[Enter `^Ec?' for help] [spying] [ 68.508511] KGDB: Registered I/O driver kgdboc [ 275.614231] SELinux: Converting 524 SID table entries... [ 275.620643] SELinux: policy capability network_peer_controls=1 [ 275.626567] SELinux: policy capability open_perms=1 [ 275.631536] SELinux: policy capability extended_socket_class=1 [ 275.637459] SELinux: policy capability always_check_network=0 [ 275.643307] SELinux: policy capability cgroup_seclabel=1 [ 275.648707] SELinux: policy capability nnp_nosuid_transition=1 [ 292.402955] SELinux: Converting 524 SID table entries... [ 292.409334] SELinux: policy capability network_peer_controls=1 [ 292.415274] SELinux: policy capability open_perms=1 [ 292.420250] SELinux: policy capability extended_socket_class=1 [ 292.426182] SELinux: policy capability always_check_network=0 [ 292.432024] SELinux: policy capability cgroup_seclabel=1 [ 292.437439] SELinux: policy capability nnp_nosuid_transition=1 [ 357.709247] SGI XFS with ACLs, security attributes, quota, no debug enabled [ 357.719041] XFS (dm-4): Mounting V5 Filesystem [ 357.728205] XFS (dm-4): Ending clean mount [ 444.984887] SELinux: Converting 539 SID table entries... [ 444.991559] SELinux: policy capability network_peer_controls=1 [ 444.997483] SELinux: policy capability open_perms=1 [ 445.002446] SELinux: policy capability extended_socket_class=1 [ 445.008369] SELinux: policy capability always_check_network=0 [ 445.014202] SELinux: policy capability cgroup_seclabel=1 [ 445.019598] SELinux: policy capability nnp_nosuid_transition=1 [ 643.163315] XFS (dm-0): Mounting V5 Filesystem [ 643.182118] XFS (dm-0): Ending clean mount [ 643.823759] XFS (dm-1): Mounting V5 Filesystem [ 643.834663] XFS (dm-1): Ending clean mount [ 1170.091901] Installing knfsd (copyright (C) 1996 okir@monad.swb.de). [ 1170.379050] NFSD: Using nfsdcld client tracking operations. [ 1170.384635] NFSD: no clients to reclaim, skipping NFSv4 grace period (net f00000a0) [ 1170.995513] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.