Unable to start docker application with B-KVM kernel
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux-kvm (Ubuntu) |
Fix Released
|
Undecided
|
Kamal Mostafa | ||
Bionic |
Fix Released
|
Undecided
|
Kamal Mostafa |
Bug Description
Similar to bug 1760660, docker.io package installation on B-KVM will fail with:
Setting up docker.io (17.03.2-0ubuntu5) ...
Job for docker.service failed because the control process exited with error code.
See "systemctl status docker.service" and "journalctl -xe" for details.
invoke-rc.d: initscript docker, action "start" failed.
● docker.service - Docker Application Container Engine
Loaded: loaded (/lib/systemd/
Active: failed (Result: exit-code) since Fri 2018-04-13 08:42:36 UTC; 10ms ago
Docs: https:/
Process: 1265 ExecStart=
Main PID: 1265 (code=exited, status=1/FAILURE)
Apr 13 08:42:36 gummo dockerd[1265]: time="2018-
Apr 13 08:42:36 gummo dockerd[1265]: time="2018-
Apr 13 08:42:36 gummo dockerd[1265]: time="2018-
Apr 13 08:42:36 gummo dockerd[1265]: Error starting daemon: Error initializing network controller: error obtaining controller instance: failed to create NAT chain: iptables failed: iptables -t nat -N DOCKER: modprobe: FATAL: Module ip_tables not found in directory /lib/modules/
Apr 13 08:42:36 gummo dockerd[1265]: iptables v1.6.1: can't initialize iptables table `nat': Table does not exist (do you need to insmod?)
Apr 13 08:42:36 gummo dockerd[1265]: Perhaps iptables or your kernel needs to be upgraded.
Apr 13 08:42:36 gummo dockerd[1265]: (exit status 3)
Apr 13 08:42:36 gummo systemd[1]: docker.service: Main process exited, code=exited, status=1/FAILURE
Apr 13 08:42:36 gummo systemd[1]: docker.service: Failed with result 'exit-code'.
Apr 13 08:42:36 gummo systemd[1]: Failed to start Docker Application Container Engine.
Maybe we need the same patch for Bionic KVM kernel as well:
kvm: [config] enable all CGROUPs
ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: linux-image-
ProcVersionSign
Uname: Linux 4.15.0-1003-kvm x86_64
ApportVersion: 2.20.9-0ubuntu4
Architecture: amd64
Date: Fri Apr 13 08:43:06 2018
ProcEnviron:
TERM=xterm-
PATH=(custom, no user)
XDG_RUNTIME_
LANG=C.UTF-8
SHELL=/bin/bash
SourcePackage: linux-kvm
UpgradeStatus: No upgrade log present (probably fresh install)
CVE References
description: | updated |
Changed in linux-kvm (Ubuntu Bionic): | |
status: | New → In Progress |
assignee: | nobody → Kamal Mostafa (kamalmostafa) |
Changed in linux-kvm (Ubuntu Bionic): | |
status: | In Progress → Fix Committed |
Changed in linux-kvm (Ubuntu): | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-kvm - 4.15.0-1010.10
---------------
linux-kvm (4.15.0-1010.10) bionic; urgency=medium
[ Ubuntu: 4.15.0-22.24 ]
* CVE-2018-3639 (powerpc) msr_write( ) /spec_store_ bypass bypass_ disable FORCE_DISABLE spec_ctrl: Do some minor cleanups mitigation( ) return type
- powerpc/64s: Add support for a store forwarding barrier at kernel entry/exit
- stf-barrier: set eieio instruction bit 6 for future optimisations
* CVE-2018-3639 (x86)
- x86/nospec: Simplify alternative_
- x86/bugs: Concentrate bug detection into a separate function
- x86/bugs: Concentrate bug reporting into a separate function
- x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
- x86/bugs, KVM: Support the combination of guest and host IBRS
- x86/bugs: Expose /sys/..
- x86/cpufeatures: Add X86_FEATURE_RDS
- x86/bugs: Provide boot parameters for the spec_store_
mitigation
- x86/bugs/intel: Set proper CPU features and setup RDS
- x86/bugs: Whitelist allowed SPEC_CTRL MSR values
- x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
- x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
- x86/speculation: Create spec-ctrl.h to avoid include hell
- prctl: Add speculation control prctls
- x86/process: Allow runtime control of Speculative Store Bypass
- x86/speculation: Add prctl for Speculative Store Bypass mitigation
- nospec: Allow getting/setting on non-current task
- proc: Provide details on speculation flaw mitigations
- seccomp: Enable speculation flaw mitigations
- x86/bugs: Make boot modes __ro_after_init
- prctl: Add force disable speculation
- seccomp: Use PR_SPEC_
- seccomp: Add filter flag to opt-out of SSB mitigation
- seccomp: Move speculation migitation control to arch code
- x86/speculation: Make "seccomp" the default mode for Speculative Store
Bypass
- x86/bugs: Rename _RDS to _SSBD
- proc: Use underscores for SSBD in 'status'
- Documentation/
- x86/bugs: Fix __ssb_select_
- x86/bugs: Make cpu_show_common() static
* LSM Stacking prctl values should be redefined as to not collide with
upstream prctls (LP: #1769263) // CVE-2018-3639
- SAUCE: LSM stacking: adjust prctl values
linux-kvm (4.15.0-1009.9) bionic; urgency=medium
* linux-kvm: 4.15.0-1009.9 -proposed tracker (LP: #1767409)
* linux-image- 4.15.0- 20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Depends on linux-base that provides the necessary tools
* Unable to start docker application with B-KVM kernel (LP: #1763630)
- kvm: [config] enable NF_NAT, NF_CONNTRACK
- kvm: [config] enable IP_NF_TABLES
* test_078_ SLAB_freelist_ randomization failed on 4.15 KVM kernel SLAB_FREELIST_ {HARDENED, RANDOM}
(LP: #1764975)
- kvm: [config] enable CONFIG_
* linux-kvm 4.15 needs CONFIG_VMAP_STACK set (LP: #1764985)
- kvm: [config] enable CONFIG_VMAP_STACK
* test_140_ kernel_ modules_ not_tainted in kernel security test failed with 4.15 MODULE_ UNLOAD
kvm kernel (LP: #1766832)
- kvm: [config] enable CONFIG_
[ Ubuntu: 4.15.0-21.22 ]
* linu...