lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5138.1371834215@turing-police.cc.vt.edu>
Date: Fri, 21 Jun 2013 13:03:35 -0400
From: Valdis.Kletnieks@...edu
To: Thomas Dreibholz <dreibh@...ula.no>
Cc: Full-Disclosure@...ts.grok.org.uk
Subject: Re: How to lock up a VirtualBox host machine with
	a guest using tracepath over virtio-net network interface

On Fri, 21 Jun 2013 16:33:35 +0200, Thomas Dreibholz said:

> - The host system is a 64-bit Linux (tested with Ubuntu 12.04 LTS and Kubuntu

What does 'uname -r' on the host return?

This is almost certainly a bug in either the host network stack or the
VirtualBox modules (probably one of the vboxnet ones).

Also, if you can manage to capture the output of 'sysrq-T' or 'echo t > /proc/sysrq-trigger'
(unfortunately, netconsole will probably *not* be an option here),
so we can see where teh various kernel threads are locked up.

Do you have the stack traceback that should have come out with the BUG message?

Content of type "application/pgp-signature" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ