Feb 24 14:38:03 computeinstance-e00be7anq8eswwede1 kernel: [ 16.353824] kauditd_printk_skb: 30 callbacks suppressed Feb 24 14:38:03 computeinstance-e00be7anq8eswwede1 kernel: [ 16.353827] audit: type=1400 audit(1740407883.519:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1956 comm="apparmor_parser" Feb 24 14:38:03 computeinstance-e00be7anq8eswwede1 kernel: [ 16.664229] Initializing XFRM netlink socket Feb 24 14:38:03 computeinstance-e00be7anq8eswwede1 kernel: [ 16.677187] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 24 14:38:09 computeinstance-e00be7anq8eswwede1 kernel: [ 21.826576] loop3: detected capacity change from 0 to 8 Feb 24 14:38:13 computeinstance-e00be7anq8eswwede1 kernel: [ 26.019212] loop3: detected capacity change from 0 to 130552 Feb 24 14:55:00 computeinstance-e00be7anq8eswwede1 kernel: [ 1033.219955] TCP: request_sock_TCP: Possible SYN flooding on port 25670. Sending cookies. Check SNMP counters. Feb 24 14:55:25 computeinstance-e00be7anq8eswwede1 kernel: [ 1057.986939] TCP: request_sock_TCP: Possible SYN flooding on port 1977. Sending cookies. Check SNMP counters. Feb 24 14:56:03 computeinstance-e00be7anq8eswwede1 kernel: [ 1095.939280] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Feb 24 14:56:03 computeinstance-e00be7anq8eswwede1 kernel: [ 1095.941749] File: /home/github/.ya/build/build_root/dya0/0008c3/r3tmp/tmp6mk_cml4.test PID: 81108 Comm: kworker/79:4 Feb 24 14:56:03 computeinstance-e00be7anq8eswwede1 kernel: [ 1096.149856] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Feb 24 14:56:03 computeinstance-e00be7anq8eswwede1 kernel: [ 1096.153726] File: /home/github/.ya/build/build_root/dya0/0008c3/r3tmp/tmp6mk_cml4.test PID: 81111 Comm: kworker/79:7 Feb 24 15:00:31 computeinstance-e00be7anq8eswwede1 kernel: [ 1363.564266] TCP: request_sock_TCP: Possible SYN flooding on port 9090. Sending cookies. Check SNMP counters.