<html><head></head><body>As a side note, you can use rsyslogs remotelogging to get the oops<br>
<br><br><div class="gmail_quote">Am 3. Juni 2015 08:01:22 MESZ, schrieb Tomasz Chmielewski <mangoo@wpkg.org>:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<pre class="k9mail">I'm trying to start an unprivileged container on Ubuntu 14.04; <br />unfortunately, the kernel crashes.<br /><br /><br /># lxc-create -t download -n test-container<br />(...)<br />Distribution: ubuntu<br />Release: trusty<br />Architecture: amd64<br />(...)<br /><br /># lxc-start -n test-container -F<br /><br />Kernel crashes at this point.<br /><br />It does not crash if I start the container as privileged.<br /><br /><br />- kernel used is 4.0.4-040004-generic from <br /><a href="http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.0.4-wily">http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.0.4-wily</a>/<br /><br />- lxc userspace: <a href="http://ppa.launchpad.net/ubuntu-lxc/stable/ubuntu">http://ppa.launchpad.net/ubuntu-lxc/stable/ubuntu</a><br /><br /># dpkg -l|grep lxc<br />ii liblxc1 <br />1.1.2-0ubuntu3~ubuntu14.04.1~ppa1 amd64 Linux Containers <br />userspace tools (library)<br />ii lxc !
<br />1.1.2-0ubuntu3~ubuntu14.04.1~ppa1 amd64 Linux Containers <br />userspace tools<br />ii lxc-templates <br />1.1.2-0ubuntu3~ubuntu14.04.1~ppa1 amd64 Linux Containers <br />userspace tools (templates)<br />ii lxcfs <br />0.7-0ubuntu4~ubuntu14.04.1~ppa1 amd64 FUSE based filesystem <br />for LXC<br />ii python3-lxc <br />1.1.2-0ubuntu3~ubuntu14.04.1~ppa1 amd64 Linux Containers <br />userspace tools (Python 3.x bindings)<br /><br /><br /><br />It's a bit hard to get the printout of the OOPS, as I'm only able to <br />access the server remotely and it doesn't manage to write the OOPS to <br />the log.<br /><br />Anyway, after a few crashes and "while true; do dmesg -c ; done" I was <br />able to capture this:<br /><br />[ 237.706914] device vethPI4H7F entered promiscuous mode<br />[ 237.707006] IPv6: ADDRCONF(NETDEV_UP): vethPI4H7F:!
link is
not ready<br />[ 237.797284] eth0: renamed from veth1OSOTS<br />[ 237.824526] IPv6: ADDRCONF(NETDEV_CHANGE): vethPI4H7F: link becomes <br />ready<br />[ 237.824556] lxcbr0: port 1(vethPI4H7F) entered forwarding state<br />[ 237.824562] lxcbr0: port 1(vethPI4H7F) entered forwarding state<br />[ 237.928179] BUG: unable to handle kernel NULL pointer dereference at <br /> (null)<br />[ 237.928262] IP: [<ffffffff8122f888>] pin_remove+0x58/0xf0<br />[ 237.928318] PGD 0<br />[ 237.928364] Oops: 0002 [#1] SMP<br />[ 237.928432] Modules linked in: xt_conntrack veth xt_CHECKSUM <br />iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat <br />nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack <br />xt_tcpudp iptable_filter ip_tables x_tables bridge stp llc intel_rapl <br />iosf_mbi x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm <br />crct10dif_pclmul crc32_pclmul eeepc_wmi ghash_clmulni_intel aesni_intel <br />asus_wmi
sparse_keymap ie31200_edac aes_x86_64 edac_core lrw gf128mul <br />glue_helper shpchp lpc_ich ablk_helper cryptd mac_hid 8250_fintek <br />serio_raw tpm_infineon video wmi btrfs lp parport raid10 raid456 <br />async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq <br />e1000e raid1 ahci raid0 ptp libahci pps_core multipath linear<br />[ 237.930151] CPU: 2 PID: 6568 Comm: lxc-start Not tainted <br />4.0.4-040004-generic #201505171336<br />[ 237.930188] Hardware name: System manufacturer System Product <br />Name/P8B WS, BIOS 0904 10/24/2011<br />[ 237.930225] task: ffff880806970a00 ti: ffff8808090c8000 task.ti: <br />ffff8808090c8000<br />[ 237.930259] RIP: 0010:[<ffffffff8122f888>] [<ffffffff8122f888>] <br />pin_remove+0x58/0xf0<br />[ 237.930341] RSP: 0018:ffff8808090cbe18 EFLAGS: 00010246<br />[ 237.930383] RAX: 0000000000000000 RBX: ffff880808808a20 RCX: <br />dead000000100100<br />[ 237.930429] RDX: 0000000000000000 RSI: dead0000002!
00200
RDI: <br />ffffffff81f9a548<br />[ 237.930474] RBP: ffff8808090cbe28 R08: ffffffff81d11b60 R09: <br />0000000000000100<br />[ 237.930572] R13: ffff880806970a00 R14: ffffffff81ecd070 R15: <br />00007ffe57fd5540<br />[ 237.930618] FS: 00007fd4aaaa48c0(0000) GS:ffff88082fa80000(0000) <br />knlGS:0000000000000000<br />[ 237.930685] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />[ 237.930728] CR2: 0000000000000000 CR3: 00000008099c1000 CR4: <br />00000000000407e0<br />[ 237.930773] Stack:<br />[ 237.930809] ffff880806970a00 ffff880808808a20 ffff8808090cbe48 <br />ffffffff8121d0f2<br />[ 237.930957] ffff8808090cbe68 ffff880808808a20 ffff8808090cbea8 <br />ffffffff8122fa55<br />[ 237.931123] 0000000000000000 ffff880806970a00 ffffffff810bb2b0 <br />ffff8808090cbe70<br />[ 237.931286] Call Trace:<br />[ 237.931336] [<ffffffff8121d0f2>] drop_mountpoint+0x22/0x40<br />[ 237.931380] [<ffffffff8122fa55>] pin_kill+0x75/0x130<br />[ 237.931425]
[<ffffffff810bb2b0>] ? prepare_to_wait_event+0x100/0x100<br />[ 237.931471] [<ffffffff8122fb39>] mnt_pin_kill+0x29/0x40<br />[ 237.931530] [<ffffffff8121baf0>] cleanup_mnt+0x80/0x90<br />[ 237.931573] [<ffffffff8121bb52>] __cleanup_mnt+0x12/0x20<br />[ 237.931617] [<ffffffff81096ad7>] task_work_run+0xb7/0xf0<br />[ 237.931662] [<ffffffff8101607c>] do_notify_resume+0xbc/0xd0<br />[ 237.931709] [<ffffffff817f0beb>] int_signal+0x12/0x17<br /><br /><br /></pre></blockquote></div><br>
-- <br>
Diese Nachricht wurde von meinem Android-Mobiltelefon mit K-9 Mail gesendet.</body></html>