[Enter `^Ec?' for help] [spying] [ 838.992686] SELinux: Converting 497 SID table entries... [ 838.997492] SELinux: policy capability network_peer_controls=1 [ 838.997493] SELinux: policy capability open_perms=1 [ 838.997493] SELinux: policy capability extended_socket_class=1 [ 838.997494] SELinux: policy capability always_check_network=0 [ 838.997494] SELinux: policy capability cgroup_seclabel=1 [ 838.997495] SELinux: policy capability nnp_nosuid_transition=1 [ 838.997495] SELinux: policy capability genfs_seclabel_symlinks=1 [ 848.855056] SELinux: Converting 507 SID table entries... [ 848.859780] SELinux: policy capability network_peer_controls=1 [ 848.859782] SELinux: policy capability open_perms=1 [ 848.859782] SELinux: policy capability extended_socket_class=1 [ 848.859783] SELinux: policy capability always_check_network=0 [ 848.859783] SELinux: policy capability cgroup_seclabel=1 [ 848.859783] SELinux: policy capability nnp_nosuid_transition=1 [ 848.859784] SELinux: policy capability genfs_seclabel_symlinks=1 [ 858.453848] SELinux: Converting 510 SID table entries... [ 858.460077] SELinux: policy capability network_peer_controls=1 [ 858.460079] SELinux: policy capability open_perms=1 [ 858.460079] SELinux: policy capability extended_socket_class=1 [ 858.460079] SELinux: policy capability always_check_network=0 [ 858.460080] SELinux: policy capability cgroup_seclabel=1 [ 858.460080] SELinux: policy capability nnp_nosuid_transition=1 [ 858.460081] SELinux: policy capability genfs_seclabel_symlinks=1 [ 867.390441] SELinux: Converting 510 SID table entries... [ 867.395250] SELinux: policy capability network_peer_controls=1 [ 867.395251] SELinux: policy capability open_perms=1 [ 867.395252] SELinux: policy capability extended_socket_class=1 [ 867.395252] SELinux: policy capability always_check_network=0 [ 867.395253] SELinux: policy capability cgroup_seclabel=1 [ 867.395253] SELinux: policy capability nnp_nosuid_transition=1 [ 867.395253] SELinux: policy capability genfs_seclabel_symlinks=1 [ 965.612682] Unsafe core_pattern used with fs.suid_dumpable=2. [ 965.612682] Pipe handler or fully qualified core dump path required. [ 965.612682] Set kernel.core_pattern before fs.suid_dumpable.