr_2 memory_device_t (blk_file (write append))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2389 (allow container_domain device_node (blk_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:4889 (neverallow base_typeattr_2 memory_device_t (chr_file (write append))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2297 (allow container_device_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2300 (allow container_device_plugin_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2316 (allow container_device_plugin_init_t device_node (chr_file (ioctl read write getattr lock append open))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2390 (allow container_domain device_node (chr_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:4888 (neverallow base_typeattr_1 memory_device_t (blk_file (read))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2389 (allow container_domain device_node (blk_file (ioctl read write getattr lock append open)))

neverallow check failed at /var/lib/selinux/targeted/tmp/modules/100/base/cil:4887 (neverallow base_typeattr_1 memory_device_t (chr_file (read))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2297 (allow container_device_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2300 (allow container_device_plugin_t device_node (chr_file (ioctl read write getattr lock append open))) <root> allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2316 (allow container_device_plugin_init_t device_node (chr_file (ioctl read write getattr lock append open))) <root> booleanif at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2387 true at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2388 allow at /var/lib/selinux/targeted/tmp/modules/200/container/cil:2390 (allow container_domain device_node (chr_file (ioctl read write getattr lock append open)))

Failed to generate binary /usr/sbin/semodule: Failed!

Did something happen with the i686 package for mesa-vulkan-drivers?

sudo dnf info mesa-vulkan-drivers Last metadata expiration check: 0:14:15 ago on Fri 03 Jun 2022 04:08:36 AM EDT. Installed Packages Name : mesa-vulkan-drivers Version : 22.1.1 Release : 1.fc36 Architecture : x86_64 Size : 21 M Source : mesa-22.1.1-1.fc36.src.rpm Repository : @System From repo : updates-testing Summary : Mesa Vulkan drivers URL : http://www.mesa3d.org License : MIT Description : The drivers with support for the Vulkan API.

Available Packages Name : mesa-vulkan-drivers Version : 22.0.3 Release : 1.fc36 Architecture : i686 Size : 5.1 M Source : mesa-22.0.3-1.fc36.src.rpm Repository : updates Summary : Mesa Vulkan drivers URL : http://www.mesa3d.org License : MIT Description : The drivers with support for the Vulkan API

User Icon grumpey commented & provided feedback on gdm-42.0-2.fc36 3 years ago
karma

Corrects screen blanking issue and power on external monitor issue for me. Thanks!

BZ#2071394 Connecting/disconnecting an external monitor or VM resizing switches GNOME to the login screen
BZ#2063410 Printer setting: can't scroll media size list
BZ#2060751 “hunspell -D” lists dictionaries twice
karma

Thanks!

BZ#2063040 Can shell integration not be enabled by default or put into a subpackage