[Enter `^Ec?' for help] [spying] [ 520.680425] SELinux: Converting 496 SID table entries... [ 520.685297] SELinux: policy capability network_peer_controls=1 [ 520.685299] SELinux: policy capability open_perms=1 [ 520.685299] SELinux: policy capability extended_socket_class=1 [ 520.685300] SELinux: policy capability always_check_network=0 [ 520.685300] SELinux: policy capability cgroup_seclabel=1 [ 520.685300] SELinux: policy capability nnp_nosuid_transition=1 [ 520.685301] SELinux: policy capability genfs_seclabel_symlinks=1 [ 530.473104] SELinux: Converting 506 SID table entries... [ 530.477916] SELinux: policy capability network_peer_controls=1 [ 530.477917] SELinux: policy capability open_perms=1 [ 530.477917] SELinux: policy capability extended_socket_class=1 [ 530.477918] SELinux: policy capability always_check_network=0 [ 530.477918] SELinux: policy capability cgroup_seclabel=1 [ 530.477919] SELinux: policy capability nnp_nosuid_transition=1 [ 530.477919] SELinux: policy capability genfs_seclabel_symlinks=1 [ 539.738693] SELinux: Converting 509 SID table entries... [ 539.743583] SELinux: policy capability network_peer_controls=1 [ 539.743584] SELinux: policy capability open_perms=1 [ 539.743584] SELinux: policy capability extended_socket_class=1 [ 539.743585] SELinux: policy capability always_check_network=0 [ 539.743585] SELinux: policy capability cgroup_seclabel=1 [ 539.743586] SELinux: policy capability nnp_nosuid_transition=1 [ 539.743586] SELinux: policy capability genfs_seclabel_symlinks=1 [ 548.594020] SELinux: Converting 509 SID table entries... [ 548.598880] SELinux: policy capability network_peer_controls=1 [ 548.598882] SELinux: policy capability open_perms=1 [ 548.598882] SELinux: policy capability extended_socket_class=1 [ 548.598883] SELinux: policy capability always_check_network=0 [ 548.598883] SELinux: policy capability cgroup_seclabel=1 [ 548.598884] SELinux: policy capability nnp_nosuid_transition=1 [ 548.598884] SELinux: policy capability genfs_seclabel_symlinks=1 [ 569.436696] Unsafe core_pattern used with fs.suid_dumpable=2. [ 569.436696] Pipe handler or fully qualified core dump path required. [ 569.436696] Set kernel.core_pattern before fs.suid_dumpable.