Mar 13 05:47:07 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 16.216426] kauditd_printk_skb: 30 callbacks suppressed Mar 13 05:47:07 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 16.216429] audit: type=1400 audit(1741844827.370:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1965 comm="apparmor_parser" Mar 13 05:47:07 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 16.465718] Initializing XFRM netlink socket Mar 13 05:47:07 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 16.478712] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 13 05:47:12 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 21.543211] loop3: detected capacity change from 0 to 8 Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 24.925139] loop3: detected capacity change from 0 to 91024 Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.142254] audit: type=1400 audit(1741844836.557:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=2985 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.143032] audit: type=1400 audit(1741844836.557:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2985 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.153288] audit: type=1400 audit(1741844836.570:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=2987 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.158009] audit: type=1400 audit(1741844836.574:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=2994 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.158297] audit: type=1400 audit(1741844836.574:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=2995 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.158322] audit: type=1400 audit(1741844836.574:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc-to-lxd" pid=2997 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.158338] audit: type=1400 audit(1741844836.574:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=2996 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.158466] audit: type=1400 audit(1741844836.574:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxd" pid=2998 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.158571] audit: type=1400 audit(1741844836.574:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.migrate" pid=2999 comm="apparmor_parser" Mar 13 05:47:16 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 25.158789] audit: type=1400 audit(1741844836.579:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=2988 comm="apparmor_parser" Mar 13 05:47:20 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 29.047492] loop4: detected capacity change from 0 to 8 Mar 13 05:47:24 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 32.260348] loop4: detected capacity change from 0 to 130552 Mar 13 06:04:11 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1039.404899] TCP: request_sock_TCP: Possible SYN flooding on port 14507. Sending cookies. Check SNMP counters. Mar 13 06:04:13 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1041.356853] TCP: request_sock_TCP: Possible SYN flooding on port 1732. Sending cookies. Check SNMP counters. Mar 13 06:05:30 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1117.888583] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Mar 13 06:05:30 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1117.892050] File: /home/github/.ya/build/build_root/ohhg/0008f3/r3tmp/tmpmmd2veoc.test PID: 77208 Comm: kworker/39:67 Mar 13 06:05:30 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1118.521234] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Mar 13 06:05:30 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1118.524771] File: /home/github/.ya/build/build_root/ohhg/0008f3/r3tmp/tmpmmd2veoc.test PID: 77151 Comm: kworker/39:11 Mar 13 06:05:30 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1118.601835] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Mar 13 06:05:30 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1118.604211] File: /home/github/.ya/build/build_root/ohhg/0008f3/r3tmp/tmpmmd2veoc.test PID: 767 Comm: kworker/39:2 Mar 13 06:05:31 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1118.872570] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Mar 13 06:05:31 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1118.874910] File: /home/github/.ya/build/build_root/ohhg/0008f3/r3tmp/tmpmmd2veoc.test PID: 767 Comm: kworker/39:2 Mar 13 06:05:33 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1120.967434] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! Mar 13 06:05:33 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1120.971238] File: /home/github/.ya/build/build_root/ohhg/0008f3/r3tmp/tmpmmd2veoc.test PID: 80666 Comm: kworker/59:63 Mar 13 06:07:42 computeinstance-e00zz9knsb2q7hrjdq kernel: [ 1250.104361] TCP: request_sock_TCP: Possible SYN flooding on port 11687. Sending cookies. Check SNMP counters.