From dee4dcba78baf712cab403d47d9db319ab7f95d6 Mon Sep 17 00:00:00 2001 From: Christian Krinitsin Date: Thu, 3 Jul 2025 19:39:53 +0200 Subject: restructure results --- results/classifier/108/vnc/11357571 | 57 ------------ results/classifier/108/vnc/1246990 | 68 --------------- results/classifier/108/vnc/1339 | 31 ------- results/classifier/108/vnc/1354279 | 85 ------------------ results/classifier/108/vnc/1391942 | 72 ---------------- results/classifier/108/vnc/1453612 | 36 -------- results/classifier/108/vnc/1486278 | 38 -------- results/classifier/108/vnc/1548 | 53 ------------ results/classifier/108/vnc/1661176 | 24 ------ results/classifier/108/vnc/1686 | 58 ------------- results/classifier/108/vnc/1715186 | 67 --------------- results/classifier/108/vnc/1732671 | 33 ------- results/classifier/108/vnc/1752646 | 43 ---------- results/classifier/108/vnc/1816819 | 75 ---------------- results/classifier/108/vnc/1923861 | 167 ------------------------------------ results/classifier/108/vnc/1988 | 41 --------- results/classifier/108/vnc/2001 | 58 ------------- results/classifier/108/vnc/2171 | 40 --------- results/classifier/108/vnc/2492 | 35 -------- results/classifier/108/vnc/2608 | 24 ------ results/classifier/108/vnc/2646 | 40 --------- results/classifier/108/vnc/351 | 16 ---- results/classifier/108/vnc/759 | 27 ------ results/classifier/108/vnc/772 | 27 ------ results/classifier/108/vnc/779 | 28 ------ results/classifier/108/vnc/824074 | 26 ------ results/classifier/108/vnc/981 | 25 ------ 27 files changed, 1294 deletions(-) delete mode 100644 results/classifier/108/vnc/11357571 delete mode 100644 results/classifier/108/vnc/1246990 delete mode 100644 results/classifier/108/vnc/1339 delete mode 100644 results/classifier/108/vnc/1354279 delete mode 100644 results/classifier/108/vnc/1391942 delete mode 100644 results/classifier/108/vnc/1453612 delete mode 100644 results/classifier/108/vnc/1486278 delete mode 100644 results/classifier/108/vnc/1548 delete mode 100644 results/classifier/108/vnc/1661176 delete mode 100644 results/classifier/108/vnc/1686 delete mode 100644 results/classifier/108/vnc/1715186 delete mode 100644 results/classifier/108/vnc/1732671 delete mode 100644 results/classifier/108/vnc/1752646 delete mode 100644 results/classifier/108/vnc/1816819 delete mode 100644 results/classifier/108/vnc/1923861 delete mode 100644 results/classifier/108/vnc/1988 delete mode 100644 results/classifier/108/vnc/2001 delete mode 100644 results/classifier/108/vnc/2171 delete mode 100644 results/classifier/108/vnc/2492 delete mode 100644 results/classifier/108/vnc/2608 delete mode 100644 results/classifier/108/vnc/2646 delete mode 100644 results/classifier/108/vnc/351 delete mode 100644 results/classifier/108/vnc/759 delete mode 100644 results/classifier/108/vnc/772 delete mode 100644 results/classifier/108/vnc/779 delete mode 100644 results/classifier/108/vnc/824074 delete mode 100644 results/classifier/108/vnc/981 (limited to 'results/classifier/108/vnc') diff --git a/results/classifier/108/vnc/11357571 b/results/classifier/108/vnc/11357571 deleted file mode 100644 index a01adc18..00000000 --- a/results/classifier/108/vnc/11357571 +++ /dev/null @@ -1,57 +0,0 @@ -vnc: 0.950 -graphic: 0.915 -performance: 0.806 -device: 0.763 -network: 0.705 -semantic: 0.694 -other: 0.687 -PID: 0.681 -socket: 0.600 -debug: 0.572 -boot: 0.571 -permissions: 0.517 -KVM: 0.516 -files: 0.453 - -[Qemu-devel] [BUG] VNC: client won't send FramebufferUpdateRequest if job in flight is aborted - -Hi Gerd, Daniel. - -We noticed that if VncSharePolicy was configured with -VNC_SHARE_POLICY_FORCE_SHARED mode and -multiple vnc clients opened vnc connections, some clients could go blank screen -at high probability. -This problem can be reproduced when we regularly reboot suse12sp3 in graphic -mode both -with RealVNC and noVNC client. - -Then we dig into it and find out that some clients go blank screen because they -don't -send FramebufferUpdateRequest any more. One step further, we notice that each -time -the job in flight is aborted one client go blank screen. - -The bug is triggered in the following procedure. -Guest reboot => graphic mode switch => graphic_hw_update => vga_update_display -=> vga_draw_graphic (full_update = 1) => dpy_gfx_replace_surface => -vnc_dpy_switch => -vnc_abort_display_jobs (client may have job in flight) => job removed from the -queue -If one client has vnc job in flight, *vnc_abort_display_jobs* will wait until -its job is abandoned. -This behavior is done in vnc_worker_thread_loop when 'if (job->vs->ioc == NULL -|| job->vs->abort == true)' -branch is taken. - -As we can see, *vnc_abort_display_jobs* is intended to do some optimization to -avoid unnecessary client update. -But if client sends FramebufferUpdateRequest for some graphic area and its -FramebufferUpdate response job -is abandoned, the client may wait for the response and never send new -FramebufferUpdateRequest, which may -case the client go blank screen forever. - -So I am wondering whether we should drop the *vnc_abort_display_jobs* -optimization or do some trick here -to push the client to send new FramebufferUpdateRequest. Do you have any idea ? - diff --git a/results/classifier/108/vnc/1246990 b/results/classifier/108/vnc/1246990 deleted file mode 100644 index e1f1b10f..00000000 --- a/results/classifier/108/vnc/1246990 +++ /dev/null @@ -1,68 +0,0 @@ -vnc: 0.936 -semantic: 0.931 -permissions: 0.928 -graphic: 0.917 -other: 0.913 -network: 0.909 -debug: 0.906 -PID: 0.904 -device: 0.904 -socket: 0.902 -files: 0.886 -performance: 0.881 -boot: 0.872 -KVM: 0.854 - -[qemu-x86-64-linux-user 1.6.1] qemu: uncaught target signal 11 (Segmentation fault) - core dumped - -Rjsupplicant is an authentication client of Campus Network in most universities in China. Its Linux version has only x86 and amd64 version. - -On linux: - -./qemu-x86_64 is compiled from latest qemu 1.6.1, with ./configure options: --enable-debug --target-list=x86_64-linux-user . Compiler is gcc version 4.7.3 (Debian 4.7.3-4) - -$ sudo ./qemu-x86_64 ./rjsupplicant -n eth0 -u USER -p PASS -d 1 -s internet -qemu: uncaught target signal 11 (Segmentation fault) - core dumped - -$ sudo gdb ./qemu-x86_64 -(gdb) r ./rjsupplicant -n eth0 -u USER -p PASS -d 1 -s internet -(gdb) where -#0 0x00005555559c21bd in static_code_gen_buffer () -#1 0x00005555555b74d5 in cpu_tb_exec (cpu=0x555557972580, tb_ptr=0x5555559c2190 "A\213n\250\205\355\017\205\257") - at /home/USER/x/rjsupplicant/x64/qemu-1.6.1/cpu-exec.c:56 -#2 0x00005555555b817d in cpu_x86_exec (env=0x5555579726b0) at /home/USER/x/rjsupplicant/x64/qemu-1.6.1/cpu-exec.c:631 -#3 0x00005555555d997a in cpu_loop (env=0x5555579726b0) at /home/USER/x/rjsupplicant/x64/qemu-1.6.1/linux-user/main.c:283 -#4 0x00005555555eca6b in clone_func (arg=0x7fffffffc1d0) at /home/USER/x/rjsupplicant/x64/qemu-1.6.1/linux-user/syscall.c:4266 -#5 0x00007ffff71bfe0e in start_thread (arg=0x7ffff7f04700) at pthread_create.c:311 -#6 0x00007ffff6ef493d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:113 - -$ file rjsupplicant -rjsupplicant: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.9, not stripped - -$ uname -r -3.10-2-amd64 - - -And it can be run on Linux amd64 successfully. - -Though I don't have the source code of rjsupplicant, so I don't have further information. - -`qemu-x86_64 -strace ./rjsupplicant -n eth0 -u USER -p PASS -d 1 -s internet` is attached as strace_qemu.log - - -The binary is available to download at http://ge.tt/6pgG1tw/v/0 - - - -and, `strace ./rjsuuplicant -n eth0 -u USER -p PASS -d 1 -s internet` is attached as strace_native.log - -I'm not sure x86*-linux-user targets are being tested at all. Last time I checked, x86-64 variant crashed left and right to the point of being completely unusable... - -The backtrace indicates that this is a multithreaded application. These won't work reliably under qemu-user : they tend to crash, as you have found. - -Triaging old bug tickets... can you still reproduce this issue with the latest version of QEMU? Or could we close this ticket nowadays? - -[Expired for qemu (Ubuntu) because there has been no activity for 60 days.] - -[Expired for QEMU because there has been no activity for 60 days.] - diff --git a/results/classifier/108/vnc/1339 b/results/classifier/108/vnc/1339 deleted file mode 100644 index 55a4a957..00000000 --- a/results/classifier/108/vnc/1339 +++ /dev/null @@ -1,31 +0,0 @@ -vnc: 0.948 -device: 0.931 -socket: 0.857 -graphic: 0.827 -network: 0.820 -PID: 0.809 -files: 0.719 -permissions: 0.668 -performance: 0.583 -debug: 0.558 -boot: 0.487 -semantic: 0.476 -KVM: 0.423 -other: 0.273 - -RVV vfncvt.rtz.x.f.w Assertion failed -Description of problem: -when execute -``` -vsetvli t0, x0, e16, m1 -vfncvt.rtz.x.f.w v0, v4 -``` -report error: - -qemu-riscv64: ../target/riscv/translate.c:212: decode_save_opc: Assertion \`ctx->insn_start != NULL' failed. Segmentation fault (core dumped) -Steps to reproduce: -1. write the code -2. compile -3. excute -Additional information: - diff --git a/results/classifier/108/vnc/1354279 b/results/classifier/108/vnc/1354279 deleted file mode 100644 index dc3cc993..00000000 --- a/results/classifier/108/vnc/1354279 +++ /dev/null @@ -1,85 +0,0 @@ -vnc: 0.938 -graphic: 0.874 -KVM: 0.867 -network: 0.863 -performance: 0.826 -socket: 0.819 -device: 0.818 -PID: 0.727 -semantic: 0.663 -debug: 0.647 -permissions: 0.618 -boot: 0.439 -files: 0.423 -other: 0.194 - -The guest will be destroyed after hot remove the VF from the guest. - -Environment: ------------- -Host OS (ia32/ia32e/IA64):ia32e -Guest OS (ia32/ia32e/IA64):ia32e -Guest OS Type (Linux/Windows):Linux -kvm.git Commit:9f6226a762c7ae02f6a23a3d4fc552dafa57ea23 -qemu.git Commit:5a7348045091a2bc15d85bb177e5956aa6114e5a -Host Kernel Version:3.16.0-rc1 -Hardware:Romley_EP, Ivytown_EP,Haswell_EP - - -Bug detailed description: --------------------------- -hot add the VF to the guest, then hot remove the VF from the guest, the guest will be destroyed. - -note: -1. when hot add the VF with vfio, the hot remove the VF from the guest, the guest works fine. -2. this shoule be a qemu bug: -kvm + qemu = result -9f6226a7 + 5a734804 = bad -9f6226a7 + 9f862687 = good - - - -Reproduce steps: ----------------- -1. create guest -qemu-system-x86_64 --enable-kvm -m 1024 -smp 4 -net none rhel6u5.qcow -monitor pty -2. hot add the vf to guest -echo "device_add pci-assign,host=05:10.0,id=nic" >/dev/pts/x -cat /dev/pts/x -3. hot remove the VF froem guest -echo "device_del nic" >/dev/pts/x - -Current result: ----------------- -the guest willl be destroyed after hot remove the VF from the guest - -Expected result: ----------------- -the guest works fine after hot remove the VF from the guest - - -Basic root-causing log: ----------------------- -[root@vt-snb9 qemu.git]# qemu-system-x86_64 -enable-kvm -m 1024 -smp 2 -net none rhel6u5.qcow -monitor pty -VNC server running on `::1:5900' -** -ERROR:qom/object.c:725:object_unref: assertion failed: (obj->ref > 0) -Aborted (core dumped) - -the first bad commit is: -commit 22a893e4f55344f96e1aafc66f5fedc491a5ca97 -Author: Paolo Bonzini