[Enter `^Ec?' for help] [spying] [ 673.476755] SELinux: Converting 530 SID table entries... [ 673.483345] SELinux: policy capability network_peer_controls=1 [ 673.489274] SELinux: policy capability open_perms=1 [ 673.494244] SELinux: policy capability extended_socket_class=1 [ 673.500167] SELinux: policy capability always_check_network=0 [ 673.505998] SELinux: policy capability cgroup_seclabel=1 [ 673.511396] SELinux: policy capability nnp_nosuid_transition=1 [ 691.887452] SELinux: Converting 530 SID table entries... [ 691.893666] SELinux: policy capability network_peer_controls=1 [ 691.899590] SELinux: policy capability open_perms=1 [ 691.904553] SELinux: policy capability extended_socket_class=1 [ 691.910474] SELinux: policy capability always_check_network=0 [ 691.916306] SELinux: policy capability cgroup_seclabel=1 [ 691.921705] SELinux: policy capability nnp_nosuid_transition=1 [ 770.889957] SGI XFS with ACLs, security attributes, quota, no debug enabled [ 770.900656] XFS (dm-4): Mounting V5 Filesystem [ 770.911046] XFS (dm-4): Ending clean mount [ 1138.896795] SELinux: Converting 547 SID table entries... [ 1138.903412] SELinux: policy capability network_peer_controls=1 [ 1138.909341] SELinux: policy capability open_perms=1 [ 1138.914311] SELinux: policy capability extended_socket_class=1 [ 1138.920229] SELinux: policy capability always_check_network=0 [ 1138.926064] SELinux: policy capability cgroup_seclabel=1 [ 1138.931461] SELinux: policy capability nnp_nosuid_transition=1 [ 1234.416279] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation