Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="GET /v1.18/containers/38f3a8e0eedd/json"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="+job container_inspect(38f3a8e0eedd)"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="-job container_inspect(38f3a8e0eedd) = OK (0)"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="POST /v1.18/containers/38f3a8e0eedd/attach?stderr=1&stdin=1&stdout=1&stream=1"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="+job container_inspect(38f3a8e0eedd)"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="-job container_inspect(38f3a8e0eedd) = OK (0)"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="+job attach(38f3a8e0eedd)"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="POST /v1.18/containers/38f3a8e0eedd/start"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="+job start(38f3a8e0eedd)"
Jun 13 18:01:08 odroid kernel: aufs au_opts_verify:1589:docker.armhf[804]: dirperm1 breaks the protection by the permission bits on the lower branch
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="+job allocate_interface(38f3a8e0eedd603a63bb191e7d2d4a08e8ac1a7d0e276694075422079a23731c)"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="-job allocate_interface(38f3a8e0eedd603a63bb191e7d2d4a08e8ac1a7d0e276694075422079a23731c) = OK (0)"
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="+job log(start, 38f3a8e0eedd603a63bb191e7d2d4a08e8ac1a7d0e276694075422079a23731c, ubuntu:latest)"
Jun 13 18:01:08 odroid kernel: aufs au_opts_verify:1589:docker.armhf[4975]: dirperm1 breaks the protection by the permission bits on the lower branch
Jun 13 18:01:08 odroid ubuntu-core-launcher[784]: time="2015-06-13T18:01:08Z" level=info msg="-job log(start, 38f3a8e0eedd603a63bb191e7d2d4a08e8ac1a7d0e276694075422079a23731c, ubuntu:latest) = OK (0)"
Jun 13 18:01:08 odroid systemd[1]: Started docker container 38f3a8e0eedd603a63bb191e7d2d4a08e8ac1a7d0e276694075422079a23731c.
Jun 13 18:01:08 odroid systemd[1]: Starting docker container 38f3a8e0eedd603a63bb191e7d2d4a08e8ac1a7d0e276694075422079a23731c.
Jun 13 18:01:08 odroid kernel: device veth1b2da6e entered promiscuous mode
Jun 13 18:01:08 odroid kernel: IPv6: ADDRCONF(NETDEV_UP): veth1b2da6e: link is not ready
Jun 13 18:01:08 odroid systemd-udevd[5022]: Could not generate persistent MAC address for veth1b2da6e: No such file or directory
Jun 13 18:01:08 odroid systemd-udevd[5021]: Could not generate persistent MAC address for vethc87f959: No such file or directory
Jun 13 18:01:08 odroid systemd[1]: Started ifup for vethc87f959.
Jun 13 18:01:08 odroid systemd[1]: Unit ifup@vethc87f959.service is bound to inactive unit sys-subsystem-net-devices-vethc87f959.device. Stopping, too.
Jun 13 18:01:08 odroid systemd[1]: Starting ifup for vethc87f959...
Jun 13 18:01:08 odroid systemd[1]: Stopping ifup for vethc87f959...
Jun 13 18:01:08 odroid ifdown[5043]: /sbin/ifdown: interface vethc87f959 not configured
Jun 13 18:01:08 odroid systemd[1]: Stopped ifup for vethc87f959.
Jun 13 18:01:08 odroid systemd[1]: Started ifup for veth1b2da6e.
Jun 13 18:01:08 odroid systemd[1]: Starting ifup for veth1b2da6e...
Jun 13 18:01:08 odroid kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth1b2da6e: link becomes ready
Jun 13 18:01:08 odroid kernel: docker0: port 1(veth1b2da6e) entered forwarding state
Jun 13 18:01:08 odroid kernel: docker0: port 1(veth1b2da6e) entered forwarding state
Jun 13 18:01:08 odroid kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready
Jun 13 18:01:08 odroid sh[5049]: Unknown interface veth1b2da6e
Jun 13 18:01:08 odroid kernel: BUG: scheduling while atomic: docker.armhf/5023/0x00000002
Jun 13 18:01:08 odroid kernel: Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 w1_gpio wire aml_gpio
Jun 13 18:01:08 odroid kernel: CPU: 3 PID: 5023 Comm: docker.armhf Not tainted 3.10.79 #7
Jun 13 18:01:08 odroid kernel: [<c0014a64>] (unwind_backtrace+0x0/0xec) from [<c0011a88>] (show_stack+0x10/0x14)
Jun 13 18:01:08 odroid kernel: [<c0011a88>] (show_stack+0x10/0x14) from [<c0051184>] (__schedule_bug+0x50/0x64)
Jun 13 18:01:08 odroid kernel: [<c0051184>] (__schedule_bug+0x50/0x64) from [<c06be784>] (__schedule+0x98/0x6cc)
Jun 13 18:01:08 odroid kernel: [<c06be784>] (__schedule+0x98/0x6cc) from [<c06bcf20>] (schedule_timeout+0x18/0x1e8)
Jun 13 18:01:08 odroid kernel: [<c06bcf20>] (schedule_timeout+0x18/0x1e8) from [<c06be4d0>] (wait_for_common+0x130/0x160)
Jun 13 18:01:08 odroid kernel: [<c06be4d0>] (wait_for_common+0x130/0x160) from [<c06be58c>] (wait_for_completion_killable+0x14/0x2c)
Jun 13 18:01:08 odroid kernel: [<c06be58c>] (wait_for_completion_killable+0x14/0x2c) from [<c003fa58>] (call_usermodehelper_exec+0xb0/0x188)
Jun 13 18:01:08 odroid kernel: [<c003fa58>] (call_usermodehelper_exec+0xb0/0x188) from [<c003fcc8>] (__request_module+0x198/0x204)
Jun 13 18:01:08 odroid kernel: [<c003fcc8>] (__request_module+0x198/0x204) from [<c00fc37c>] (get_fs_type+0x6c/0xb0)
Jun 13 18:01:08 odroid kernel: [<c00fc37c>] (get_fs_type+0x6c/0xb0) from [<c0223698>] (aa_new_mount+0xcc/0x42c)
Jun 13 18:01:08 odroid kernel: [<c0223698>] (aa_new_mount+0xcc/0x42c) from [<c021c260>] (apparmor_sb_mount+0x17c/0x1ec)
Jun 13 18:01:08 odroid kernel: [<c021c260>] (apparmor_sb_mount+0x17c/0x1ec) from [<c00fee60>] (do_mount+0x9c/0x978)
Jun 13 18:01:08 odroid kernel: [<c00fee60>] (do_mount+0x9c/0x978) from [<c00ff7c0>] (SyS_mount+0x84/0xb8)
Jun 13 18:01:08 odroid kernel: [<c00ff7c0>] (SyS_mount+0x84/0xb8) from [<c000dfc0>] (ret_fast_syscall+0x0/0x30)
Jun 13 18:01:08 odroid kernel: pgd = e89a8000
Jun 13 18:01:08 odroid kernel: [009c7000] *pgd=28da2831, *pte=00000000, *ppte=00000000
Jun 13 18:01:08 odroid kernel: Unable to handle kernel paging request at virtual address 009c7898
Jun 13 18:01:08 odroid kernel: pgd = e89a8000
Jun 13 18:01:08 odroid kernel: [009c7898] *pgd=28da2831, *pte=00000000, *ppte=00000000
Jun 13 18:01:08 odroid kernel: Internal error: Oops: 17 [#1] PREEMPT SMP ARM
Jun 13 18:01:08 odroid kernel: Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 w1_gpio wire aml_gpio
Jun 13 18:01:08 odroid kernel: CPU: 3 PID: 5023 Comm: docker.armhf Tainted: G W 3.10.79 #7
Jun 13 18:01:08 odroid kernel: task: e970c740 ti: ee020000 task.ti: ee020000
Jun 13 18:01:08 odroid kernel: PC is at 0x32cac
Jun 13 18:01:08 odroid kernel: LR is at 0x3498c
Jun 13 18:01:08 odroid kernel: pc : [<00032cac>] lr : [<0003498c>] psr: 20010010
sp : befe2c4c ip : 00000000 fp : 00a30858
Jun 13 18:01:08 odroid kernel: r10: 00a27690 r9 : 00000000 r8 : 0049e148
Jun 13 18:01:08 odroid kernel: r7 : 0049e148 r6 : 00000000 r5 : 009c7888 r4 : 10d23ab0
Jun 13 18:01:08 odroid kernel: r3 : 00000000 r2 : 009c7888 r1 : be7e3f08 r0 : 00000000
Jun 13 18:01:08 odroid kernel: Flags: nzCv IRQs on FIQs on Mode USER_32 ISA ARM Segment user
Jun 13 18:01:08 odroid kernel: Control: 10c5387d Table: 28ba804a DAC: 00000015
Jun 13 18:01:08 odroid kernel: Process docker.armhf (pid: 5023, stack limit = 0xee020238)
Jun 13 18:01:08 odroid kernel: ---[ end trace 986e76cb648f8106 ]---
Jun 13 18:01:08 odroid kernel: note: docker.armhf[5023] exited with preempt_count 1
Jun 13 18:01:23 odroid kernel: docker0: port 1(veth1b2da6e) entered forwarding state