Changes between Initial Version and Version 3 of Ticket #19133
- Timestamp:
- Aug 10, 2020 12:34:49 PM (4 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Ticket #19133
- Property Owner set to
- Property Status new → accepted
-
Ticket #19133 – Description
initial v3 10 10 - Ctrl-C nor SIGKILL will work for `cat` — it is hung in D state, unkillable 11 11 - Any process touching the shared folder hangs likewise 12 - `dmesg` will show the following stack for the hung `cat` https://pastebin.com/WjKQaZys 12 - `dmesg` will show the following stack for the hung `cat` https://pastebin.com/WjKQaZys [1] 13 13 - The guest cannot be cleanly rebooted because shutdown requires tearing down the guest additions module, which is blocked on talking to the VM. 14 14 - Powering off the VM (not from the guest, but from the UI!) will hang. … … 28 28 - Make named pipes act as true named pipes to the host. If you google "vboxsf named pipe", this is actually a feature that was previously requested. 29 29 - Make the `open` syscall fail in this context. This is worse than working pipes, but better than a lockup. At the moment, data does not actually travel down the named pipe, if the host does `echo foo > TEST_PIPE` and the guest does `cat TEST_PIPE`, the guest simply says `cat: TEST_PIPE: Protocol error`. 30 31 [1] 32 {{{ 33 $ sudo cat /proc/7376/stack 34 [<0>] rtR0SemEventMultiLnxWait.isra.2+0x33d/0x370 [vboxguest] 35 [<0>] VBoxGuest_RTSemEventMultiWaitEx+0xe/0x10 [vboxguest] 36 [<0>] VBoxGuest_RTSemEventMultiWait+0x28/0x30 [vboxguest] 37 [<0>] vgdrvHgcmAsyncWaitCallbackWorker+0x1c3/0x210 [vboxguest] 38 [<0>] VGDrvCommonIoCtl+0x489/0x18e0 [vboxguest] 39 [<0>] VBoxGuestIDC+0x149/0x160 [vboxguest] 40 [<0>] VbglR0IdcCallRaw+0x13/0x20 [vboxsf] 41 [<0>] VbglR0HGCMFastCall+0x1c/0x20 [vboxsf] 42 [<0>] vbsf_reg_open+0x291/0x4f0 [vboxsf] 43 [<0>] do_dentry_open+0x1c2/0x310 44 [<0>] vfs_open+0x4f/0x80 45 [<0>] path_openat+0x6bf/0x1900 46 [<0>] do_filp_open+0x9b/0x110 47 [<0>] do_sys_open+0x1bb/0x2c0 48 [<0>] SyS_openat+0x14/0x20 49 [<0>] do_syscall_64+0x73/0x130 50 [<0>] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 51 [<0>] 0xffffffffffffffff 52 }}}

