Bug 2417293 - SELinux is preventing mdadm from 'search' accesses on the directory /dev/binderfs.
Summary: SELinux is preventing mdadm from 'search' accesses on the directory /dev/bind...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 43
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:18cb68ea450fc3f487820c11bb8...
: 2417295 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-11-26 16:49 UTC by Raman Gupta
Modified: 2025-12-12 04:11 UTC (History)
8 users (show)

Fixed In Version: selinux-policy-42.18-1.fc43
Clone Of:
Environment:
Last Closed: 2025-12-04 00:52:19 UTC
Type: ---
Embargoed:
zpytela: mirror+


Attachments (Terms of Use)
File: os_info (630 bytes, text/plain)
2025-11-26 16:49 UTC, Raman Gupta
no flags Details
File: description (1.85 KB, text/plain)
2025-11-26 16:49 UTC, Raman Gupta
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Github fedora-selinux selinux-policy pull 2965 0 None open Allow mdadm search filesystem_type directories 2025-11-26 18:40:11 UTC
Red Hat Issue Tracker FC-2706 0 None None None 2025-12-12 04:11:11 UTC

Description Raman Gupta 2025-11-26 16:49:30 UTC
Description of problem:
SELinux is preventing mdadm from 'search' accesses on the directory /dev/binderfs.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that mdadm should be allowed search access on the binderfs directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'mdadm' --raw | audit2allow -M my-mdadm
# semodule -X 300 -i my-mdadm.pp

Additional Information:
Source Context                system_u:system_r:mdadm_t:s0
Target Context                system_u:object_r:binderfs_t:s0
Target Objects                /dev/binderfs [ dir ]
Source                        mdadm
Source Path                   mdadm
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-42.16-1.fc43.noarch
Local Policy RPM              selinux-policy-targeted-42.16-1.fc43.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.17.8-300.fc43.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Fri Nov 14 01:47:12 UTC 2025
                              x86_64
Alert Count                   3444
First Seen                    2025-11-21 19:56:44 EST
Last Seen                     2025-11-26 00:00:09 EST
Local ID                      7cd730ef-4757-4610-a223-c141017d4838

Raw Audit Messages
type=AVC msg=audit(1764133209.590:19110): avc:  denied  { search } for  pid=1898232 comm="mdadm" name="/" dev="binder" ino=1 scontext=system_u:system_r:mdadm_t:s0 tcontext=system_u:object_r:binderfs_t:s0 tclass=dir permissive=0


Hash: mdadm,mdadm_t,binderfs_t,dir,search

Version-Release number of selected component:
selinux-policy-targeted-42.16-1.fc43.noarch

Additional info:
reporter:       libreport-2.17.15
hashmarkername: setroubleshoot
kernel:         6.17.8-300.fc43.x86_64
reason:         SELinux is preventing mdadm from 'search' accesses on the directory /dev/binderfs.
component:      selinux-policy
type:           libreport
package:        selinux-policy-targeted-42.16-1.fc43.noarch
component:      selinux-policy

Comment 1 Raman Gupta 2025-11-26 16:49:33 UTC
Created attachment 2116236 [details]
File: os_info

Comment 2 Raman Gupta 2025-11-26 16:49:34 UTC
Created attachment 2116237 [details]
File: description

Comment 3 Zdenek Pytela 2025-11-26 18:38:28 UTC
Hi,

Can you check if adding the requested permission is sufficient?

# cat local_search_binderfs.cil
(allow mdadm_t binderfs_t (dir (getattr search)))
# semodule -i local_search_binderfs.cil

Comment 4 Zdenek Pytela 2025-11-26 18:40:51 UTC
*** Bug 2417295 has been marked as a duplicate of this bug. ***

Comment 5 Raman Gupta 2025-11-26 18:47:35 UTC
(In reply to Zdenek Pytela from comment #3)
> Hi,
> 
> Can you check if adding the requested permission is sufficient?
> 
> # cat local_search_binderfs.cil
> (allow mdadm_t binderfs_t (dir (getattr search)))
> # semodule -i local_search_binderfs.cil

I've made that change but I have no idea how to replicate the original AVD.

Comment 6 Fedora Update System 2025-12-02 19:32:42 UTC
FEDORA-2025-ccac3b202f (selinux-policy-42.18-1.fc43) has been submitted as an update to Fedora 43.
https://bodhi.fedoraproject.org/updates/FEDORA-2025-ccac3b202f

Comment 7 Fedora Update System 2025-12-03 01:48:54 UTC
FEDORA-2025-ccac3b202f has been pushed to the Fedora 43 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-ccac3b202f`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-ccac3b202f

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 8 Fedora Update System 2025-12-04 00:52:19 UTC
FEDORA-2025-ccac3b202f (selinux-policy-42.18-1.fc43) has been pushed to the Fedora 43 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.