[Enter `^Ec?' for help] [spying] [ 748.521623] SELinux: Converting 497 SID table entries... [ 748.526598] SELinux: policy capability network_peer_controls=1 [ 748.526599] SELinux: policy capability open_perms=1 [ 748.526600] SELinux: policy capability extended_socket_class=1 [ 748.526600] SELinux: policy capability always_check_network=0 [ 748.526601] SELinux: policy capability cgroup_seclabel=1 [ 748.526601] SELinux: policy capability nnp_nosuid_transition=1 [ 748.526602] SELinux: policy capability genfs_seclabel_symlinks=1 [ 759.211059] SELinux: Converting 507 SID table entries... [ 759.216327] SELinux: policy capability network_peer_controls=1 [ 759.216328] SELinux: policy capability open_perms=1 [ 759.216329] SELinux: policy capability extended_socket_class=1 [ 759.216329] SELinux: policy capability always_check_network=0 [ 759.216330] SELinux: policy capability cgroup_seclabel=1 [ 759.216330] SELinux: policy capability nnp_nosuid_transition=1 [ 759.216331] SELinux: policy capability genfs_seclabel_symlinks=1 [ 769.308468] SELinux: Converting 510 SID table entries... [ 769.313619] SELinux: policy capability network_peer_controls=1 [ 769.313620] SELinux: policy capability open_perms=1 [ 769.313621] SELinux: policy capability extended_socket_class=1 [ 769.313621] SELinux: policy capability always_check_network=0 [ 769.313622] SELinux: policy capability cgroup_seclabel=1 [ 769.313622] SELinux: policy capability nnp_nosuid_transition=1 [ 769.313623] SELinux: policy capability genfs_seclabel_symlinks=1 [ 778.932780] SELinux: Converting 510 SID table entries... [ 778.937963] SELinux: policy capability network_peer_controls=1 [ 778.937965] SELinux: policy capability open_perms=1 [ 778.937965] SELinux: policy capability extended_socket_class=1 [ 778.937966] SELinux: policy capability always_check_network=0 [ 778.937966] SELinux: policy capability cgroup_seclabel=1 [ 778.937967] SELinux: policy capability nnp_nosuid_transition=1 [ 778.937967] SELinux: policy capability genfs_seclabel_symlinks=1 [ 875.102348] Unsafe core_pattern used with fs.suid_dumpable=2. [ 875.102348] Pipe handler or fully qualified core dump path required. [ 875.102348] Set kernel.core_pattern before fs.suid_dumpable.