[Enter `^Ec?' for help] [spying] [ 476.196444] SELinux: Converting 497 SID table entries... [ 476.201370] SELinux: policy capability network_peer_controls=1 [ 476.201372] SELinux: policy capability open_perms=1 [ 476.201372] SELinux: policy capability extended_socket_class=1 [ 476.201373] SELinux: policy capability always_check_network=0 [ 476.201373] SELinux: policy capability cgroup_seclabel=1 [ 476.201373] SELinux: policy capability nnp_nosuid_transition=1 [ 476.201374] SELinux: policy capability genfs_seclabel_symlinks=1 [ 485.975842] SELinux: Converting 507 SID table entries... [ 485.980538] SELinux: policy capability network_peer_controls=1 [ 485.980539] SELinux: policy capability open_perms=1 [ 485.980539] SELinux: policy capability extended_socket_class=1 [ 485.980540] SELinux: policy capability always_check_network=0 [ 485.980540] SELinux: policy capability cgroup_seclabel=1 [ 485.980541] SELinux: policy capability nnp_nosuid_transition=1 [ 485.980541] SELinux: policy capability genfs_seclabel_symlinks=1 [ 495.273842] SELinux: Converting 510 SID table entries... [ 495.278368] SELinux: policy capability network_peer_controls=1 [ 495.278369] SELinux: policy capability open_perms=1 [ 495.278370] SELinux: policy capability extended_socket_class=1 [ 495.278370] SELinux: policy capability always_check_network=0 [ 495.278371] SELinux: policy capability cgroup_seclabel=1 [ 495.278371] SELinux: policy capability nnp_nosuid_transition=1 [ 495.278371] SELinux: policy capability genfs_seclabel_symlinks=1 [ 504.145065] SELinux: Converting 510 SID table entries... [ 504.149818] SELinux: policy capability network_peer_controls=1 [ 504.149819] SELinux: policy capability open_perms=1 [ 504.149820] SELinux: policy capability extended_socket_class=1 [ 504.149820] SELinux: policy capability always_check_network=0 [ 504.149821] SELinux: policy capability cgroup_seclabel=1 [ 504.149821] SELinux: policy capability nnp_nosuid_transition=1 [ 504.149821] SELinux: policy capability genfs_seclabel_symlinks=1 [ 530.849289] Unsafe core_pattern used with fs.suid_dumpable=2. [ 530.849289] Pipe handler or fully qualified core dump path required. [ 530.849289] Set kernel.core_pattern before fs.suid_dumpable.