path: selinux-python_3.9-2/sepolgen/tests/test_data/httpd.log type=SYSCALL msg=audit(1163779436.312:13615): arch=40000003 syscall=11 success=yes exit=0 a0=8c77d18 a1=8c5d0a8 a2=8c69620 a3=8c77ea8 items=0 ppid=17386 pid=17392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="id" exe="/usr/bin/id" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.420:13616): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.420:13616): arch=40000003 syscall=11 success=yes exit=0 a0=8c7b210 a1=8c5d010 a2=8c69620 a3=8c7b560 items=0 ppid=17393 pid=17394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.464:13617): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.464:13617): arch=40000003 syscall=11 success=yes exit=0 a0=8c7ba60 a1=8c7bf10 a2=8c69620 a3=8c7b560 items=0 ppid=17393 pid=17395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null)