Ubuntu Pastebin

Paste from longsleep at Mon, 15 Jun 2015 12:22:50 +0000

Download as text
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="GET /v1.18/containers/5f60156a7d9d/json"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job container_inspect(5f60156a7d9d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job container_inspect(5f60156a7d9d) = OK (0)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="POST /v1.18/containers/5f60156a7d9d/attach?stderr=1&stdin=1&stdout=1&stream=1"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job container_inspect(5f60156a7d9d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job container_inspect(5f60156a7d9d) = OK (0)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job attach(5f60156a7d9d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="POST /v1.18/containers/5f60156a7d9d/start"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job start(5f60156a7d9d)"
Jun 15 12:21:01 odroid kernel: aufs au_opts_verify:1589:docker.armhf[836]: dirperm1 breaks the protection by the permission bits on the lower branch
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job allocate_interface(5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job allocate_interface(5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d) = OK (0)"
Jun 15 12:21:01 odroid kernel: aufs au_opts_verify:1589:docker.armhf[836]: dirperm1 breaks the protection by the permission bits on the lower branch
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job log(start, 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d, armv7/armhf-ubuntu_core:latest)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job log(start, 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d, armv7/armhf-ubuntu_core:latest) = OK (0)"
Jun 15 12:21:01 odroid systemd[1]: Started docker container 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d.
Jun 15 12:21:01 odroid systemd[1]: Starting docker container 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d.
Jun 15 12:21:01 odroid kernel: device veth092a452 entered promiscuous mode
Jun 15 12:21:01 odroid kernel: IPv6: ADDRCONF(NETDEV_UP): veth092a452: link is not ready
Jun 15 12:21:01 odroid systemd-udevd[1096]: Could not generate persistent MAC address for veth2d3f615: No such file or directory
Jun 15 12:21:01 odroid systemd-udevd[1097]: Could not generate persistent MAC address for veth092a452: No such file or directory
Jun 15 12:21:01 odroid systemd[1]: Started ifup for veth092a452.
Jun 15 12:21:01 odroid systemd[1]: Starting ifup for veth092a452...
Jun 15 12:21:01 odroid systemd[1]: Started ifup for veth2d3f615.
Jun 15 12:21:01 odroid systemd[1]: Unit ifup@veth2d3f615.service is bound to inactive unit sys-subsystem-net-devices-veth2d3f615.device. Stopping, too.
Jun 15 12:21:01 odroid systemd[1]: Starting ifup for veth2d3f615...
Jun 15 12:21:01 odroid systemd[1]: Stopping ifup for veth2d3f615...
Jun 15 12:21:01 odroid ifdown[1120]: /sbin/ifdown: interface veth2d3f615 not configured
Jun 15 12:21:01 odroid systemd[1]: Stopped ifup for veth2d3f615.
Jun 15 12:21:01 odroid sh[1117]: Unknown interface veth092a452
Jun 15 12:21:01 odr[   91.014150@3] BUG: scheduling while atomic: docker.armhf/1098/0x00000002
[   91.021399@3] pgd = edfa4000
[   91.023787@3] [009c7000] *pgd=2e32e831, *pte=00000000, *ppte=00000000
[   91.030210@3] Unable to handle kernel paging request at virtual address 009c7898
[   91.037588@3] pgd = edfa4000
[   91.040501@3] [009c7898] *pgd=2e32e831, *pte=00000000, *ppte=00000000
[   91.046882@3] Internal error: Oops: 17 [#1] PREEMPT SMP ARM
[   91.052431@3] Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 aml_gpio
[   91.069629@3] CPU: 3 PID: 1098 Comm: docker.armhf Tainted: G        W    3.10.79 #7
[   91.077269@3] task: ee480000 ti: e96f6000 task.ti: e96f6000
[   91.082828@3] PC is at 0x32cac
[   91.085864@3] LR is at 0x3498c
[   91.088905@3] pc : [<00032cac>]    lr : [<0003498c>]    psr: 20010010
[   91.088905@3] sp : be982c4c  ip : 00000000  fp : 00a30858
[   91.100714@3] r10: 00a27690  r9 : 00000000  r8 : 0049e148
[   91.106098@3] r7 : 0049e148  r6 : 00000000  r5 : 009c7888  r4 : 10d23ab0
[   91.112785@3] r3 : 00000000  r2 : 009c7888  r1 : be183f08  r0 : 00000000
[   91.119473@3] Flags: nzCv  IRQs on  FIQs on  Mode USER_32  ISA ARM  Segment user
[   91.126853@3] Control: 10c5387d  Table: 2e1a404a  DAC: 00000015
[   91.132758@3] Process docker.armhf (pid: 1098, stack limit = 0xe96f6238)
[   91.139558@3] ---[ end trace f982361a581f4ceb ]---
[   91.144310@3] note: docker.armhf[1098] exited with preempt_count 1
oid kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth092a452: link becomes ready
Jun 15 12:21:01 odroid kernel: docker0: port 1(veth092a452) entered forwarding state
Jun 15 12:21:01 odroid kernel: docker0: port 1(veth092a452) entered forwarding state
Jun 15 12:21:01 odroid kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready
Jun 15 12:21:01 odroid kernel: BUG: scheduling while atomic: docker.armhf/1098/0x00000002
Jun 15 12:21:01 odroid kernel: Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 aml_gpio
Jun 15 12:21:01 odroid kernel: CPU: 3 PID: 1098 Comm: docker.armhf Not tainted 3.10.79 #7
Jun 15 12:21:01 odroid kernel: [<c0014a64>] (unwind_backtrace+0x0/0xec) from [<c0011a88>] (show_stack+0x10/0x14)
Jun 15 12:21:01 odroid kernel: [<c0011a88>] (show_stack+0x10/0x14) from [<c0051184>] (__schedule_bug+0x50/0x64)
Jun 15 12:21:01 odroid kernel: [<c0051184>] (__schedule_bug+0x50/0x64) from [<c06be784>] (__schedule+0x98/0x6cc)
Jun 15 12:21:01 odroid kernel: [<c06be784>] (__schedule+0x98/0x6cc) from [<c06bcf20>] (schedule_timeout+0x18/0x1e8)
Jun 15 12:21:01 odroid kernel: [<c06bcf20>] (schedule_timeout+0x18/0x1e8) from [<c06be4d0>] (wait_for_common+0x130/0x160)
Jun 15 12:21:01 odroid kernel: [<c06be4d0>] (wait_for_common+0x130/0x160) from [<c06be58c>] (wait_for_completion_killable+0x14/0x2c)
Jun 15 12:21:01 odroid kernel: [<c06be58c>] (wait_for_completion_killable+0x14/0x2c) from [<c003fa58>] (call_usermodehelper_exec+0xb0/0x188)
Jun 15 12:21:01 odroid kernel: [<c003fa58>] (call_usermodehelper_exec+0xb0/0x188) from [<c003fcc8>] (__request_module+0x198/0x204)
Jun 15 12:21:01 odroid kernel: [<c003fcc8>] (__request_module+0x198/0x204) from [<c00fc37c>] (get_fs_type+0x6c/0xb0)
Jun 15 12:21:01 odroid kernel: [<c00fc37c>] (get_fs_type+0x6c/0xb0) from [<c0223698>] (aa_new_mount+0xcc/0x42c)
Jun 15 12:21:01 odroid kernel: [<c0223698>] (aa_new_mount+0xcc/0x42c) from [<c021c260>] (apparmor_sb_mount+0x17c/0x1ec)
Jun 15 12:21:01 odroid kernel: [<c021c260>] (apparmor_sb_mount+0x17c/0x1ec) from [<c00fee60>] (do_mount+0x9c/0x978)
Jun 15 12:21:01 odroid kernel: [<c00fee60>] (do_mount+0x9c/0x978) from [<c00ff7c0>] (SyS_mount+0x84/0xb8)
Jun 15 12:21:01 odroid kernel: [<c00ff7c0>] (SyS_mount+0x84/0xb8) from [<c000dfc0>] (ret_fast_syscall+0x0/0x30)
Jun 15 12:21:01 odroid kernel: pgd = edfa4000
Jun 15 12:21:01 odroid kernel: [009c7000] *pgd=2e32e831, *pte=00000000, *ppte=00000000
Jun 15 12:21:01 odroid kernel: Unable to handle kernel paging request at virtual address 009c7898
Jun 15 12:21:01 odroid kernel: pgd = edfa4000
Jun 15 12:21:01 odroid kernel: [009c7898] *pgd=2e32e831, *pte=00000000, *ppte=00000000
Jun 15 12:21:01 odroid kernel: Internal error: Oops: 17 [#1] PREEMPT SMP ARM
Jun 15 12:21:01 odroid kernel: Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 aml_gpio
Jun 15 12:21:01 odroid kernel: CPU: 3 PID: 1098 Comm: docker.armhf Tainted: G        W    3.10.79 #7
Jun 15 12:21:01 odroid kernel: task: ee480000 ti: e96f6000 task.ti: e96f6000
Jun 15 12:21:01 odroid kernel: PC is at 0x32cac
Jun 15 12:21:01 odroid kernel: LR is at 0x3498c
Jun 15 12:21:01 odroid kernel: pc : [<00032cac>]    lr : [<0003498c>]    psr: 20010010
                               sp : be982c4c  ip : 00000000  fp : 00a30858
Jun 15 12:21:01 odroid kernel: r10: 00a27690  r9 : 00000000  r8 : 0049e148
Jun 15 12:21:01 odroid kernel: r7 : 0049e148  r6 : 00000000  r5 : 009c7888  r4 : 10d23ab0
Jun 15 12:21:01 odroid kernel: r3 : 00000000  r2 : 009c7888  r1 : be183f08  r0 : 00000000
Jun 15 12:21:01 odroid kernel: Flags: nzCv  IRQs on  FIQs on  Mode USER_32  ISA ARM  Segment user
Jun 15 12:21:01 odroid kernel: Control: 10c5387d  Table: 2e1a404a  DAC: 00000015
Jun 15 12:21:01 odroid kernel: Process docker.armhf (pid: 1098, stack limit = 0xe96f6238)
Jun 15 12:21:01 odroid kernel: ---[ end trace f982361a581f4ceb ]---
Jun 15 12:21:01 odroid kernel: note: docker.armhf[1098] exited with preempt_count 1
[  106.009495@3] docker0: port 1(veth092a452) entered forwarding state
Jun 15 12:21:16 odroid kernel: docker0: port 1(veth092a452) entered forwarding state
Download as text