[Enter `^Ec?' for help] [spying] [ 487.342735] SELinux: Converting 496 SID table entries... [ 487.347667] SELinux: policy capability network_peer_controls=1 [ 487.347668] SELinux: policy capability open_perms=1 [ 487.347669] SELinux: policy capability extended_socket_class=1 [ 487.347669] SELinux: policy capability always_check_network=0 [ 487.347670] SELinux: policy capability cgroup_seclabel=1 [ 487.347670] SELinux: policy capability nnp_nosuid_transition=1 [ 487.347670] SELinux: policy capability genfs_seclabel_symlinks=1 [ 497.374553] SELinux: Converting 506 SID table entries... [ 497.379673] SELinux: policy capability network_peer_controls=1 [ 497.379675] SELinux: policy capability open_perms=1 [ 497.379675] SELinux: policy capability extended_socket_class=1 [ 497.379676] SELinux: policy capability always_check_network=0 [ 497.379676] SELinux: policy capability cgroup_seclabel=1 [ 497.379676] SELinux: policy capability nnp_nosuid_transition=1 [ 497.379677] SELinux: policy capability genfs_seclabel_symlinks=1 [ 506.805554] SELinux: Converting 509 SID table entries... [ 506.810651] SELinux: policy capability network_peer_controls=1 [ 506.810652] SELinux: policy capability open_perms=1 [ 506.810653] SELinux: policy capability extended_socket_class=1 [ 506.810653] SELinux: policy capability always_check_network=0 [ 506.810654] SELinux: policy capability cgroup_seclabel=1 [ 506.810654] SELinux: policy capability nnp_nosuid_transition=1 [ 506.810655] SELinux: policy capability genfs_seclabel_symlinks=1 [ 515.855170] SELinux: Converting 509 SID table entries... [ 515.860468] SELinux: policy capability network_peer_controls=1 [ 515.860469] SELinux: policy capability open_perms=1 [ 515.860469] SELinux: policy capability extended_socket_class=1 [ 515.860470] SELinux: policy capability always_check_network=0 [ 515.860470] SELinux: policy capability cgroup_seclabel=1 [ 515.860471] SELinux: policy capability nnp_nosuid_transition=1 [ 515.860471] SELinux: policy capability genfs_seclabel_symlinks=1 [ 657.116045] Unsafe core_pattern used with fs.suid_dumpable=2. [ 657.116045] Pipe handler or fully qualified core dump path required. [ 657.116045] Set kernel.core_pattern before fs.suid_dumpable.