Description of problem: SELinux is preventing mdadm from 'search' accesses on the directory /dev/binderfs. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that mdadm should be allowed search access on the binderfs directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'mdadm' --raw | audit2allow -M my-mdadm # semodule -X 300 -i my-mdadm.pp Additional Information: Source Context system_u:system_r:mdadm_t:s0 Target Context system_u:object_r:binderfs_t:s0 Target Objects /dev/binderfs [ dir ] Source mdadm Source Path mdadm Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-42.16-1.fc43.noarch Local Policy RPM selinux-policy-targeted-42.16-1.fc43.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 6.17.8-300.fc43.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Nov 14 01:47:12 UTC 2025 x86_64 Alert Count 3444 First Seen 2025-11-21 19:56:44 EST Last Seen 2025-11-26 00:00:09 EST Local ID 7cd730ef-4757-4610-a223-c141017d4838 Raw Audit Messages type=AVC msg=audit(1764133209.590:19110): avc: denied { search } for pid=1898232 comm="mdadm" name="/" dev="binder" ino=1 scontext=system_u:system_r:mdadm_t:s0 tcontext=system_u:object_r:binderfs_t:s0 tclass=dir permissive=0 Hash: mdadm,mdadm_t,binderfs_t,dir,search Version-Release number of selected component: selinux-policy-targeted-42.16-1.fc43.noarch Additional info: reporter: libreport-2.17.15 hashmarkername: setroubleshoot kernel: 6.17.8-300.fc43.x86_64 reason: SELinux is preventing mdadm from 'search' accesses on the directory /dev/binderfs. component: selinux-policy type: libreport package: selinux-policy-targeted-42.16-1.fc43.noarch component: selinux-policy
Created attachment 2116236 [details] File: os_info
Created attachment 2116237 [details] File: description
Hi, Can you check if adding the requested permission is sufficient? # cat local_search_binderfs.cil (allow mdadm_t binderfs_t (dir (getattr search))) # semodule -i local_search_binderfs.cil
*** Bug 2417295 has been marked as a duplicate of this bug. ***
(In reply to Zdenek Pytela from comment #3) > Hi, > > Can you check if adding the requested permission is sufficient? > > # cat local_search_binderfs.cil > (allow mdadm_t binderfs_t (dir (getattr search))) > # semodule -i local_search_binderfs.cil I've made that change but I have no idea how to replicate the original AVD.
FEDORA-2025-ccac3b202f (selinux-policy-42.18-1.fc43) has been submitted as an update to Fedora 43. https://bodhi.fedoraproject.org/updates/FEDORA-2025-ccac3b202f
FEDORA-2025-ccac3b202f has been pushed to the Fedora 43 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-ccac3b202f` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-ccac3b202f See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2025-ccac3b202f (selinux-policy-42.18-1.fc43) has been pushed to the Fedora 43 stable repository. If problem still persists, please make note of it in this bug report.