Description of problem: I ran firefox in a sandbox using flash. SELinux is preventing fusermount from 'write' accesses on the directory /. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow use to fusefs home dirs Then you must tell SELinux about this by enabling the 'use_fusefs_home_dirs' boolean. You can read 'None' man page for more details. Do setsebool -P use_fusefs_home_dirs 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that fusermount should be allowed write access on the directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep fusermount /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:sandbox_web_t:s0:c286,c6 40 Target Context system_u:object_r:fusefs_t:s0 Target Objects / [ dir ] Source fusermount Source Path fusermount Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages filesystem-3.2-35.fc23.x86_64 Policy RPM selinux-policy-3.13.1-152.fc23.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 4.2.3-300.fc23.x86_64 #1 SMP Mon Oct 5 15:42:54 UTC 2015 x86_64 x86_64 Alert Count 1 First Seen 2015-10-29 19:55:17 CET Last Seen 2015-10-29 19:55:17 CET Local ID 5defdb1d-f91f-4fe3-a34f-acb16b8137b0 Raw Audit Messages type=AVC msg=audit(1446144917.768:655): avc: denied { write } for pid=4969 comm="fusermount" name="/" dev="fuse" ino=1 scontext=unconfined_u:unconfined_r:sandbox_web_t:s0:c286,c640 tcontext=system_u:object_r:fusefs_t:s0 tclass=dir permissive=1 Hash: fusermount,sandbox_web_t,fusefs_t,dir,write Version-Release number of selected component: selinux-policy-3.13.1-152.fc23.noarch Additional info: reporter: libreport-2.6.2 hashmarkername: setroubleshoot kernel: 4.2.3-300.fc23.x86_64 type: libreport
Looks like you need ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow use to fusefs home dirs Then you must tell SELinux about this by enabling the 'use_fusefs_home_dirs' boolean. You can read 'None' man page for more details. Do setsebool -P use_fusefs_home_dirs 1