lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5138.1371834215@turing-police.cc.vt.edu>
Date: Fri, 21 Jun 2013 13:03:35 -0400
From: Valdis.Kletnieks@...edu
To: Thomas Dreibholz <dreibh@...ula.no>
Cc: Full-Disclosure@...ts.grok.org.uk
Subject: Re: How to lock up a VirtualBox host machine with
a guest using tracepath over virtio-net network interface
On Fri, 21 Jun 2013 16:33:35 +0200, Thomas Dreibholz said:
> - The host system is a 64-bit Linux (tested with Ubuntu 12.04 LTS and Kubuntu
What does 'uname -r' on the host return?
This is almost certainly a bug in either the host network stack or the
VirtualBox modules (probably one of the vboxnet ones).
Also, if you can manage to capture the output of 'sysrq-T' or 'echo t > /proc/sysrq-trigger'
(unfortunately, netconsole will probably *not* be an option here),
so we can see where teh various kernel threads are locked up.
Do you have the stack traceback that should have come out with the BUG message?
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists