Changes between Initial Version and Version 1 of Ticket #19226, comment 78
- Timestamp:
- Jan 22, 2022 12:57:31 AM (3 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Ticket #19226, comment 78
initial v1 27 27 I've posted the log with similar error multiple times here. Please try to reproduce it yourself. Follow the simple steps I described in the comment 75. This algorithm works very consistent in reproducing the bug. 28 28 29 How this VERR_TIMEOUT and freeze even happened? Do you have a function on the host that sends requests to the client and freezing the host until it gets UTF8 string from the client? This is unacceptable. It is a security breach that allows a compromised guest to disrupt hosts activity. It should work asynchronously and return nothing if it has no data readily available. And requests shouldn't pile up on the client side too. Can you start a new thread on each such time consuming operation or what not? There should be a simple solution other than manual patching conve ntion operation among all possible format pairs.29 How this VERR_TIMEOUT and freeze even happened? Do you have a function on the host that sends requests to the client and freezing the host until it gets UTF8 string from the client? This is unacceptable. It is a security breach that allows a compromised guest to disrupt hosts activity. It should work asynchronously and return nothing if it has no data readily available. And requests shouldn't pile up on the client side too. Can you start a new thread on each such time consuming operation or what not? There should be a simple solution other than manual patching conversion operation among all possible format pairs.