Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1459444 Details for
Bug 1601959
IPA certificate auto renewal failed at CA_UNREACHABLE
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
audit2why
audit2why.out (text/plain), 181.73 KB, created by
Xiyang Dong
on 2018-07-17 14:54:08 UTC
(
hide
)
Description:
audit2why
Filename:
MIME Type:
Creator:
Xiyang Dong
Created:
2018-07-17 14:54:08 UTC
Size:
181.73 KB
patch
obsolete
>type=AVC msg=audit(1594123848.650:2187): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2188): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2189): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2190): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2191): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2192): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2193): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2194): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.650:2195): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.688:2196): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.688:2197): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.688:2198): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.715:2199): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.715:2200): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1594123848.715:2201): avc: denied { search } for pid=18036 comm="java" name="/" dev="tmpfs" ino=8632 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.671:112): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.671:113): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.672:114): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.672:115): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.672:116): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.672:117): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.672:118): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.672:119): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.672:120): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.691:121): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.691:122): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.691:123): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.718:124): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.718:125): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834131.718:126): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834133.639:127): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834133.639:128): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834133.639:129): avc: denied { search } for pid=2090 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:132): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:133): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:134): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:135): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:136): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:137): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:138): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:139): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.485:140): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.500:141): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.500:142): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.500:143): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.523:144): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.523:145): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834172.523:146): avc: denied { search } for pid=2329 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834175.332:165): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834175.332:166): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:149): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:150): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:151): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:152): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:153): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:154): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:155): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:156): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.684:157): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.698:158): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.698:159): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.698:160): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.720:161): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.721:162): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834173.721:163): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834175.332:164): avc: denied { search } for pid=2525 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:168): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:169): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:167): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:170): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:171): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:172): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:173): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.437:174): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.438:175): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.452:176): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.452:177): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.452:178): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.475:179): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.475:180): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834180.476:181): avc: denied { search } for pid=2702 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834183.339:201): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834183.340:202): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:185): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:186): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:187): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:188): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:189): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:190): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:191): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:192): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.609:193): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.622:194): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.622:195): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.622:196): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.646:197): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.646:198): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834181.646:199): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834183.339:200): avc: denied { search } for pid=2878 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:204): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:205): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:206): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:207): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:208): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:209): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:210): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:211): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.152:212): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.243:213): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.243:214): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.243:215): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.394:216): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.394:217): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834197.394:218): avc: denied { search } for pid=3279 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834200.255:238): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834200.255:239): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:222): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:223): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:224): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:225): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:226): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:227): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:228): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:229): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.545:230): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.558:231): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.558:232): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.558:233): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.581:234): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.581:235): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834198.581:236): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834200.255:237): avc: denied { search } for pid=3498 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:241): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:242): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:240): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:243): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:244): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:245): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:246): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:247): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.156:248): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.170:249): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.170:250): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.170:251): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.193:252): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.193:253): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834209.193:254): avc: denied { search } for pid=3673 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834212.092:273): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834212.092:274): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.346:257): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:258): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:259): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:260): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:261): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:262): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:263): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:264): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.347:265): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.360:266): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.360:267): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.360:268): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.384:269): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.384:270): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834210.384:271): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834212.092:272): avc: denied { search } for pid=3836 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:278): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:279): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:280): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:281): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:282): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:283): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:284): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:285): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.514:286): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.571:287): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.571:288): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.571:289): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.606:290): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.606:291): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834235.606:292): avc: denied { search } for pid=4144 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:298): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:299): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:300): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:301): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:302): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:303): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:304): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:305): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.717:306): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.731:307): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.731:308): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.731:309): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.753:310): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.753:311): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834242.753:312): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834244.393:313): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834244.393:314): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531834244.393:315): avc: denied { search } for pid=4385 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=USER_AVC msg=audit(1593610621.879:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: denied { reload } for auid=0 uid=0 gid=0 path="/dev/null" cmdline="/usr/bin/systemctl reload named.service" scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:null_device_t:s0 tclass=service exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593610627.442:362): avc: denied { map } for pid=5855 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593610687.498:364): avc: denied { map } for pid=5856 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593610747.531:366): avc: denied { map } for pid=5857 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593610807.550:368): avc: denied { map } for pid=5859 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593610867.568:370): avc: denied { map } for pid=5860 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593610927.599:372): avc: denied { map } for pid=5862 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593610987.645:377): avc: denied { map } for pid=5948 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611047.689:382): avc: denied { map } for pid=6217 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611107.725:384): avc: denied { map } for pid=6218 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611167.779:386): avc: denied { map } for pid=6222 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:389): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:390): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.718:388): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:391): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:392): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:393): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:394): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:395): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.719:396): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.733:397): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.733:398): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.733:399): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.759:400): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.759:401): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611189.759:402): avc: denied { search } for pid=6260 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:428): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:429): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:430): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:431): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:432): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:433): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:434): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:435): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.176:436): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.238:437): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.238:438): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.238:439): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.351:440): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.351:441): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611204.351:442): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611206.464:443): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611206.464:444): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611206.464:445): avc: denied { search } for pid=6700 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611227.799:449): avc: denied { map } for pid=6889 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611287.859:451): avc: denied { map } for pid=6892 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:466): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:467): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:468): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:469): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:470): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:471): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:472): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:473): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.894:474): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.908:475): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.908:476): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.908:477): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.932:478): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.932:479): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611341.932:480): avc: denied { search } for pid=7239 comm="java" name="/" dev="tmpfs" ino=8640 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593611347.898:490): avc: denied { map } for pid=7624 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835364.836:32): avc: denied { map } for pid=995 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835424.881:56): avc: denied { map } for pid=1233 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835484.943:63): avc: denied { map } for pid=1255 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835544.980:65): avc: denied { map } for pid=1257 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835605.024:67): avc: denied { map } for pid=1258 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835665.027:69): avc: denied { map } for pid=1260 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835725.058:71): avc: denied { map } for pid=1261 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835785.068:73): avc: denied { map } for pid=1262 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835845.078:75): avc: denied { map } for pid=1263 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835905.088:77): avc: denied { map } for pid=1264 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531835965.120:79): avc: denied { map } for pid=1266 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836025.158:81): avc: denied { map } for pid=1267 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836085.219:90): avc: denied { map } for pid=1282 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836145.228:92): avc: denied { map } for pid=1283 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836205.238:94): avc: denied { map } for pid=1284 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836265.272:118): avc: denied { map } for pid=1305 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:133): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:134): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:135): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:136): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:137): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:138): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:139): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:140): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.025:141): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.044:142): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.044:143): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.044:144): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.071:145): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.071:146): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836300.071:147): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836302.066:148): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836302.066:149): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836302.066:150): avc: denied { search } for pid=2101 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836325.336:153): avc: denied { map } for pid=2257 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:156): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:157): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:155): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:158): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:159): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:160): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:161): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.384:162): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.385:163): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.399:164): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.399:165): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.399:166): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.422:167): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.422:168): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836341.422:169): avc: denied { search } for pid=2342 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836344.339:188): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836344.339:189): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:172): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:173): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:174): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:175): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:176): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:177): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:178): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:179): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.617:180): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.631:181): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.631:182): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.631:183): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.656:184): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.656:185): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836342.656:186): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836344.338:187): avc: denied { search } for pid=2540 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:191): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:192): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:190): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:193): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:194): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:195): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:196): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:197): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.270:198): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.285:199): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.285:200): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.285:201): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.310:202): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.310:203): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836349.310:204): avc: denied { search } for pid=2718 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836352.237:224): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836352.237:225): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:208): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:209): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:210): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:211): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:212): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:213): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:214): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:215): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.470:216): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.484:217): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.484:218): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.484:219): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.507:220): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.507:221): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836350.507:222): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836352.236:223): avc: denied { search } for pid=2896 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:227): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:228): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:229): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:230): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:231): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:232): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:233): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:234): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.728:235): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.877:236): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.878:237): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.878:238): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.993:239): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.993:240): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836365.993:241): avc: denied { search } for pid=3298 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836368.815:261): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836368.815:262): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:245): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:246): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:247): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:248): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:249): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:250): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:251): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:252): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.064:253): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.080:254): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.080:255): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.080:256): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.102:257): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.102:258): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836367.102:259): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836368.815:260): avc: denied { search } for pid=3516 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:264): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:265): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:263): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:266): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:267): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:268): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:269): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:270): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.198:271): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.212:272): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.212:273): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.212:274): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.235:275): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.235:276): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836377.235:277): avc: denied { search } for pid=3691 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836380.013:296): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836380.013:297): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:280): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:281): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:282): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:283): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:284): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:285): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:286): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:287): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.283:288): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.297:289): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.297:290): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.297:291): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.319:292): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.319:293): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836378.319:294): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836380.013:295): avc: denied { search } for pid=3852 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836385.376:298): avc: denied { map } for pid=4032 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:303): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:304): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:305): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:306): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:307): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:308): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:309): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:310): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.567:311): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.585:312): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.585:313): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.585:314): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.669:315): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.669:316): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836401.669:317): avc: denied { search } for pid=4163 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:323): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:324): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:325): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:326): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:327): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:328): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:329): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:330): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.926:331): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.941:332): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.942:333): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.942:334): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.966:335): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.966:336): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836408.966:337): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836410.712:338): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836410.712:339): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836410.712:340): avc: denied { search } for pid=4402 comm="java" name="/" dev="tmpfs" ino=8811 scontext=system_u:system_r:tomcat_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836445.424:360): avc: denied { map } for pid=5032 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836505.487:363): avc: denied { map } for pid=5077 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836565.551:390): avc: denied { map } for pid=5672 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1531836625.582:392): avc: denied { map } for pid=5682 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593612685.603:394): avc: denied { map } for pid=5686 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593612745.680:396): avc: denied { map } for pid=5691 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593612805.724:398): avc: denied { map } for pid=5692 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593612865.745:400): avc: denied { map } for pid=5693 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593612925.766:402): avc: denied { map } for pid=5696 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593612985.791:404): avc: denied { map } for pid=5697 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613045.848:406): avc: denied { map } for pid=5698 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613105.908:408): avc: denied { map } for pid=5699 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613165.923:410): avc: denied { map } for pid=5700 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613225.948:419): avc: denied { map } for pid=5705 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613286.008:421): avc: denied { map } for pid=5708 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613346.031:423): avc: denied { map } for pid=5709 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613406.082:431): avc: denied { map } for pid=6062 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613466.130:435): avc: denied { map } for pid=6098 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613526.180:437): avc: denied { map } for pid=6099 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613586.239:439): avc: denied { map } for pid=6101 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613646.248:441): avc: denied { map } for pid=6102 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613706.308:443): avc: denied { map } for pid=6103 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613766.368:445): avc: denied { map } for pid=6107 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613826.428:447): avc: denied { map } for pid=6108 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613886.442:449): avc: denied { map } for pid=6110 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593613946.503:451): avc: denied { map } for pid=6111 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614006.508:453): avc: denied { map } for pid=6112 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614066.569:455): avc: denied { map } for pid=6113 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614126.601:457): avc: denied { map } for pid=6114 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614186.662:459): avc: denied { map } for pid=6115 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614246.699:461): avc: denied { map } for pid=6124 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614306.708:463): avc: denied { map } for pid=6125 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614366.768:465): avc: denied { map } for pid=6126 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614426.828:467): avc: denied { map } for pid=6134 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614486.845:472): avc: denied { map } for pid=6384 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614546.898:474): avc: denied { map } for pid=6389 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614606.941:476): avc: denied { map } for pid=6390 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614666.996:490): avc: denied { map } for pid=6396 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614727.057:621): avc: denied { map } for pid=6420 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614787.112:672): avc: denied { map } for pid=6454 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614847.175:679): avc: denied { map } for pid=6457 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >type=AVC msg=audit(1593614907.215:769): avc: denied { map } for pid=6485 comm="local" path="/usr/libexec/postfix/local" dev="vda1" ino=437281 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_local_exec_t:s0 tclass=file permissive=0 > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1601959
:
1459441
|
1459442
|
1459443
| 1459444 |
1459445