id,summary,reporter,owner,description,type,status,component,version,resolution,keywords,cc,guest,host 2891,VirtualBox 2.1.0 module vboxnetflt created kernel panic,Kevin Veroneau,,"This issue has been reported a few times in different ways, for example after this kernel panic, one loses complete keyboard control on both the host and guest. The mouse still functions, and if the user is in X11, they can still open and use applications until terminating X11. The only way to bring the host back to normal, is to power off and power back on the host. The host does respond to Ctrl-Alt-Delete, however it crashes upon entering runlevel 6. To reproduce this issue, simply enable Host Networking in the guest and attach it to your primary interface, eth0. Start the guest. As soon as the guest attempts to initialize the interface, the kernel will panic and the guest will continue to boot. The guest can be safely shutdown using the ACPI shutdown from the Close box. However, if the mouse is captured in the guest, you will need to use the mouse in the guest to safely shutdown the guest. According to other reports, it appears to be affecting almost all Linux-based hosts. If you feel confident and have a journaling file system such as ext3, please try to re-produce this and report if your host is also affected. It would also be advised to enter in your kernel version, and distro. Simple use 'uname -r' in a terminal to obtain the kernel version. This will assist Sun in better pin pointing where the issue may be. {{{ Captured from /var/log/kern.log: Dec 24 21:38:22 dell kernel: BUG: unable to handle kernel paging request at virtual address ffffff94 Dec 24 21:38:22 dell kernel: printing eip: Dec 24 21:38:22 dell kernel: d0ec1669 Dec 24 21:38:22 dell kernel: *pde = 00004067 Dec 24 21:38:22 dell kernel: *pte = 00000000 Dec 24 21:38:22 dell kernel: Oops: 0000 [#1] Dec 24 21:38:22 dell kernel: SMP Dec 24 21:38:22 dell kernel: Modules linked in: r128 drm tun vboxnetflt vboxdrv ipv6 fuse loop serio_raw floppy parport_pc parport rtc psmouse snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd soundcore snd_page_alloc intel_agp agpgart shpchp pci_hotplug i2c_i801 pcspkr i2c_core tsdev evdev ext3 jbd mbcache sha256 aes sd_mod dm_crypt dm_mirror dm_snapshot dm_mod ide_generic usb_storage scsi_mod usbhid ide_cd cdrom ide_disk uhci_hcd 3c59x mii piix generic usbcore ide_core processor Dec 24 21:38:22 dell kernel: CPU: 0 Dec 24 21:38:22 dell kernel: EIP: 0060:[] Not tainted VLI Dec 24 21:38:22 dell kernel: EFLAGS: 00010286 (2.6.18-6-686 #1) Dec 24 21:38:22 dell kernel: EIP is at vboxNetFltLinuxXmitTask+0x17/0x178 [vboxnetflt] Dec 24 21:38:22 dell kernel: eax: 00000000 ebx: cfa17f60 ecx: 00000296 edx: 00000200 Dec 24 21:38:22 dell kernel: esi: cfe0e0b8 edi: ffffff5c ebp: 00000296 esp: cfa17f5c Dec 24 21:38:22 dell kernel: ds: 007b es: 007b ss: 0068 Dec 24 21:38:22 dell kernel: Process events/0 (pid: 4, ti=cfa16000 task=cff66aa0 task.ti=cfa16000) Dec 24 21:38:22 dell kernel: Stack: cfa17f60 00000000 cfe0e0b4 cfe0e0b8 cfa56240 00000296 c012ab80 d0ec1652 Dec 24 21:38:22 dell kernel: 00000000 cfa56254 cfa56240 cfa5624c 00000000 c012b46a 00000001 00000000 Dec 24 21:38:22 dell kernel: cfa01f3c 00010000 00000000 00000000 cff66aa0 c01176f0 00100100 00200200 Dec 24 21:38:22 dell kernel: Call Trace: Dec 24 21:38:22 dell kernel: [] run_workqueue+0x78/0xb5 Dec 24 21:38:22 dell kernel: [] vboxNetFltLinuxXmitTask+0x0/0x178 [vboxnetflt] Dec 24 21:38:22 dell kernel: [] worker_thread+0xd9/0x10b Dec 24 21:38:22 dell kernel: [] default_wake_function+0x0/0xc Dec 24 21:38:22 dell kernel: [] worker_thread+0x0/0x10b Dec 24 21:38:22 dell kernel: [] kthread+0xc2/0xef Dec 24 21:38:22 dell kernel: [] kthread+0x0/0xef Dec 24 21:38:22 dell kernel: [] kernel_thread_helper+0x5/0xb Dec 24 21:38:22 dell kernel: Code: 36 ef 31 c0 86 45 60 83 c4 0c b8 01 00 00 00 5b 5e 5f 5d c3 55 57 56 53 83 ec 04 89 e3 c7 04 24 00 00 00 00 8d b8 5c ff ff ff 53 77 38 e8 15 39 00 00 8a 47 40 84 c0 5e 5d 74 1c ba 01 00 00 Dec 24 21:38:22 dell kernel: EIP: [] vboxNetFltLinuxXmitTask+0x17/0x178 [vboxnetflt] SS:ESP 0068:cfa17f5c Dec 24 21:39:07 dell kernel: <6>device eth0 left promiscuous mode }}}",defect,closed,network,VirtualBox 2.1.0,duplicate,,,other,Linux