From dee4dcba78baf712cab403d47d9db319ab7f95d6 Mon Sep 17 00:00:00 2001 From: Christian Krinitsin Date: Thu, 3 Jul 2025 19:39:53 +0200 Subject: restructure results --- results/classifier/108/network/05479587 | 93 ------------------ results/classifier/108/network/1054180 | 38 -------- results/classifier/108/network/1196727 | 162 -------------------------------- results/classifier/108/network/1279 | 23 ----- results/classifier/108/network/1286 | 16 ---- results/classifier/108/network/1297781 | 28 ------ results/classifier/108/network/1299 | 39 -------- results/classifier/108/network/1451 | 16 ---- results/classifier/108/network/1482 | 30 ------ results/classifier/108/network/1543163 | 81 ---------------- results/classifier/108/network/1569988 | 73 -------------- results/classifier/108/network/1574327 | 35 ------- results/classifier/108/network/1604303 | 35 ------- results/classifier/108/network/1656927 | 37 -------- results/classifier/108/network/1662 | 50 ---------- results/classifier/108/network/1719689 | 36 ------- results/classifier/108/network/1732 | 18 ---- results/classifier/108/network/1783 | 18 ---- results/classifier/108/network/1832281 | 99 ------------------- results/classifier/108/network/1861875 | 50 ---------- results/classifier/108/network/1881 | 30 ------ results/classifier/108/network/190 | 16 ---- results/classifier/108/network/198 | 16 ---- results/classifier/108/network/2019 | 41 -------- results/classifier/108/network/2024 | 45 --------- results/classifier/108/network/2109 | 16 ---- results/classifier/108/network/2178 | 32 ------- results/classifier/108/network/2409 | 16 ---- results/classifier/108/network/2459 | 16 ---- results/classifier/108/network/2494 | 16 ---- results/classifier/108/network/2514 | 16 ---- results/classifier/108/network/2528 | 24 ----- results/classifier/108/network/2623 | 16 ---- results/classifier/108/network/2668 | 18 ---- results/classifier/108/network/2685 | 16 ---- results/classifier/108/network/2688 | 16 ---- results/classifier/108/network/2745 | 41 -------- results/classifier/108/network/2756 | 57 ----------- results/classifier/108/network/2758 | 38 -------- results/classifier/108/network/2767 | 52 ---------- results/classifier/108/network/2780 | 32 ------- results/classifier/108/network/2829 | 36 ------- results/classifier/108/network/2872 | 16 ---- results/classifier/108/network/2884 | 50 ---------- results/classifier/108/network/2951 | 36 ------- results/classifier/108/network/299 | 16 ---- results/classifier/108/network/308 | 16 ---- results/classifier/108/network/335 | 16 ---- results/classifier/108/network/377 | 16 ---- results/classifier/108/network/428 | 16 ---- results/classifier/108/network/460 | 16 ---- results/classifier/108/network/465 | 22 ----- results/classifier/108/network/485250 | 48 ---------- results/classifier/108/network/580 | 32 ------- results/classifier/108/network/593 | 22 ----- results/classifier/108/network/605 | 30 ------ results/classifier/108/network/62179944 | 41 -------- results/classifier/108/network/641118 | 32 ------- results/classifier/108/network/741 | 16 ---- results/classifier/108/network/774 | 30 ------ results/classifier/108/network/807 | 33 ------- results/classifier/108/network/894037 | 127 ------------------------- results/classifier/108/network/899 | 29 ------ results/classifier/108/network/912 | 16 ---- results/classifier/108/network/976 | 16 ---- 65 files changed, 2275 deletions(-) delete mode 100644 results/classifier/108/network/05479587 delete mode 100644 results/classifier/108/network/1054180 delete mode 100644 results/classifier/108/network/1196727 delete mode 100644 results/classifier/108/network/1279 delete mode 100644 results/classifier/108/network/1286 delete mode 100644 results/classifier/108/network/1297781 delete mode 100644 results/classifier/108/network/1299 delete mode 100644 results/classifier/108/network/1451 delete mode 100644 results/classifier/108/network/1482 delete mode 100644 results/classifier/108/network/1543163 delete mode 100644 results/classifier/108/network/1569988 delete mode 100644 results/classifier/108/network/1574327 delete mode 100644 results/classifier/108/network/1604303 delete mode 100644 results/classifier/108/network/1656927 delete mode 100644 results/classifier/108/network/1662 delete mode 100644 results/classifier/108/network/1719689 delete mode 100644 results/classifier/108/network/1732 delete mode 100644 results/classifier/108/network/1783 delete mode 100644 results/classifier/108/network/1832281 delete mode 100644 results/classifier/108/network/1861875 delete mode 100644 results/classifier/108/network/1881 delete mode 100644 results/classifier/108/network/190 delete mode 100644 results/classifier/108/network/198 delete mode 100644 results/classifier/108/network/2019 delete mode 100644 results/classifier/108/network/2024 delete mode 100644 results/classifier/108/network/2109 delete mode 100644 results/classifier/108/network/2178 delete mode 100644 results/classifier/108/network/2409 delete mode 100644 results/classifier/108/network/2459 delete mode 100644 results/classifier/108/network/2494 delete mode 100644 results/classifier/108/network/2514 delete mode 100644 results/classifier/108/network/2528 delete mode 100644 results/classifier/108/network/2623 delete mode 100644 results/classifier/108/network/2668 delete mode 100644 results/classifier/108/network/2685 delete mode 100644 results/classifier/108/network/2688 delete mode 100644 results/classifier/108/network/2745 delete mode 100644 results/classifier/108/network/2756 delete mode 100644 results/classifier/108/network/2758 delete mode 100644 results/classifier/108/network/2767 delete mode 100644 results/classifier/108/network/2780 delete mode 100644 results/classifier/108/network/2829 delete mode 100644 results/classifier/108/network/2872 delete mode 100644 results/classifier/108/network/2884 delete mode 100644 results/classifier/108/network/2951 delete mode 100644 results/classifier/108/network/299 delete mode 100644 results/classifier/108/network/308 delete mode 100644 results/classifier/108/network/335 delete mode 100644 results/classifier/108/network/377 delete mode 100644 results/classifier/108/network/428 delete mode 100644 results/classifier/108/network/460 delete mode 100644 results/classifier/108/network/465 delete mode 100644 results/classifier/108/network/485250 delete mode 100644 results/classifier/108/network/580 delete mode 100644 results/classifier/108/network/593 delete mode 100644 results/classifier/108/network/605 delete mode 100644 results/classifier/108/network/62179944 delete mode 100644 results/classifier/108/network/641118 delete mode 100644 results/classifier/108/network/741 delete mode 100644 results/classifier/108/network/774 delete mode 100644 results/classifier/108/network/807 delete mode 100644 results/classifier/108/network/894037 delete mode 100644 results/classifier/108/network/899 delete mode 100644 results/classifier/108/network/912 delete mode 100644 results/classifier/108/network/976 (limited to 'results/classifier/108/network') diff --git a/results/classifier/108/network/05479587 b/results/classifier/108/network/05479587 deleted file mode 100644 index 0e1b7068..00000000 --- a/results/classifier/108/network/05479587 +++ /dev/null @@ -1,93 +0,0 @@ -network: 0.963 -semantic: 0.866 -device: 0.811 -socket: 0.716 -performance: 0.669 -PID: 0.618 -permissions: 0.584 -graphic: 0.576 -boot: 0.474 -vnc: 0.464 -files: 0.395 -KVM: 0.374 -debug: 0.314 -other: 0.200 - -[Qemu-devel]  [BUG] network qga : windows os lost ip address of the network card  in some cases - -We think this problem coulde be solevd in qga modules。can anybody give some -advice ? - - -[BUG] network : windows os lost ip address of the network card in some cases - -we found this problem for a long time 。For example, if we has three network -card in virtual xml file ,such as "network connection 1" / "network connection -2"/"network connection 3" 。 - -Echo network card has own ip address ,such as 192.168.1.1 / 2.1 /3.1 , when -delete the first card ,reboot the windows virtual os, then this problem -happened ! - - - - -we found that the sencond network card will replace the first one , then the -ip address of "network connection 2 " become 192.168.1.1 。 - - -Our third party users began to complain about this bug 。All the business of the -second ip lost !!! - -I mean both of windows and linux has this bug , we solve this bug in linux -throught bonding netcrad pci and mac address 。 - -There is no good solution on windows os . thera are ? we implemented a plan to -resumption of IP by QGA. Is there a better way ? - - - - - - - - -原始邮件 - - - -发件人:尹作为10144574 -收件人: address@hidden -日 期 :2017å¹´04月14日 16:46 -主 题 :[BUG] network : windows os lost ip address of the network card in some -cases - - - - - - -we found this problem for a long time 。For example, if we has three network -card in virtual xml file ,such as "network connection 1" / "network connection -2"/"network connection 3" 。 - -Echo network card has own ip address ,such as 192.168.1.1 / 2.1 /3.1 , when -delete the first card ,reboot the windows virtual os, then this problem -happened ! - - - - -we found that the sencond network card will replace the first one , then the -ip address of "network connection 2 " become 192.168.1.1 。 - - -Our third party users began to complain about this bug 。All the business of the -second ip lost !!! - -I mean both of windows and linux has this bug , we solve this bug in linux -throught bonding netcrad pci and mac address 。 - -There is no good solution on windows os . thera are ? we implemented a plan to -resumption of IP by QGA. Is there a better way ? - diff --git a/results/classifier/108/network/1054180 b/results/classifier/108/network/1054180 deleted file mode 100644 index c509c155..00000000 --- a/results/classifier/108/network/1054180 +++ /dev/null @@ -1,38 +0,0 @@ -network: 0.951 -performance: 0.869 -graphic: 0.835 -device: 0.778 -files: 0.728 -vnc: 0.641 -semantic: 0.558 -socket: 0.476 -other: 0.370 -PID: 0.332 -debug: 0.312 -boot: 0.263 -permissions: 0.176 -KVM: 0.155 - -DNS activity in slirp (user networking) mode quickly depletes file descriptors and crashes qemu - -Hi, we have encountered quite some trouble with filedescriptor depletion of the qemu process. We have figured out that it can be demonstrated easily by doing a lot of DNS queries inside the VM -- in our real world scenario this is caused by running centos network install with a fast mirror. - -This situation is further problematic because qemu can't handle fd depletion very well: -1) if ulimit is 1024 then qemu hangs in infinite loop whenever it tries to open the 1025th fd -2) setting ulimit >1024 does not help that much because qemu uses select and max. fd set size is 1024 per default => qemu crashes because of buffer overflow in select() -3) setting ulimit > 1024 AND recompiling with large enough fd set size AND disabling gcc's fortify source seems to work, but that's really just a hot-fix - -The problem can be replicated quite easily by running something like - -while :; do echo >/dev/udp/10.0.2.3/53; done - -inside a Linux VM -- crash comes very soon. - -This problem is present in current qemu (1.2.0) and in earlier as well. - -Triaging old bug tickets ... can you still reproduce this problem with the latest version of QEMU (currently v2.9 or a release candidate of 2.10)? - -Also could you please provide the exact command line that you use to start QEMU? - -[Expired for QEMU because there has been no activity for 60 days.] - diff --git a/results/classifier/108/network/1196727 b/results/classifier/108/network/1196727 deleted file mode 100644 index df52ce01..00000000 --- a/results/classifier/108/network/1196727 +++ /dev/null @@ -1,162 +0,0 @@ -network: 0.961 -permissions: 0.958 -socket: 0.953 -debug: 0.949 -other: 0.938 -device: 0.937 -performance: 0.937 -semantic: 0.931 -PID: 0.926 -graphic: 0.925 -boot: 0.915 -vnc: 0.904 -files: 0.903 -KVM: 0.796 - -SLIRP on Windows 7 64-bit host or is it me? - - Version: 1.5.1 and tried latest in Git, compiled for x86_64 Windows 64-bit - Host: Windows 7 64-bit - Guest: FreeBSD 9.1 i386, RHEL 6.4 x86_64, SLES 11.2 x86_64, OpenSUSE 12.3 ppc64, Fedora 18 ppc64 - libiconv: 1.14 - glib: 2.28.8 -gettext: 0.18.1.1 - pixman: 0.30.0 - libSDL: 1.2.14 - Driver: virtio-net-pci - Emu: full (non-KVM) - -I'm new to Windows 7 64-bit as a host for QEMU (previously I was running QEMU on Windows XP with no issues) so it could be me, now on Windows 7 SLIRP only works for me connecting internally from the host to the guest via SLIRP redirect, but any outbound requests from the guest to the Internet are failing with the following: - -if_start... -m_get... - m = 61f7bd40 -ip_input... - m = 61f7bd40 - m_len = 48 -tcp_input... - m = 61f7bd40 iphlen = 20 inso = 0 -tcp_fconnect... - so = 33e140 - connect()ing, addr.sin_port=80, addr.sin_addr.s_addr=206.190.36.45 - tcp fconnect errno = 10035-Unknown error -icmp_error... - msrc = 61f7bd40 - msrc_len = 48 - 10.0.2.5 to 206.190.36.45 -m_get... - m = 61f7b6c0 -ip_output... - so = 0 - m0 = 61f7b6c0 -if_output... - so = 0 - ifm = 61f7b6c0 -if_start... -arp_table_search... - ip = 0x502000a - found hw addr = 52:54:00:12:34:56 -m_free... - m = 61f7b6c0 -tcp_close... - tp = 377840 -m_free... - m = 0 -m_free... - m = 61f7bd40 - -Am I doing something wrong with my Windows host configuration or is this a bug in SLIRP only on W64 and not W32? - -I confirmed it wasn't my host, I successfully ran a test on the same host with a 32-bit QEMU build and SLIRP works fine, for 1.6.0-rc3 as well. - -It could be my x86_64-w64-mingw32-gcc compiler version, I tested 4.8 and 4.7, maybe they're too new? Is there a specific gcc version known to work? I can build a new cross-compiler if need be. - -The reason I want the 64-bit build to work is to raise the guest memory. - -Triaging old bug tickets ... can you still reproduce this problem with the latest version of QEMU (currently v2.9.0)? - -Hi, you can close this ticket. I can't remember what I did to get it working. - -Sent from Yahoo Mail on Android - - On Thu, Jul 20, 2017 at 8:16 AM, Thomas Huth