From dee4dcba78baf712cab403d47d9db319ab7f95d6 Mon Sep 17 00:00:00 2001 From: Christian Krinitsin Date: Thu, 3 Jul 2025 19:39:53 +0200 Subject: restructure results --- results/classifier/118/network/05479587 | 108 --------------- results/classifier/118/network/1054180 | 53 -------- results/classifier/118/network/1071 | 42 ------ results/classifier/118/network/111 | 31 ----- results/classifier/118/network/1158 | 31 ----- results/classifier/118/network/1174 | 43 ------ results/classifier/118/network/1176366 | 59 -------- results/classifier/118/network/1279 | 38 ------ results/classifier/118/network/1286 | 31 ----- results/classifier/118/network/1297781 | 43 ------ results/classifier/118/network/1299 | 54 -------- results/classifier/118/network/1309 | 31 ----- results/classifier/118/network/1369347 | 77 ----------- results/classifier/118/network/1385 | 31 ----- results/classifier/118/network/1402289 | 69 ---------- results/classifier/118/network/1451 | 31 ----- results/classifier/118/network/1482 | 45 ------- results/classifier/118/network/151 | 31 ----- results/classifier/118/network/1560 | 31 ----- results/classifier/118/network/1569988 | 88 ------------ results/classifier/118/network/1574327 | 50 ------- results/classifier/118/network/1575561 | 46 ------- results/classifier/118/network/1585433 | 41 ------ results/classifier/118/network/1588591 | 43 ------ results/classifier/118/network/1633508 | 80 ----------- results/classifier/118/network/1656927 | 52 -------- results/classifier/118/network/1662 | 65 --------- results/classifier/118/network/1702798 | 67 ---------- results/classifier/118/network/1719689 | 51 ------- results/classifier/118/network/1732 | 33 ----- results/classifier/118/network/1751 | 31 ----- results/classifier/118/network/1754372 | 48 ------- results/classifier/118/network/1783 | 33 ----- results/classifier/118/network/1814352 | 97 -------------- results/classifier/118/network/1824622 | 49 ------- results/classifier/118/network/1856834 | 230 -------------------------------- results/classifier/118/network/1861875 | 65 --------- results/classifier/118/network/1862979 | 61 --------- results/classifier/118/network/1874539 | 59 -------- results/classifier/118/network/1874676 | 53 -------- results/classifier/118/network/1876 | 31 ----- results/classifier/118/network/1881 | 45 ------- results/classifier/118/network/1884169 | 48 ------- results/classifier/118/network/190 | 31 ----- results/classifier/118/network/1904954 | 70 ---------- results/classifier/118/network/2019 | 56 -------- results/classifier/118/network/2024 | 60 --------- results/classifier/118/network/2088 | 51 ------- results/classifier/118/network/2109 | 31 ----- results/classifier/118/network/2143 | 68 ---------- results/classifier/118/network/2182 | 31 ----- results/classifier/118/network/2209 | 77 ----------- results/classifier/118/network/2228 | 38 ------ results/classifier/118/network/235 | 31 ----- results/classifier/118/network/2364 | 31 ----- results/classifier/118/network/2409 | 31 ----- results/classifier/118/network/2459 | 31 ----- results/classifier/118/network/2494 | 31 ----- results/classifier/118/network/2514 | 31 ----- results/classifier/118/network/2528 | 39 ------ results/classifier/118/network/2623 | 31 ----- results/classifier/118/network/2668 | 33 ----- results/classifier/118/network/2685 | 31 ----- results/classifier/118/network/2688 | 31 ----- results/classifier/118/network/2745 | 56 -------- results/classifier/118/network/2746 | 31 ----- results/classifier/118/network/2756 | 72 ---------- results/classifier/118/network/2758 | 53 -------- results/classifier/118/network/2767 | 67 ---------- results/classifier/118/network/2780 | 47 ------- results/classifier/118/network/282 | 31 ----- results/classifier/118/network/2827 | 31 ----- results/classifier/118/network/2829 | 51 ------- results/classifier/118/network/2849 | 48 ------- results/classifier/118/network/2872 | 31 ----- results/classifier/118/network/2884 | 65 --------- results/classifier/118/network/2951 | 51 ------- results/classifier/118/network/299 | 31 ----- results/classifier/118/network/308 | 31 ----- results/classifier/118/network/309 | 31 ----- results/classifier/118/network/335 | 31 ----- results/classifier/118/network/336 | 31 ----- results/classifier/118/network/360 | 31 ----- results/classifier/118/network/377 | 31 ----- results/classifier/118/network/428 | 31 ----- results/classifier/118/network/460 | 31 ----- results/classifier/118/network/485250 | 63 --------- results/classifier/118/network/517 | 31 ----- results/classifier/118/network/533 | 31 ----- results/classifier/118/network/539 | 31 ----- results/classifier/118/network/544 | 31 ----- results/classifier/118/network/557 | 31 ----- results/classifier/118/network/580 | 47 ------- results/classifier/118/network/590552 | 53 -------- results/classifier/118/network/593 | 37 ----- results/classifier/118/network/605 | 45 ------- results/classifier/118/network/62179944 | 56 -------- results/classifier/118/network/641118 | 47 ------- results/classifier/118/network/676934 | 48 ------- results/classifier/118/network/741 | 31 ----- results/classifier/118/network/762 | 31 ----- results/classifier/118/network/774 | 45 ------- results/classifier/118/network/806656 | 52 -------- results/classifier/118/network/807 | 48 ------- results/classifier/118/network/829455 | 73 ---------- results/classifier/118/network/838974 | 44 ------ results/classifier/118/network/898 | 31 ----- results/classifier/118/network/903365 | 40 ------ results/classifier/118/network/912 | 31 ----- results/classifier/118/network/960 | 31 ----- results/classifier/118/network/97 | 31 ----- results/classifier/118/network/974 | 33 ----- results/classifier/118/network/976 | 31 ----- results/classifier/118/network/984476 | 44 ------ results/classifier/118/network/999 | 36 ----- 115 files changed, 5305 deletions(-) delete mode 100644 results/classifier/118/network/05479587 delete mode 100644 results/classifier/118/network/1054180 delete mode 100644 results/classifier/118/network/1071 delete mode 100644 results/classifier/118/network/111 delete mode 100644 results/classifier/118/network/1158 delete mode 100644 results/classifier/118/network/1174 delete mode 100644 results/classifier/118/network/1176366 delete mode 100644 results/classifier/118/network/1279 delete mode 100644 results/classifier/118/network/1286 delete mode 100644 results/classifier/118/network/1297781 delete mode 100644 results/classifier/118/network/1299 delete mode 100644 results/classifier/118/network/1309 delete mode 100644 results/classifier/118/network/1369347 delete mode 100644 results/classifier/118/network/1385 delete mode 100644 results/classifier/118/network/1402289 delete mode 100644 results/classifier/118/network/1451 delete mode 100644 results/classifier/118/network/1482 delete mode 100644 results/classifier/118/network/151 delete mode 100644 results/classifier/118/network/1560 delete mode 100644 results/classifier/118/network/1569988 delete mode 100644 results/classifier/118/network/1574327 delete mode 100644 results/classifier/118/network/1575561 delete mode 100644 results/classifier/118/network/1585433 delete mode 100644 results/classifier/118/network/1588591 delete mode 100644 results/classifier/118/network/1633508 delete mode 100644 results/classifier/118/network/1656927 delete mode 100644 results/classifier/118/network/1662 delete mode 100644 results/classifier/118/network/1702798 delete mode 100644 results/classifier/118/network/1719689 delete mode 100644 results/classifier/118/network/1732 delete mode 100644 results/classifier/118/network/1751 delete mode 100644 results/classifier/118/network/1754372 delete mode 100644 results/classifier/118/network/1783 delete mode 100644 results/classifier/118/network/1814352 delete mode 100644 results/classifier/118/network/1824622 delete mode 100644 results/classifier/118/network/1856834 delete mode 100644 results/classifier/118/network/1861875 delete mode 100644 results/classifier/118/network/1862979 delete mode 100644 results/classifier/118/network/1874539 delete mode 100644 results/classifier/118/network/1874676 delete mode 100644 results/classifier/118/network/1876 delete mode 100644 results/classifier/118/network/1881 delete mode 100644 results/classifier/118/network/1884169 delete mode 100644 results/classifier/118/network/190 delete mode 100644 results/classifier/118/network/1904954 delete mode 100644 results/classifier/118/network/2019 delete mode 100644 results/classifier/118/network/2024 delete mode 100644 results/classifier/118/network/2088 delete mode 100644 results/classifier/118/network/2109 delete mode 100644 results/classifier/118/network/2143 delete mode 100644 results/classifier/118/network/2182 delete mode 100644 results/classifier/118/network/2209 delete mode 100644 results/classifier/118/network/2228 delete mode 100644 results/classifier/118/network/235 delete mode 100644 results/classifier/118/network/2364 delete mode 100644 results/classifier/118/network/2409 delete mode 100644 results/classifier/118/network/2459 delete mode 100644 results/classifier/118/network/2494 delete mode 100644 results/classifier/118/network/2514 delete mode 100644 results/classifier/118/network/2528 delete mode 100644 results/classifier/118/network/2623 delete mode 100644 results/classifier/118/network/2668 delete mode 100644 results/classifier/118/network/2685 delete mode 100644 results/classifier/118/network/2688 delete mode 100644 results/classifier/118/network/2745 delete mode 100644 results/classifier/118/network/2746 delete mode 100644 results/classifier/118/network/2756 delete mode 100644 results/classifier/118/network/2758 delete mode 100644 results/classifier/118/network/2767 delete mode 100644 results/classifier/118/network/2780 delete mode 100644 results/classifier/118/network/282 delete mode 100644 results/classifier/118/network/2827 delete mode 100644 results/classifier/118/network/2829 delete mode 100644 results/classifier/118/network/2849 delete mode 100644 results/classifier/118/network/2872 delete mode 100644 results/classifier/118/network/2884 delete mode 100644 results/classifier/118/network/2951 delete mode 100644 results/classifier/118/network/299 delete mode 100644 results/classifier/118/network/308 delete mode 100644 results/classifier/118/network/309 delete mode 100644 results/classifier/118/network/335 delete mode 100644 results/classifier/118/network/336 delete mode 100644 results/classifier/118/network/360 delete mode 100644 results/classifier/118/network/377 delete mode 100644 results/classifier/118/network/428 delete mode 100644 results/classifier/118/network/460 delete mode 100644 results/classifier/118/network/485250 delete mode 100644 results/classifier/118/network/517 delete mode 100644 results/classifier/118/network/533 delete mode 100644 results/classifier/118/network/539 delete mode 100644 results/classifier/118/network/544 delete mode 100644 results/classifier/118/network/557 delete mode 100644 results/classifier/118/network/580 delete mode 100644 results/classifier/118/network/590552 delete mode 100644 results/classifier/118/network/593 delete mode 100644 results/classifier/118/network/605 delete mode 100644 results/classifier/118/network/62179944 delete mode 100644 results/classifier/118/network/641118 delete mode 100644 results/classifier/118/network/676934 delete mode 100644 results/classifier/118/network/741 delete mode 100644 results/classifier/118/network/762 delete mode 100644 results/classifier/118/network/774 delete mode 100644 results/classifier/118/network/806656 delete mode 100644 results/classifier/118/network/807 delete mode 100644 results/classifier/118/network/829455 delete mode 100644 results/classifier/118/network/838974 delete mode 100644 results/classifier/118/network/898 delete mode 100644 results/classifier/118/network/903365 delete mode 100644 results/classifier/118/network/912 delete mode 100644 results/classifier/118/network/960 delete mode 100644 results/classifier/118/network/97 delete mode 100644 results/classifier/118/network/974 delete mode 100644 results/classifier/118/network/976 delete mode 100644 results/classifier/118/network/984476 delete mode 100644 results/classifier/118/network/999 (limited to 'results/classifier/118/network') diff --git a/results/classifier/118/network/05479587 b/results/classifier/118/network/05479587 deleted file mode 100644 index 49122dfe..00000000 --- a/results/classifier/118/network/05479587 +++ /dev/null @@ -1,108 +0,0 @@ -network: 0.963 -virtual: 0.880 -semantic: 0.866 -device: 0.811 -mistranslation: 0.759 -socket: 0.716 -performance: 0.669 -hypervisor: 0.658 -PID: 0.618 -ppc: 0.616 -register: 0.598 -permissions: 0.584 -graphic: 0.576 -user-level: 0.541 -arm: 0.503 -architecture: 0.501 -peripherals: 0.494 -risc-v: 0.479 -boot: 0.474 -vnc: 0.464 -kernel: 0.460 -files: 0.395 -KVM: 0.374 -i386: 0.360 -assembly: 0.326 -VMM: 0.320 -debug: 0.314 -TCG: 0.226 -x86: 0.197 - -[Qemu-devel]  [BUG] network qga : windows os lost ip address of the network card  in some cases - -We think this problem coulde be solevd in qga modules。can anybody give some -advice ? - - -[BUG] network : windows os lost ip address of the network card in some cases - -we found this problem for a long time 。For example, if we has three network -card in virtual xml file ,such as "network connection 1" / "network connection -2"/"network connection 3" 。 - -Echo network card has own ip address ,such as 192.168.1.1 / 2.1 /3.1 , when -delete the first card ,reboot the windows virtual os, then this problem -happened ! - - - - -we found that the sencond network card will replace the first one , then the -ip address of "network connection 2 " become 192.168.1.1 。 - - -Our third party users began to complain about this bug 。All the business of the -second ip lost !!! - -I mean both of windows and linux has this bug , we solve this bug in linux -throught bonding netcrad pci and mac address 。 - -There is no good solution on windows os . thera are ? we implemented a plan to -resumption of IP by QGA. Is there a better way ? - - - - - - - - -原始邮件 - - - -发件人:尹作为10144574 -收件人: address@hidden -日 期 :2017å¹´04月14日 16:46 -主 题 :[BUG] network : windows os lost ip address of the network card in some -cases - - - - - - -we found this problem for a long time 。For example, if we has three network -card in virtual xml file ,such as "network connection 1" / "network connection -2"/"network connection 3" 。 - -Echo network card has own ip address ,such as 192.168.1.1 / 2.1 /3.1 , when -delete the first card ,reboot the windows virtual os, then this problem -happened ! - - - - -we found that the sencond network card will replace the first one , then the -ip address of "network connection 2 " become 192.168.1.1 。 - - -Our third party users began to complain about this bug 。All the business of the -second ip lost !!! - -I mean both of windows and linux has this bug , we solve this bug in linux -throught bonding netcrad pci and mac address 。 - -There is no good solution on windows os . thera are ? we implemented a plan to -resumption of IP by QGA. Is there a better way ? - diff --git a/results/classifier/118/network/1054180 b/results/classifier/118/network/1054180 deleted file mode 100644 index af937e7e..00000000 --- a/results/classifier/118/network/1054180 +++ /dev/null @@ -1,53 +0,0 @@ -network: 0.951 -virtual: 0.899 -performance: 0.869 -graphic: 0.835 -device: 0.778 -files: 0.728 -user-level: 0.721 -vnc: 0.641 -semantic: 0.558 -ppc: 0.522 -socket: 0.476 -hypervisor: 0.418 -architecture: 0.394 -kernel: 0.340 -i386: 0.338 -PID: 0.332 -debug: 0.312 -register: 0.311 -x86: 0.310 -risc-v: 0.294 -peripherals: 0.282 -boot: 0.263 -mistranslation: 0.225 -TCG: 0.198 -permissions: 0.176 -VMM: 0.161 -arm: 0.156 -KVM: 0.155 -assembly: 0.102 - -DNS activity in slirp (user networking) mode quickly depletes file descriptors and crashes qemu - -Hi, we have encountered quite some trouble with filedescriptor depletion of the qemu process. We have figured out that it can be demonstrated easily by doing a lot of DNS queries inside the VM -- in our real world scenario this is caused by running centos network install with a fast mirror. - -This situation is further problematic because qemu can't handle fd depletion very well: -1) if ulimit is 1024 then qemu hangs in infinite loop whenever it tries to open the 1025th fd -2) setting ulimit >1024 does not help that much because qemu uses select and max. fd set size is 1024 per default => qemu crashes because of buffer overflow in select() -3) setting ulimit > 1024 AND recompiling with large enough fd set size AND disabling gcc's fortify source seems to work, but that's really just a hot-fix - -The problem can be replicated quite easily by running something like - -while :; do echo >/dev/udp/10.0.2.3/53; done - -inside a Linux VM -- crash comes very soon. - -This problem is present in current qemu (1.2.0) and in earlier as well. - -Triaging old bug tickets ... can you still reproduce this problem with the latest version of QEMU (currently v2.9 or a release candidate of 2.10)? - -Also could you please provide the exact command line that you use to start QEMU? - -[Expired for QEMU because there has been no activity for 60 days.] - diff --git a/results/classifier/118/network/1071 b/results/classifier/118/network/1071 deleted file mode 100644 index 15621983..00000000 --- a/results/classifier/118/network/1071 +++ /dev/null @@ -1,42 +0,0 @@ -network: 0.876 -graphic: 0.792 -device: 0.708 -virtual: 0.650 -performance: 0.625 -semantic: 0.582 -mistranslation: 0.422 -debug: 0.402 -PID: 0.364 -hypervisor: 0.309 -risc-v: 0.302 -vnc: 0.285 -permissions: 0.238 -register: 0.215 -VMM: 0.194 -socket: 0.186 -i386: 0.166 -KVM: 0.165 -boot: 0.150 -user-level: 0.142 -assembly: 0.112 -architecture: 0.112 -x86: 0.110 -peripherals: 0.104 -TCG: 0.096 -ppc: 0.091 -files: 0.075 -arm: 0.064 -kernel: 0.057 - -Cannot passthrough two network devices (Mellanox ConnectX-3) to VM. -Description of problem: -Cannot passthrough two network devices (Mellanox ConnectX-3) to VM. - -It generated me an error: -[ 6322.674602] genirq: Flags mismatch irq 16. 00000000 (vfio-intx(0000:05:00.0)) vs. 00000000 (vfio-intx(0000:88:00.0)) - -Passthrough only one device to VM goes well. -Steps to reproduce: -1. Add a first passthrough network device. -2. Add a second passthrough network device. -3. Run VM. diff --git a/results/classifier/118/network/111 b/results/classifier/118/network/111 deleted file mode 100644 index 34474aee..00000000 --- a/results/classifier/118/network/111 +++ /dev/null @@ -1,31 +0,0 @@ -network: 0.845 -mistranslation: 0.835 -performance: 0.748 -device: 0.719 -debug: 0.524 -socket: 0.481 -register: 0.447 -graphic: 0.412 -peripherals: 0.408 -architecture: 0.366 -kernel: 0.345 -ppc: 0.333 -x86: 0.316 -boot: 0.304 -i386: 0.295 -semantic: 0.294 -arm: 0.294 -VMM: 0.283 -permissions: 0.242 -risc-v: 0.236 -vnc: 0.223 -hypervisor: 0.223 -virtual: 0.219 -TCG: 0.201 -assembly: 0.144 -user-level: 0.121 -files: 0.110 -PID: 0.074 -KVM: 0.037 - -[OSS-Fuzz] Assertion Failure: !in6_zero(&ip_addr) diff --git a/results/classifier/118/network/1158 b/results/classifier/118/network/1158 deleted file mode 100644 index 9b4d3fc0..00000000 --- a/results/classifier/118/network/1158 +++ /dev/null @@ -1,31 +0,0 @@ -network: 0.832 -device: 0.814 -debug: 0.738 -vnc: 0.697 -performance: 0.576 -virtual: 0.511 -arm: 0.431 -graphic: 0.321 -risc-v: 0.305 -semantic: 0.246 -ppc: 0.232 -i386: 0.195 -x86: 0.146 -mistranslation: 0.125 -boot: 0.113 -user-level: 0.104 -permissions: 0.100 -architecture: 0.093 -TCG: 0.082 -assembly: 0.066 -register: 0.055 -PID: 0.054 -socket: 0.032 -hypervisor: 0.014 -peripherals: 0.011 -files: 0.009 -VMM: 0.008 -KVM: 0.005 -kernel: 0.004 - -Error in setting VNC password diff --git a/results/classifier/118/network/1174 b/results/classifier/118/network/1174 deleted file mode 100644 index 5e933de1..00000000 --- a/results/classifier/118/network/1174 +++ /dev/null @@ -1,43 +0,0 @@ -network: 0.855 -device: 0.851 -kernel: 0.819 -ppc: 0.808 -graphic: 0.805 -performance: 0.771 -architecture: 0.711 -register: 0.676 -mistranslation: 0.670 -PID: 0.594 -files: 0.578 -semantic: 0.564 -vnc: 0.518 -peripherals: 0.508 -socket: 0.494 -permissions: 0.438 -arm: 0.435 -VMM: 0.431 -TCG: 0.414 -i386: 0.403 -x86: 0.393 -user-level: 0.359 -risc-v: 0.324 -boot: 0.306 -debug: 0.291 -KVM: 0.265 -hypervisor: 0.247 -virtual: 0.210 -assembly: 0.156 - -aspeed: Fix first byte in I2C old register mode slave receive -Description of problem: -The first byte of data received through the Aspeed I2C slave controller through the old-register mode (specifically byte-buffered, not pool buffered or DMA buffered) is incorrect. It should be the 8-bit I2C slave address for the transfer, which will be the 7-bit I2C slave address of the I2C controller shifted left 1, and 1 or 0 for the lowest bit (is-slave-to-master-transfer, or is-master-to-slave-transfer). -Steps to reproduce: -You could use the simulated I2C slave EEPROM https://docs.kernel.org/i2c/slave-eeprom-backend.html, but you need another I2C model to send data to it. - -Alternatively, you can take this downstream patch and run the qtest in it. It has a test case for slave-mode rx in old-register mode: - -https://github.com/facebook/openbmc/blob/helium/common/recipes-devtools/qemu/qemu/0008-hw-misc-Add-byte-by-byte-i2c-network-device.patch -Additional information: -I already created the fix, it's pretty simple, I submitted it to the mailing list and Klaus (the author of that section of the Aspeed I2C controller) reviewed it. https://lore.kernel.org/qemu-devel/20220820225712.713209-1-peter@pjd.dev/#t - -This is relatively critical fix, but since slave-mode I2C is not widely used at this point, it's probably fine to ship with this bug. My team uses the master branch for everything anyways. diff --git a/results/classifier/118/network/1176366 b/results/classifier/118/network/1176366 deleted file mode 100644 index 7e28142a..00000000 --- a/results/classifier/118/network/1176366 +++ /dev/null @@ -1,59 +0,0 @@ -network: 0.851 -kernel: 0.753 -debug: 0.708 -peripherals: 0.599 -device: 0.568 -performance: 0.526 -graphic: 0.525 -TCG: 0.502 -semantic: 0.490 -PID: 0.484 -user-level: 0.467 -ppc: 0.463 -mistranslation: 0.458 -register: 0.425 -permissions: 0.400 -hypervisor: 0.389 -architecture: 0.382 -files: 0.378 -vnc: 0.355 -i386: 0.350 -risc-v: 0.329 -socket: 0.312 -boot: 0.296 -x86: 0.289 -virtual: 0.288 -arm: 0.254 -VMM: 0.223 -assembly: 0.211 -KVM: 0.153 - -TCPIP not working on qemu 1.4.50 (master) - -whenever I try, in the guest OS, in this case it's NT 3.1, to enable TCP/IP, it crashes the whole emulator. With either the ne2000 isa, ne2000 pci or PCnet, still crashes - -below is attached a screenshot. - - - -On Sat, May 04, 2013 at 04:13:19PM -0000, TC1988 wrote: -> whenever I try, in the guest OS, in this case it's NT 3.1, to enable -> TCP/IP, it crashes the whole emulator. With either the ne2000 isa, -> ne2000 pci or PCnet, still crashes -> -> below is attached a screenshot. - -Please use git-bisect(1) to identify the commit that broke networking. - -http://git-scm.com/book/en/Git-Tools-Debugging-with-Git#Binary-Search -https://www.kernel.org/pub/software/scm/git/docs/git-bisect.html - -Stefan - - -looks like it also happens in 1.5.0-rc1, will check later with git bisect in the latest git release based on rc1. - -Triaging old bug tickets... can you still reproduce this issue with the latest version of QEMU? Or could we close this ticket nowadays? - -[Expired for QEMU because there has been no activity for 60 days.] - diff --git a/results/classifier/118/network/1279 b/results/classifier/118/network/1279 deleted file mode 100644 index 1a78f255..00000000 --- a/results/classifier/118/network/1279 +++ /dev/null @@ -1,38 +0,0 @@ -network: 0.990 -device: 0.860 -virtual: 0.737 -graphic: 0.690 -vnc: 0.532 -VMM: 0.421 -semantic: 0.344 -ppc: 0.301 -risc-v: 0.289 -debug: 0.279 -mistranslation: 0.272 -socket: 0.265 -arm: 0.253 -KVM: 0.242 -boot: 0.234 -x86: 0.212 -hypervisor: 0.202 -register: 0.201 -PID: 0.190 -performance: 0.183 -peripherals: 0.177 -user-level: 0.161 -TCG: 0.161 -architecture: 0.146 -permissions: 0.113 -assembly: 0.107 -files: 0.061 -i386: 0.056 -kernel: 0.034 - -please assist resolving windows networking issue -Description of problem: -After Installation of Windows, for Intel E1000 , Realtek and VirtIO, Windows shows "Error Code 56: Windows is Still Setting Up the Class Configuration For This Device" in device manager and Network won't work -Steps to reproduce: -Install Windows 10 VM on Proxmox 7.2 with virtual hardware Version 6.1 -You get the error code above. When using virtio nic , during installation of the kvm-qemu-virtio driver/agent package, the installer get's stuck and finally fails. - -If you downgrade to virtual hardware 5.1 , the problem goes away. diff --git a/results/classifier/118/network/1286 b/results/classifier/118/network/1286 deleted file mode 100644 index 7f0fb18c..00000000 --- a/results/classifier/118/network/1286 +++ /dev/null @@ -1,31 +0,0 @@ -mistranslation: 0.979 -network: 0.923 -device: 0.826 -semantic: 0.709 -architecture: 0.654 -arm: 0.567 -PID: 0.558 -permissions: 0.510 -user-level: 0.416 -performance: 0.407 -files: 0.387 -i386: 0.328 -virtual: 0.315 -boot: 0.313 -register: 0.289 -VMM: 0.260 -risc-v: 0.250 -vnc: 0.246 -ppc: 0.221 -TCG: 0.214 -x86: 0.210 -debug: 0.209 -peripherals: 0.205 -graphic: 0.196 -assembly: 0.166 -socket: 0.102 -hypervisor: 0.092 -KVM: 0.074 -kernel: 0.024 - -netdev tftp option docs don't mention that the TFTP server is read-only diff --git a/results/classifier/118/network/1297781 b/results/classifier/118/network/1297781 deleted file mode 100644 index 86e26221..00000000 --- a/results/classifier/118/network/1297781 +++ /dev/null @@ -1,43 +0,0 @@ -network: 0.940 -device: 0.876 -files: 0.779 -virtual: 0.754 -boot: 0.708 -performance: 0.664 -vnc: 0.637 -mistranslation: 0.608 -user-level: 0.548 -architecture: 0.547 -graphic: 0.544 -PID: 0.540 -VMM: 0.517 -ppc: 0.487 -hypervisor: 0.465 -semantic: 0.440 -register: 0.435 -socket: 0.432 -debug: 0.420 -i386: 0.418 -risc-v: 0.386 -permissions: 0.364 -x86: 0.356 -peripherals: 0.343 -kernel: 0.335 -KVM: 0.334 -assembly: 0.263 -TCG: 0.231 -arm: 0.215 - -Network device cannot communicate with host machine - -I know this used to work but it doesnt work any more using qemu 1.4.2 on fedora 19 everything works fine -except when i add a NIC sharing the main interface from the host (not the virtual network) - -the hosts ip is 10.0.0.4, the router is 10.0.0.1 so when i boot my virtual machine it gets an ip from the router no problem -i get on the internet fine, and i can connect (ping,ftp, samba whatever) to all the computers on the network except the host -10.0.0.4 i can't ping it, i cant do anything to it, but i can connect to all the other computers on the network and i know i used to be able to do this because thats how i shared files between the host and windows guest, with samba... but now i can't browse the host computer because it can't communicate... please help. - -Triaging old bug tickets ... How did you start QEMU here? Can you still reproduce this issue with the latest version of QEMU? - -[Expired for QEMU because there has been no activity for 60 days.] - diff --git a/results/classifier/118/network/1299 b/results/classifier/118/network/1299 deleted file mode 100644 index 456ccc56..00000000 --- a/results/classifier/118/network/1299 +++ /dev/null @@ -1,54 +0,0 @@ -network: 0.973 -user-level: 0.937 -virtual: 0.894 -graphic: 0.862 -device: 0.852 -files: 0.817 -semantic: 0.816 -architecture: 0.813 -performance: 0.810 -permissions: 0.742 -register: 0.711 -ppc: 0.673 -vnc: 0.619 -socket: 0.614 -debug: 0.569 -PID: 0.553 -mistranslation: 0.539 -risc-v: 0.491 -boot: 0.489 -arm: 0.461 -peripherals: 0.454 -hypervisor: 0.445 -KVM: 0.356 -kernel: 0.332 -i386: 0.330 -TCG: 0.315 -VMM: 0.297 -assembly: 0.247 -x86: 0.243 - -User networking with an SMB Share while not running as root -Description of problem: -When attempting to write a file to the qemu share, Samba always responds with NT_STATUS_ACCESS_DENIED. - -This only happens on the MacOS version of Samba, on Linux it appears to work without issues for now. -Steps to reproduce: -1. Start a VM with a SMB share attached to it -2. Create a test file to upload `touch test-file.txt` -3. Upload the test file `smbclient //10.0.2.4/qemu -c 'put test-file.txt' -Additional information: -QEMU has been using Samba for it's SMB shares for quite some time now. -But in the 4.17.x release a bug has appeared in the MacOS Build of Samba. - -I've filed a bug with Samba, and suggested a fix for it. -https://bugzilla.samba.org/show_bug.cgi?id=15215 - -The origin of the bug lies in the fact that when running SMBD as a non-root user, a function sets `errno` unexpectedly. -But after discussing this with Samba, they concluded that running smbd as an un-privileged user is not a supported use case. - -Whilst this is not a QEMU bug per se, it is caused by the fact that QEMU is running smbd in an unsupported manner. - -As a side note, on Linux this bug does not appear to exist as of yet. -The Linux version of `unbecome_root` doesn't seem to set `errno`. (tested on a recent ArchLinux install). -But I think this depends on the LibC implementation of setuid/seteuid/setreuid/etc. so I can't say it won't happen in the future, or with a different LibC implementation. diff --git a/results/classifier/118/network/1309 b/results/classifier/118/network/1309 deleted file mode 100644 index 76cde1ca..00000000 --- a/results/classifier/118/network/1309 +++ /dev/null @@ -1,31 +0,0 @@ -network: 0.893 -graphic: 0.813 -device: 0.748 -performance: 0.730 -architecture: 0.580 -arm: 0.382 -hypervisor: 0.297 -debug: 0.249 -ppc: 0.203 -vnc: 0.199 -VMM: 0.131 -TCG: 0.121 -i386: 0.106 -x86: 0.104 -boot: 0.102 -risc-v: 0.095 -mistranslation: 0.085 -PID: 0.060 -peripherals: 0.050 -virtual: 0.040 -KVM: 0.040 -socket: 0.037 -semantic: 0.029 -user-level: 0.028 -register: 0.020 -permissions: 0.011 -assembly: 0.011 -kernel: 0.007 -files: 0.003 - -Heap-overflow in virtio_net_queue_enable diff --git a/results/classifier/118/network/1369347 b/results/classifier/118/network/1369347 deleted file mode 100644 index eb0deb15..00000000 --- a/results/classifier/118/network/1369347 +++ /dev/null @@ -1,77 +0,0 @@ -network: 0.850 -device: 0.840 -PID: 0.701 -peripherals: 0.694 -hypervisor: 0.686 -architecture: 0.673 -socket: 0.656 -user-level: 0.655 -arm: 0.651 -ppc: 0.645 -register: 0.612 -vnc: 0.610 -files: 0.588 -risc-v: 0.578 -permissions: 0.572 -boot: 0.570 -performance: 0.568 -semantic: 0.567 -graphic: 0.560 -VMM: 0.558 -kernel: 0.557 -x86: 0.506 -TCG: 0.505 -mistranslation: 0.491 -virtual: 0.460 -KVM: 0.440 -assembly: 0.437 -debug: 0.427 -i386: 0.359 - -Mac OS X cannot passthrough USB device to guest - -I'm using Mac OS 10.9.4 with qemu-system-arm installed from brew (version 1.7.1) and verified with qemu-system-x86_64. I'm trying to pass a Ralink 5370 WiFi USB dongle to my guest system, it appears in my system profiler as: - -802.11 n WLAN: - - Product ID: 0x5370 - Vendor ID: 0x148f - Version: 1.01 - Serial Number: 1.0 - Speed: Up to 480 Mb/sec - Manufacturer: Ralink - Location ID: 0x1d110000 / 6 - Current Available (mA): 500 - Current Required (mA): 450 - -Using the docs, I'm passing "-usb -device usb-host,vendorid=0x148f,productid=0x5370" and getting this error back: -"qemu-system-arm: -device usb-host,vendorid=0x148f,productid=0x5370: Parameter 'driver' expects device type" - -On 14 September 2014 15:23, Aaron