[Enter `^Ec?' for help] [spying] [ 581.716238] SELinux: Converting 496 SID table entries... [ 581.721003] SELinux: policy capability network_peer_controls=1 [ 581.721004] SELinux: policy capability open_perms=1 [ 581.721005] SELinux: policy capability extended_socket_class=1 [ 581.721005] SELinux: policy capability always_check_network=0 [ 581.721006] SELinux: policy capability cgroup_seclabel=1 [ 581.721006] SELinux: policy capability nnp_nosuid_transition=1 [ 581.721006] SELinux: policy capability genfs_seclabel_symlinks=1 [ 591.646984] SELinux: Converting 506 SID table entries... [ 591.653114] SELinux: policy capability network_peer_controls=1 [ 591.653117] SELinux: policy capability open_perms=1 [ 591.653117] SELinux: policy capability extended_socket_class=1 [ 591.653118] SELinux: policy capability always_check_network=0 [ 591.653118] SELinux: policy capability cgroup_seclabel=1 [ 591.653119] SELinux: policy capability nnp_nosuid_transition=1 [ 591.653119] SELinux: policy capability genfs_seclabel_symlinks=1 [ 601.213445] SELinux: Converting 509 SID table entries... [ 601.218188] SELinux: policy capability network_peer_controls=1 [ 601.218189] SELinux: policy capability open_perms=1 [ 601.218189] SELinux: policy capability extended_socket_class=1 [ 601.218190] SELinux: policy capability always_check_network=0 [ 601.218191] SELinux: policy capability cgroup_seclabel=1 [ 601.218191] SELinux: policy capability nnp_nosuid_transition=1 [ 601.218191] SELinux: policy capability genfs_seclabel_symlinks=1 [ 610.050450] SELinux: Converting 509 SID table entries... [ 610.055105] SELinux: policy capability network_peer_controls=1 [ 610.055106] SELinux: policy capability open_perms=1 [ 610.055107] SELinux: policy capability extended_socket_class=1 [ 610.055107] SELinux: policy capability always_check_network=0 [ 610.055108] SELinux: policy capability cgroup_seclabel=1 [ 610.055108] SELinux: policy capability nnp_nosuid_transition=1 [ 610.055108] SELinux: policy capability genfs_seclabel_symlinks=1 [ 701.016169] Unsafe core_pattern used with fs.suid_dumpable=2. [ 701.016169] Pipe handler or fully qualified core dump path required. [ 701.016169] Set kernel.core_pattern before fs.suid_dumpable.