Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="GET /v1.18/containers/5f60156a7d9d/json"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job container_inspect(5f60156a7d9d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job container_inspect(5f60156a7d9d) = OK (0)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="POST /v1.18/containers/5f60156a7d9d/attach?stderr=1&stdin=1&stdout=1&stream=1"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job container_inspect(5f60156a7d9d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job container_inspect(5f60156a7d9d) = OK (0)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job attach(5f60156a7d9d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="POST /v1.18/containers/5f60156a7d9d/start"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job start(5f60156a7d9d)"
Jun 15 12:21:01 odroid kernel: aufs au_opts_verify:1589:docker.armhf[836]: dirperm1 breaks the protection by the permission bits on the lower branch
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job allocate_interface(5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job allocate_interface(5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d) = OK (0)"
Jun 15 12:21:01 odroid kernel: aufs au_opts_verify:1589:docker.armhf[836]: dirperm1 breaks the protection by the permission bits on the lower branch
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="+job log(start, 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d, armv7/armhf-ubuntu_core:latest)"
Jun 15 12:21:01 odroid ubuntu-core-launcher[793]: time="2015-06-15T12:21:01Z" level=info msg="-job log(start, 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d, armv7/armhf-ubuntu_core:latest) = OK (0)"
Jun 15 12:21:01 odroid systemd[1]: Started docker container 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d.
Jun 15 12:21:01 odroid systemd[1]: Starting docker container 5f60156a7d9d0ea8a8d7d8ee81b5b80b2f7bb4a67c94d78a33b505e9cf905d7d.
Jun 15 12:21:01 odroid kernel: device veth092a452 entered promiscuous mode
Jun 15 12:21:01 odroid kernel: IPv6: ADDRCONF(NETDEV_UP): veth092a452: link is not ready
Jun 15 12:21:01 odroid systemd-udevd[1096]: Could not generate persistent MAC address for veth2d3f615: No such file or directory
Jun 15 12:21:01 odroid systemd-udevd[1097]: Could not generate persistent MAC address for veth092a452: No such file or directory
Jun 15 12:21:01 odroid systemd[1]: Started ifup for veth092a452.
Jun 15 12:21:01 odroid systemd[1]: Starting ifup for veth092a452...
Jun 15 12:21:01 odroid systemd[1]: Started ifup for veth2d3f615.
Jun 15 12:21:01 odroid systemd[1]: Unit ifup@veth2d3f615.service is bound to inactive unit sys-subsystem-net-devices-veth2d3f615.device. Stopping, too.
Jun 15 12:21:01 odroid systemd[1]: Starting ifup for veth2d3f615...
Jun 15 12:21:01 odroid systemd[1]: Stopping ifup for veth2d3f615...
Jun 15 12:21:01 odroid ifdown[1120]: /sbin/ifdown: interface veth2d3f615 not configured
Jun 15 12:21:01 odroid systemd[1]: Stopped ifup for veth2d3f615.
Jun 15 12:21:01 odroid sh[1117]: Unknown interface veth092a452
Jun 15 12:21:01 odr[ 91.014150@3] BUG: scheduling while atomic: docker.armhf/1098/0x00000002
[ 91.021399@3] pgd = edfa4000
[ 91.023787@3] [009c7000] *pgd=2e32e831, *pte=00000000, *ppte=00000000
[ 91.030210@3] Unable to handle kernel paging request at virtual address 009c7898
[ 91.037588@3] pgd = edfa4000
[ 91.040501@3] [009c7898] *pgd=2e32e831, *pte=00000000, *ppte=00000000
[ 91.046882@3] Internal error: Oops: 17 [#1] PREEMPT SMP ARM
[ 91.052431@3] Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 aml_gpio
[ 91.069629@3] CPU: 3 PID: 1098 Comm: docker.armhf Tainted: G W 3.10.79 #7
[ 91.077269@3] task: ee480000 ti: e96f6000 task.ti: e96f6000
[ 91.082828@3] PC is at 0x32cac
[ 91.085864@3] LR is at 0x3498c
[ 91.088905@3] pc : [<00032cac>] lr : [<0003498c>] psr: 20010010
[ 91.088905@3] sp : be982c4c ip : 00000000 fp : 00a30858
[ 91.100714@3] r10: 00a27690 r9 : 00000000 r8 : 0049e148
[ 91.106098@3] r7 : 0049e148 r6 : 00000000 r5 : 009c7888 r4 : 10d23ab0
[ 91.112785@3] r3 : 00000000 r2 : 009c7888 r1 : be183f08 r0 : 00000000
[ 91.119473@3] Flags: nzCv IRQs on FIQs on Mode USER_32 ISA ARM Segment user
[ 91.126853@3] Control: 10c5387d Table: 2e1a404a DAC: 00000015
[ 91.132758@3] Process docker.armhf (pid: 1098, stack limit = 0xe96f6238)
[ 91.139558@3] ---[ end trace f982361a581f4ceb ]---
[ 91.144310@3] note: docker.armhf[1098] exited with preempt_count 1
oid kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth092a452: link becomes ready
Jun 15 12:21:01 odroid kernel: docker0: port 1(veth092a452) entered forwarding state
Jun 15 12:21:01 odroid kernel: docker0: port 1(veth092a452) entered forwarding state
Jun 15 12:21:01 odroid kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready
Jun 15 12:21:01 odroid kernel: BUG: scheduling while atomic: docker.armhf/1098/0x00000002
Jun 15 12:21:01 odroid kernel: Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 aml_gpio
Jun 15 12:21:01 odroid kernel: CPU: 3 PID: 1098 Comm: docker.armhf Not tainted 3.10.79 #7
Jun 15 12:21:01 odroid kernel: [<c0014a64>] (unwind_backtrace+0x0/0xec) from [<c0011a88>] (show_stack+0x10/0x14)
Jun 15 12:21:01 odroid kernel: [<c0011a88>] (show_stack+0x10/0x14) from [<c0051184>] (__schedule_bug+0x50/0x64)
Jun 15 12:21:01 odroid kernel: [<c0051184>] (__schedule_bug+0x50/0x64) from [<c06be784>] (__schedule+0x98/0x6cc)
Jun 15 12:21:01 odroid kernel: [<c06be784>] (__schedule+0x98/0x6cc) from [<c06bcf20>] (schedule_timeout+0x18/0x1e8)
Jun 15 12:21:01 odroid kernel: [<c06bcf20>] (schedule_timeout+0x18/0x1e8) from [<c06be4d0>] (wait_for_common+0x130/0x160)
Jun 15 12:21:01 odroid kernel: [<c06be4d0>] (wait_for_common+0x130/0x160) from [<c06be58c>] (wait_for_completion_killable+0x14/0x2c)
Jun 15 12:21:01 odroid kernel: [<c06be58c>] (wait_for_completion_killable+0x14/0x2c) from [<c003fa58>] (call_usermodehelper_exec+0xb0/0x188)
Jun 15 12:21:01 odroid kernel: [<c003fa58>] (call_usermodehelper_exec+0xb0/0x188) from [<c003fcc8>] (__request_module+0x198/0x204)
Jun 15 12:21:01 odroid kernel: [<c003fcc8>] (__request_module+0x198/0x204) from [<c00fc37c>] (get_fs_type+0x6c/0xb0)
Jun 15 12:21:01 odroid kernel: [<c00fc37c>] (get_fs_type+0x6c/0xb0) from [<c0223698>] (aa_new_mount+0xcc/0x42c)
Jun 15 12:21:01 odroid kernel: [<c0223698>] (aa_new_mount+0xcc/0x42c) from [<c021c260>] (apparmor_sb_mount+0x17c/0x1ec)
Jun 15 12:21:01 odroid kernel: [<c021c260>] (apparmor_sb_mount+0x17c/0x1ec) from [<c00fee60>] (do_mount+0x9c/0x978)
Jun 15 12:21:01 odroid kernel: [<c00fee60>] (do_mount+0x9c/0x978) from [<c00ff7c0>] (SyS_mount+0x84/0xb8)
Jun 15 12:21:01 odroid kernel: [<c00ff7c0>] (SyS_mount+0x84/0xb8) from [<c000dfc0>] (ret_fast_syscall+0x0/0x30)
Jun 15 12:21:01 odroid kernel: pgd = edfa4000
Jun 15 12:21:01 odroid kernel: [009c7000] *pgd=2e32e831, *pte=00000000, *ppte=00000000
Jun 15 12:21:01 odroid kernel: Unable to handle kernel paging request at virtual address 009c7898
Jun 15 12:21:01 odroid kernel: pgd = edfa4000
Jun 15 12:21:01 odroid kernel: [009c7898] *pgd=2e32e831, *pte=00000000, *ppte=00000000
Jun 15 12:21:01 odroid kernel: Internal error: Oops: 17 [#1] PREEMPT SMP ARM
Jun 15 12:21:01 odroid kernel: Modules linked in: xt_addrtype xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_nat nf_conntrack nls_cp437 aml_gpio
Jun 15 12:21:01 odroid kernel: CPU: 3 PID: 1098 Comm: docker.armhf Tainted: G W 3.10.79 #7
Jun 15 12:21:01 odroid kernel: task: ee480000 ti: e96f6000 task.ti: e96f6000
Jun 15 12:21:01 odroid kernel: PC is at 0x32cac
Jun 15 12:21:01 odroid kernel: LR is at 0x3498c
Jun 15 12:21:01 odroid kernel: pc : [<00032cac>] lr : [<0003498c>] psr: 20010010
sp : be982c4c ip : 00000000 fp : 00a30858
Jun 15 12:21:01 odroid kernel: r10: 00a27690 r9 : 00000000 r8 : 0049e148
Jun 15 12:21:01 odroid kernel: r7 : 0049e148 r6 : 00000000 r5 : 009c7888 r4 : 10d23ab0
Jun 15 12:21:01 odroid kernel: r3 : 00000000 r2 : 009c7888 r1 : be183f08 r0 : 00000000
Jun 15 12:21:01 odroid kernel: Flags: nzCv IRQs on FIQs on Mode USER_32 ISA ARM Segment user
Jun 15 12:21:01 odroid kernel: Control: 10c5387d Table: 2e1a404a DAC: 00000015
Jun 15 12:21:01 odroid kernel: Process docker.armhf (pid: 1098, stack limit = 0xe96f6238)
Jun 15 12:21:01 odroid kernel: ---[ end trace f982361a581f4ceb ]---
Jun 15 12:21:01 odroid kernel: note: docker.armhf[1098] exited with preempt_count 1
[ 106.009495@3] docker0: port 1(veth092a452) entered forwarding state
Jun 15 12:21:16 odroid kernel: docker0: port 1(veth092a452) entered forwarding state