[Enter `^Ec?' for help] [spying] [ 762.770651] SELinux: Converting 496 SID table entries... [ 762.775414] SELinux: policy capability network_peer_controls=1 [ 762.775416] SELinux: policy capability open_perms=1 [ 762.775416] SELinux: policy capability extended_socket_class=1 [ 762.775417] SELinux: policy capability always_check_network=0 [ 762.775417] SELinux: policy capability cgroup_seclabel=1 [ 762.775417] SELinux: policy capability nnp_nosuid_transition=1 [ 762.775418] SELinux: policy capability genfs_seclabel_symlinks=1 [ 772.565972] SELinux: Converting 507 SID table entries... [ 772.570673] SELinux: policy capability network_peer_controls=1 [ 772.570674] SELinux: policy capability open_perms=1 [ 772.570675] SELinux: policy capability extended_socket_class=1 [ 772.570675] SELinux: policy capability always_check_network=0 [ 772.570676] SELinux: policy capability cgroup_seclabel=1 [ 772.570676] SELinux: policy capability nnp_nosuid_transition=1 [ 772.570676] SELinux: policy capability genfs_seclabel_symlinks=1 [ 782.210735] SELinux: Converting 510 SID table entries... [ 782.215438] SELinux: policy capability network_peer_controls=1 [ 782.215440] SELinux: policy capability open_perms=1 [ 782.215440] SELinux: policy capability extended_socket_class=1 [ 782.215441] SELinux: policy capability always_check_network=0 [ 782.215441] SELinux: policy capability cgroup_seclabel=1 [ 782.215441] SELinux: policy capability nnp_nosuid_transition=1 [ 782.215442] SELinux: policy capability genfs_seclabel_symlinks=1 [ 791.076827] SELinux: Converting 510 SID table entries... [ 791.081573] SELinux: policy capability network_peer_controls=1 [ 791.081575] SELinux: policy capability open_perms=1 [ 791.081575] SELinux: policy capability extended_socket_class=1 [ 791.081576] SELinux: policy capability always_check_network=0 [ 791.081576] SELinux: policy capability cgroup_seclabel=1 [ 791.081576] SELinux: policy capability nnp_nosuid_transition=1 [ 791.081577] SELinux: policy capability genfs_seclabel_symlinks=1 [ 908.366951] Unsafe core_pattern used with fs.suid_dumpable=2. [ 908.366951] Pipe handler or fully qualified core dump path required. [ 908.366951] Set kernel.core_pattern before fs.suid_dumpable.