Bug 2070764 - selinux-policy is preventing flatpak from updating / installing / removing flatpaks
Summary: selinux-policy is preventing flatpak from updating / installing / removing f...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: container-selinux
Version: 36
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: AcceptedBlocker
: 2070326 2071939 2072695 (view as bug list)
Depends On:
Blocks: F36FinalBlocker 2056303
TreeView+ depends on / blocked
 
Reported: 2022-03-31 20:49 UTC by Flo H.
Modified: 2023-04-17 19:54 UTC (History)
33 users (show)

Fixed In Version: container-selinux-2.181.0-2.fc35
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-04-26 07:30:23 UTC
Type: Bug
Embargoed:
robatino: needinfo-


Attachments (Terms of Use)
dnf system-upgrade log (2.10 MB, text/plain)
2022-04-21 08:34 UTC, Kamil Páral
no flags Details
rpm -qa (current) (77.70 KB, text/plain)
2022-04-21 08:35 UTC, Kamil Páral
no flags Details
journal snippet after running flatpak update (62.87 KB, text/plain)
2022-04-21 08:35 UTC, Kamil Páral
no flags Details

Description Flo H. 2022-03-31 20:49:28 UTC
Description of problem:

selinux-policy is preventing flatpak from updating (flatpak update)

especially prevention from reading /etc/passwd is critical.

Version-Release number of selected component (if applicable):
selinux-policy-36.5-1.fc36.noarch

How reproducible:
100% 

Steps to Reproduce:
1. flatpak update
2.
3.

Actual results:

Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Warning: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Warning: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Error: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Error: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Error: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Warning: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Error: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied

Expected results:
Update OK

Additional info:

here are related policy bugs
 - https://bugzilla.redhat.com/show_bug.cgi?id=2070350
 - https://bugzilla.redhat.com/show_bug.cgi?id=2070739
 - https://bugzilla.redhat.com/show_bug.cgi?id=2070742
 - https://bugzilla.redhat.com/show_bug.cgi?id=2053631
 - https://bugzilla.redhat.com/show_bug.cgi?id=2053634
 - https://bugzilla.redhat.com/show_bug.cgi?id=2070750
 -

Comment 1 Fedora Blocker Bugs Application 2022-03-31 20:52:29 UTC
Proposed as a Blocker for 36-final by Fedora user augenauf using the blocker tracking app because:

 There are a number of selinux-policy issues that prevent flatpak from updating. Can't have a system where flatpaks don't update

Comment 2 Milos Malik 2022-04-01 07:15:27 UTC
Please collect SELinux denials that appeared on that machine:

# ausearch -m avc -m user_avc -m selinux_err -i -ts today

Thank you.

Without the list of SELinux denials, we cannot analyze the issue and provide a fix or a workaround.

Comment 3 Flo H. 2022-04-01 13:23:24 UTC
Here is the output of `# ausearch -m avc -m user_avc -m selinux_err -i -ts today`;

https://paste.opensuse.org/43894250

Comment 4 Kamil Páral 2022-04-04 15:21:43 UTC
I installed fresh F36 Workstation, I have selinux-policy-36.5-1.fc36 and flatpak-1.12.7-1.fc36, and I can't reproduce this issue. I installed gedit from fedora flatpak, and "flatpak update" (which does nothing, because there are no updates) worked fine. Then I enabled flathub filtered repo, installed bitwarden, downgraded it to a previous commit, and updated it using "flatpak update" - also worked fine.

Comment 5 Flo H. 2022-04-04 17:44:37 UTC
I have an F36 VM where I don't experience the problem, I am only seeing this on a baremetal machine that I upgraded from F35. I agree, if I am the only person experiencing this, it's not a blocker bug...
How about I do 

    restorecon -vR /var/lib/flatpak

and we see if that changes anything?

Comment 6 Flo H. 2022-04-04 17:47:21 UTC
... or restorecon on /, since apparently /etc/passwd is affected as well.

Comment 7 Daniel Walsh 2022-04-04 18:17:24 UTC
You are not the only person seeing this problem.  It seems to be a combination of flatpak, container-selinux and snappy.

Comment 8 Flo H. 2022-04-04 19:12:29 UTC
Further observations:

 - restorecon -vR / did not fix the problem. 
 - running flatpak update with sudo works fine, "Updates complete".

Is there any other information or log that I can provide to help analyze this bug?

Comment 9 František Zatloukal 2022-04-04 19:15:30 UTC
Discussed during the 2022-04-04 blocker review meeting: [1]

The decision to punt the classification of this bug was made:

"Per kparal’s comment in-bug and lruzicka’s comment during the meeting, neither were able to reproduce this. We would like to have more widespread testing before we vote one way or the other on this bug, so we will punt for now."

[1] https://meetbot-raw.fedoraproject.org/fedora-blocker-review/2022-04-04/f36-blocker-review.2022-04-04-16.00.log.html

Comment 10 Daniel Walsh 2022-04-05 14:29:17 UTC
*** Bug 2071939 has been marked as a duplicate of this bug. ***

Comment 11 Daniel Walsh 2022-04-06 19:37:06 UTC
*** Bug 2072695 has been marked as a duplicate of this bug. ***

Comment 12 Daniel Walsh 2022-04-06 19:39:41 UTC
Zdenek is there anything I can do in the container-selinux package to stop this from happening.  Could I remove the existing container.pp and then re-add it? Although this would cause 
containers to blow up.

Comment 13 Zdenek Pytela 2022-04-07 09:49:33 UTC
I think the problem is selinux-policy is updated and rebuilt before custom modules are updated, and if the custom modules contain a reference to non-existing classes, failures are reported, the modules become inactive and types they provide do not exist.

Changing the order in specfile post/posttrans scriptlets could lead to other problems. I suggest removing the classes from F35 selinux-policy socket_class_set and rebuild all packages refering to socket_class_set.

Comment 14 Fedora Update System 2022-04-07 13:15:34 UTC
FEDORA-2022-ee2ba7ba12 has been submitted as an update to Fedora 36. https://bodhi.fedoraproject.org/updates/FEDORA-2022-ee2ba7ba12

Comment 15 Daniel Walsh 2022-04-07 13:27:25 UTC
Could you add the classes back to f36 policy without adding them to the socket_class_set, and then remove them in f37.

Comment 16 Flo H. 2022-04-07 17:37:17 UTC
I upgraded to the newly built package, still the same symptoms.

Here is another output of # ausearch -m avc -m user_avc -m selinux_err -i -ts today: https://paste.opensuse.org/63715694
Nothing changed.

For those who can't reproduce, I wanted to say that my install was a system-upgrade from f35.

Packages Altered:
    Upgrade  selinux-policy-36.6-1.fc36.noarch                           updates-testing
    Upgraded selinux-policy-36.5-1.fc36.noarch                           System
    Upgrade  selinux-policy-targeted-36.6-1.fc36.noarch                  updates-testing
    Upgraded selinux-policy-targeted-36.5-1.fc36.noarch                  System

    Upgrade  container-selinux-2:2.181.0-2.fc36.noarch commandline
    Upgraded container-selinux-2:2.181.0-1.fc36.noarch System

Comment 17 Martin Jackson 2022-04-07 17:43:52 UTC
Similar situation here. I had osbuild-composer and friends installed in my system-upgrade; osbuild-selinux was included in that and seemed to be blocking the recompilation of policy. @dwalsh helped with my installation and can share more details here if needed.

Comment 18 Fedora Update System 2022-04-07 18:01:53 UTC
FEDORA-2022-ee2ba7ba12 has been pushed to the Fedora 36 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2022-ee2ba7ba12`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-ee2ba7ba12

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 19 František Zatloukal 2022-04-11 17:44:51 UTC
Discussed during the 2022-04-11 blocker review meeting: [1]

The decision to classify this bug as an AcceptedBlocker was made:

"It violates the following criterion: “The installed system must be able to install software with the default console tool for the relevant software type. This should be interpreted to cover any other form of software distribution that we invent in future and include in an otherwise release-blocking deployment of Fedora..."."

[1] https://meetbot-raw.fedoraproject.org/fedora-blocker-review/2022-04-11/f36-blocker-review.2022-04-11-16.00.log.txt

Comment 20 Fedora Update System 2022-04-11 22:52:18 UTC
FEDORA-2022-ee2ba7ba12 has been pushed to the Fedora 36 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 21 Zdenek Pytela 2022-04-12 19:42:38 UTC
(In reply to Daniel Walsh from comment #15)
> Could you add the classes back to f36 policy without adding them to the
> socket_class_set, and then remove them in f37.

I actually did the opposite and removed them in F34 and F35. It requires container-selinux rebuilt with

selinux-policy-35.17-1.fc35 
https://bodhi.fedoraproject.org/updates/FEDORA-2022-c5bee6b70f

selinux-policy-34.27-1.fc34
https://bodhi.fedoraproject.org/updates/FEDORA-2022-eaef082697

Comment 22 Daniel Walsh 2022-04-12 19:46:13 UTC
Then how do we update them without causing the issue?

Comment 23 Zdenek Pytela 2022-04-13 14:51:41 UTC
> Then how do we update them without causing the issue?

If F34/F35 container-selinux is built with the new policy, expanded socket_class_set does not contain references to the classes which will be removed in F36.

> Could you add the classes back to f36 policy without adding them to the
> socket_class_set, and then remove them in f37.

This would actually need to be there till f37 as updates over 2 releases are supported. I'd rather have it resolved earlier.

Comment 24 Zdenek Pytela 2022-04-13 17:46:21 UTC
*** Bug 2070326 has been marked as a duplicate of this bug. ***

Comment 25 Fedora Update System 2022-04-15 10:59:23 UTC
FEDORA-2022-c5bee6b70f has been submitted as an update to Fedora 35. https://bodhi.fedoraproject.org/updates/FEDORA-2022-c5bee6b70f

Comment 26 Fedora Update System 2022-04-15 14:32:01 UTC
FEDORA-2022-c5bee6b70f has been pushed to the Fedora 35 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2022-c5bee6b70f`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-c5bee6b70f

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 27 Kamil Páral 2022-04-17 11:46:12 UTC
Zdenek, the update from comment 25 is for F35, so I assume that would avoid the problem when upgrading. But how do we fix the problem for people who already upgraded to F36? (Turns out my production system is affected by this, so I can easily test any proposed F36 update).

Comment 28 Flo H. 2022-04-17 22:43:57 UTC
I had filed this bug report against f36, and I can confirm that I am not facing the issue anymore since update


End time       : Fri 15 Apr 2022 11:58:35 PM 

    Upgrade  flatpak-1.12.7-2.fc36.x86_64                @fedora
    Upgraded flatpak-1.12.7-1.fc36.x86_64                @@System
    Upgrade  flatpak-libs-1.12.7-2.fc36.x86_64           @fedora
    Upgraded flatpak-libs-1.12.7-1.fc36.x86_64           @@System
    Upgrade  flatpak-selinux-1.12.7-2.fc36.noarch        @fedora
    Upgraded flatpak-selinux-1.12.7-1.fc36.noarch        @@System
    Upgrade  flatpak-session-helper-1.12.7-2.fc36.x86_64 @fedora
    Upgraded flatpak-session-helper-1.12.7-1.fc36.x86_64 @@System

Comment 29 Kamil Páral 2022-04-18 18:01:05 UTC
(In reply to Flo H. from comment #28)
>     Upgrade  flatpak-1.12.7-2.fc36.x86_64                @fedora

Comment 30 Kamil Páral 2022-04-18 18:02:07 UTC
(In reply to Flo H. from comment #28)
>     Upgrade  flatpak-1.12.7-2.fc36.x86_64                @fedora

I still see the issue even with these package versions.

Comment 31 Adam Williamson 2022-04-20 21:34:37 UTC
So as regards the blocker status of this bug: per the criteria, it's only clearly a blocker if the bug still occurs on a clean upgrade from fully-updated Fedora 35 to Fedora 36. Is this the case? If not, we should probably drop the AcceptedBlocker status. Remaining problems for people who upgraded while the bug was present are still an issue, but are less clearly release-blocking.

Comment 32 Kamil Páral 2022-04-21 07:27:04 UTC
Adam, we don't have a reproducer, so we don't know how to verify this. It seems to be happening randomly just for certain systems during upgrade. All my test VMs were unaffected, my production system was affected.

Zdenek, do you have some advise how to verify if this was fixed at least for new upgrades? Also, what's going to happen to existing F36 users (see comment 27)? Thanks.

Comment 33 Zdenek Pytela 2022-04-21 08:06:54 UTC
(In reply to Kamil Páral from comment #32)
> Adam, we don't have a reproducer, so we don't know how to verify this. It
> seems to be happening randomly just for certain systems during upgrade. All
> my test VMs were unaffected, my production system was affected.
> 
> Zdenek, do you have some advise how to verify if this was fixed at least for
> new upgrades? Also, what's going to happen to existing F36 users (see
> comment 27)? Thanks.

I tried the upgrade several times successfully, but it always was a clean system with just the named additional packages installed.

I didn't run into problems with existing F36 installations either, please add some details. It may be dependent on the packages version before and after the update.

The packages list contains: snapd-selinux container-selinux flatpak-selinux osbuild-selinux

Comment 34 Kamil Páral 2022-04-21 08:34:16 UTC
> I tried the upgrade several times successfully, but it always was a clean system with just the named additional packages installed.

Yes, I tried that as well, had no problems. It seems we can't trigger the bug like this. There's something different about real-world systems. Or we just got lucky/unlucky.

> I didn't run into problems with existing F36 installations either, please add some details.

OK, I'll upload logs. Anytime I try `flatpak update`, I see:

Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Warning: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
Warning: Can't open system repo default: While opening repository /var/lib/flatpak/repo: opening repo: opendir(/var/lib/flatpak/repo): Permission denied
Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak does not exist in password file entry
...

Comment 35 Kamil Páral 2022-04-21 08:34:55 UTC
Created attachment 1874009 [details]
dnf system-upgrade log

Comment 36 Kamil Páral 2022-04-21 08:35:16 UTC
Created attachment 1874010 [details]
rpm -qa (current)

Comment 37 Kamil Páral 2022-04-21 08:35:50 UTC
Created attachment 1874011 [details]
journal snippet after running flatpak update

Comment 38 Zdenek Pytela 2022-04-21 09:22:07 UTC
(In reply to Kamil Páral from comment #34)
> > I didn't run into problems with existing F36 installations either, please add some details.
> 
> OK, I'll upload logs. Anytime I try `flatpak update`, I see:
> 
> Warning: Failed to get revokefs-fuse socket from system-helper: User flatpak
> does not exist in password file entry
This means the flatpak package was not installed successfully, reinstalling should resolve the problem.

Comment 39 Kamil Páral 2022-04-21 09:37:11 UTC
Oh, great. I can confirm that `dnf reinstall flatpak\*` fixed the problem.

So is this related to bug 2056303 or a different problem?

I see a lot of selinux-related errors in my upgrade log, related to flatpak but not just flatpak, many other packages as well. Here's a flatpak-related snippet:

dub 14 11:02:00 hydra kernel: SELinux:  Context system_u:object_r:flatpak_helper_exec_t:s0 is not valid (left unmapped).
dub 14 11:02:00 hydra audit[6040]: AVC avc:  denied  { mac_admin } for  pid=6040 comm="restorecon" capability=33  scontext=system_u:system_r:setfiles_t:s0 tcontext=system_u:system_r:setfiles_t:s0 tclass=capability2 permissive=0
dub 14 11:02:00 hydra audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:flatpak_helper_exec_t:s0"
dub 14 11:02:00 hydra audit[6040]: SYSCALL arch=c000003e syscall=189 success=no exit=-22 a0=7ffc9bf9d630 a1=7f84a1766251 a2=561fa35324c0 a3=2b items=0 ppid=5673 pid=6040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="restorecon" exe="/usr/sbin/setfiles" subj=system_u:system_r:setfiles_t:s0 key=(null)
dub 14 11:02:00 hydra audit: PROCTITLE proctitle=2F7362696E2F726573746F7265636F6E002D65002F737973002D65002F70726F63002D65002F6D6E74002D65002F7661722F746D70002D65002F686F6D65002D65002F726F6F74002D65002F746D70002D69002D52002D66002D
dub 14 11:02:00 hydra kernel: kauditd_printk_skb: 9 callbacks suppressed
dub 14 11:02:00 hydra kernel: audit: type=1400 audit(1649926920.531:244): avc:  denied  { mac_admin } for  pid=6040 comm="restorecon" capability=33  scontext=system_u:system_r:setfiles_t:s0 tcontext=system_u:system_r:setfiles_t:s0 tclass=capability2 permissive=0
dub 14 11:02:00 hydra kernel: audit: type=1401 audit(1649926920.531:244): op=setxattr invalid_context="system_u:object_r:flatpak_helper_exec_t:s0"

Would you be able to compile a list of packages which are likely to be affected? We could issue an F36 'bump' update for those packages, so that all F36 users receive the fix automatically. Or is there a better solution?

Comment 40 Zdenek Pytela 2022-04-21 10:52:34 UTC
(In reply to Kamil Páral from comment #39)
> Oh, great. I can confirm that `dnf reinstall flatpak\*` fixed the problem.
> 
> So is this related to bug 2056303 or a different problem?
> 
It rather is bz#2070350

> I see a lot of selinux-related errors in my upgrade log, related to flatpak
> but not just flatpak, many other packages as well. Here's a flatpak-related
> snippet:
> 
> dub 14 11:02:00 hydra kernel: SELinux:  Context
> system_u:object_r:flatpak_helper_exec_t:s0 is not valid (left unmapped).
> dub 14 11:02:00 hydra audit[6040]: AVC avc:  denied  { mac_admin } for 
> pid=6040 comm="restorecon" capability=33 
> scontext=system_u:system_r:setfiles_t:s0
> tcontext=system_u:system_r:setfiles_t:s0 tclass=capability2 permissive=0
> dub 14 11:02:00 hydra audit: SELINUX_ERR op=setxattr
> invalid_context="system_u:object_r:flatpak_helper_exec_t:s0"
> dub 14 11:02:00 hydra audit[6040]: SYSCALL arch=c000003e syscall=189
> success=no exit=-22 a0=7ffc9bf9d630 a1=7f84a1766251 a2=561fa35324c0 a3=2b
> items=0 ppid=5673 pid=6040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0
> egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="restorecon"
> exe="/usr/sbin/setfiles" subj=system_u:system_r:setfiles_t:s0 key=(null)
> dub 14 11:02:00 hydra audit: PROCTITLE
> proctitle=2F7362696E2F726573746F7265636F6E002D65002F737973002D65002F70726F630
> 02D65002F6D6E74002D65002F7661722F746D70002D65002F686F6D65002D65002F726F6F7400
> 2D65002F746D70002D69002D52002D66002D
> dub 14 11:02:00 hydra kernel: kauditd_printk_skb: 9 callbacks suppressed
> dub 14 11:02:00 hydra kernel: audit: type=1400 audit(1649926920.531:244):
> avc:  denied  { mac_admin } for  pid=6040 comm="restorecon" capability=33 
> scontext=system_u:system_r:setfiles_t:s0
> tcontext=system_u:system_r:setfiles_t:s0 tclass=capability2 permissive=0
> dub 14 11:02:00 hydra kernel: audit: type=1401 audit(1649926920.531:244):
> op=setxattr invalid_context="system_u:object_r:flatpak_helper_exec_t:s0"
This is a result of previously failed updates.

> Would you be able to compile a list of packages which are likely to be
> affected? We could issue an F36 'bump' update for those packages, so that
> all F36 users receive the fix automatically. Or is there a better solution?
I don't have any information such a rebuild would help, reproducing steps are needed to assess a problem.

Comment 41 Kamil Páral 2022-04-21 11:13:55 UTC
> It rather is bz#2070350

Hm. I upgraded to that flatpak version (flatpak-1.12.7-2.fc36) during my system upgrade, but I still ended up with a broken system. Why?

> This is a result of previously failed updates.

So what was the root cause in my case? Is that problem already solved in some selinux-policy update (F35 or F36)?

> I don't have any information such a rebuild would help, reproducing steps are needed to assess a problem.

What can we do for existing F36 systems at least related to this flatpak issue, then? A simple reinstall fixed it for me, and it's likely that there are many more machines like mine. Isn't rebuilding at least flatpak a good idea?

Comment 42 Zdenek Pytela 2022-04-21 16:58:50 UTC
(In reply to Kamil Páral from comment #41)
> > It rather is bz#2070350
> 
> Hm. I upgraded to that flatpak version (flatpak-1.12.7-2.fc36) during my
> system upgrade, but I still ended up with a broken system. Why?
Please share some data, like dnf command output, package versions before and after, AVC denials, semodule command output. I am not aware of any problem based just on this description.

> > This is a result of previously failed updates.
> 
> So what was the root cause in my case? Is that problem already solved in
> some selinux-policy update (F35 or F36)?
There are not much data, so I don't really know. It might be that the new flatpak package needs rules brought by the flatpak-selinux package, so kind of ordering problem, but this is just a guess and needs to be verified.

> > I don't have any information such a rebuild would help, reproducing steps are needed to assess a problem.
> 
> What can we do for existing F36 systems at least related to this flatpak
> issue, then? A simple reinstall fixed it for me, and it's likely that there
> are many more machines like mine. Isn't rebuilding at least flatpak a good
> idea?
I am not convinced it would make any change.

Comment 43 Kamil Páral 2022-04-22 07:16:13 UTC
(In reply to Zdenek Pytela from comment #42)
> Please share some data, like dnf command output, package versions before and
> after, AVC denials, semodule command output. I am not aware of any problem
> based just on this description.

I attached the whole upgrade log in comment 35. Doesn't it contain everything needed? It contains both the whole journal and the whole dnf transaction output. How can I gather additional data? (Note that I'm no longer affected after I reinstalled flatpak).

Comment 44 Chen Chen 2022-04-24 02:50:17 UTC
That's odd. Your system repor(In reply to Kamil Páral from comment #43)
> (In reply to Zdenek Pytela from comment #42)
> > Please share some data, like dnf command output, package versions before and
> > after, AVC denials, semodule command output. I am not aware of any problem
> > based just on this description.
> 
> I attached the whole upgrade log in comment 35. Doesn't it contain
> everything needed? It contains both the whole journal and the whole dnf
> transaction output. How can I gather additional data? (Note that I'm no
> longer affected after I reinstalled flatpak).

That's odd because your system reported "User flatpak does not exist in password file entry", while the script[1] to add user 'flatpak' (useradd -r -g flatpak```) was committed 3 years ago.

[1] https://src.fedoraproject.org/rpms/flatpak/c/b6456a51bb98ec1bd6b6dbdc5bcc46bad2f1930a

Comment 45 Kamil Páral 2022-04-25 10:39:53 UTC
Chen, I assume that's because selinux didn't allow the process to read /etc/passwd or similar.

Comment 46 Fedora Update System 2022-04-26 07:30:23 UTC
FEDORA-2022-c5bee6b70f has been pushed to the Fedora 35 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 51 Bekean Loinse 2023-04-03 02:45:26 UTC Comment hidden (spam)
Comment 52 Usu936193 2023-04-17 19:47:40 UTC Comment hidden (spam)

Note You need to log in before you can comment on or make changes to this bug.