Feb 22 16:48:12 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 16.774630] kauditd_printk_skb: 30 callbacks suppressed Feb 22 16:48:12 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 16.774633] audit: type=1400 audit(1740242892.882:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1958 comm="apparmor_parser" Feb 22 16:48:13 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 17.039352] Initializing XFRM netlink socket Feb 22 16:48:13 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 17.055839] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 22 16:48:17 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 21.856253] loop3: detected capacity change from 0 to 8 Feb 22 16:48:23 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 26.342586] loop3: detected capacity change from 0 to 130552 Feb 22 17:05:15 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 1038.209384] TCP: request_sock_TCP: Possible SYN flooding on port 61717. Sending cookies. Check SNMP counters. Feb 22 17:05:32 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 1055.616652] TCP: request_sock_TCP: Possible SYN flooding on port 29171. Sending cookies. Check SNMP counters. Feb 22 17:06:35 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 1117.875910] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Feb 22 17:06:35 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 1117.878705] File: /home/github/.ya/build/build_root/rtyi/000949/r3tmp/tmp3t2aq0pe.test PID: 80537 Comm: kworker/69:11 Feb 22 17:06:35 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 1117.958438] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Feb 22 17:06:35 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 1117.962252] File: /home/github/.ya/build/build_root/rtyi/000949/r3tmp/tmp3t2aq0pe.test PID: 80535 Comm: kworker/69:9 Feb 22 17:08:37 computeinstance-e00a5e21rc6n5kvh7f kernel: [ 1240.146743] TCP: request_sock_TCP: Possible SYN flooding on port 8464. Sending cookies. Check SNMP counters.