Debian Bug report logs -
#446868
qemu: qemu-i386 does not start on x86_64 or i686
Reported by: Ronan Keryell <Ronan.Keryell@enstb.org>
Date: Tue, 16 Oct 2007 09:33:01 UTC
Severity: important
Found in version qemu/0.9.0+20070816-1
Fixed in version qemu/0.9.1-1
Done: Aurelien Jarno <aurel32@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Ronan Keryell <Ronan.Keryell@enstb.org>, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#446868; Package qemu.
(full text, mbox, link).
Acknowledgement sent to Ronan Keryell <Ronan.Keryell@enstb.org>:
New Bug report received and forwarded. Copy sent to Ronan Keryell <Ronan.Keryell@enstb.org>, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: qemu
Version: 0.9.0+20070816-1
Severity: important
qemu-i386
Segmentation fault
strace -f qemu-i386
execve("/usr/bin/qemu-i386", ["qemu-i386"], [/* 38 vars */]) = 0
brk(0) = 0x629f4000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2ac37cb6c000
uname({sys="Linux", node="an-dro", ...}) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2ac37cb6d000
access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=107049, ...}) = 0
mmap(NULL, 107049, PROT_READ, MAP_PRIVATE, 3, 0) = 0x2ac37cb6f000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/libm.so.6", O_RDONLY) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320>\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=526568, ...}) = 0
mmap(NULL, 2621672, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x2ac37cd6d000
mprotect(0x2ac37cded000, 2093056, PROT_NONE) = 0
mmap(0x2ac37cfec000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7f000) = 0x2ac37cfec000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/librt.so.1", O_RDONLY) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\"\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=35784, ...}) = 0
mmap(NULL, 2132968, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x2ac37cfee000
mprotect(0x2ac37cff6000, 2093056, PROT_NONE) = 0
mmap(0x2ac37d1f5000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7000) = 0x2ac37d1f5000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/usr/lib/libasound.so.2", O_RDONLY) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\2200\3\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=913336, ...}) = 0
mmap(NULL, 3008968, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x2ac37d1f7000
mprotect(0x2ac37d2cf000, 2093056, PROT_NONE) = 0
mmap(0x2ac37d4ce000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xd7000) = 0x2ac37d4ce000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/libc.so.6", O_RDONLY) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`\334\1\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1391960, ...}) = 0
mmap(NULL, 3498392, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x2ac37d4d6000
mprotect(0x2ac37d624000, 2093056, PROT_NONE) = 0
mmap(0x2ac37d823000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14d000) = 0x2ac37d823000
mmap(0x2ac37d828000, 16792, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x2ac37d828000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/libpthread.so.0", O_RDONLY) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`W\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=126008, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2ac37d82d000
mmap(NULL, 2204528, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x2ac37d82e000
mprotect(0x2ac37d843000, 2097152, PROT_NONE) = 0
mmap(0x2ac37da43000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x2ac37da43000
mmap(0x2ac37da45000, 13168, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x2ac37da45000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/libdl.so.2", O_RDONLY) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0 \16\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=14624, ...}) = 0
mmap(NULL, 2109728, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x2ac37da49000
mprotect(0x2ac37da4b000, 2097152, PROT_NONE) = 0
mmap(0x2ac37dc4b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x2ac37dc4b000
close(3) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2ac37dc4d000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2ac37dc4e000
arch_prctl(ARCH_SET_FS, 0x2ac37dc4df10) = 0
mprotect(0x2ac37d823000, 12288, PROT_READ) = 0
munmap(0x2ac37cb6f000, 107049) = 0
set_tid_address(0x2ac37dc4dfa0) = 31616
set_robust_list(0x2ac37dc4dfb0, 0x18) = 0
rt_sigaction(SIGRTMIN, {0x2ac37d8332e0, [], SA_RESTORER|SA_SIGINFO, 0x2ac37d83c100}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {0x2ac37d833360, [], SA_RESTORER|SA_RESTART|SA_SIGINFO, 0x2ac37d83c100}, NULL, 8) = 0
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
getrlimit(RLIMIT_STACK, {rlim_cur=8192*1024, rlim_max=RLIM_INFINITY}) = 0
--- SIGSEGV (Segmentation fault) @ 0 (0) ---
+++ killed by SIGSEGV +++
Process 31616 detached
From the gdb point of view:
Program received signal SIGSEGV, Segmentation fault.
0x0000000000000000 in ?? ()
(gdb) bt
#0 0x0000000000000000 in ?? ()
#1 0x000000006004ae2d in __libc_csu_init ()
#2 0x00002b0b47877ade in __libc_start_main () from /lib/libc.so.6
#3 0x0000000060004e39 in _start ()
Indeed, I've just verified and I have the same behaviour on 32-bit x86
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.22-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR@euro, LC_CTYPE=fr_FR@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
Versions of packages qemu depends on:
ii bochsbios 2.3+20070705-2 BIOS for the Bochs emulator
ii libasound2 1.0.14a-2 ALSA library
ii libc6 2.6.1-5 GNU C Library: Shared libraries
ii libncurses5 5.6+20071006-3 Shared libraries for terminal hand
ii libsdl1.2debian 1.2.12-1 Simple DirectMedia Layer
ii openbios-sparc 1.0~alpha2+20070816-1 SPARC Open Firmware
ii openhackware 0.4.1-2 OpenFirmware emulator for PowerPC
ii proll 18-2 JavaStation PROM 2.x compatible re
ii vgabios 0.6a-3 VGA BIOS software for the Bochs an
ii zlib1g 1:1.2.3.3.dfsg-6 compression library - runtime
Versions of packages qemu recommends:
ii debootstrap 1.0.3 Bootstrap a basic Debian system
ii sharutils 1:4.6.3-1 shar, unshar, uuencode, uudecode
ii vde2 2.1.6+r154-1+b1 Virtual Distributed Ethernet
-- no debconf information
Tags added: pending
Request was from Aurelien Jarno <aurel32@debian.org>
to control@bugs.debian.org.
(Mon, 07 Jan 2008 02:42:01 GMT) (full text, mbox, link).
Reply sent to Aurelien Jarno <aurel32@debian.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Ronan Keryell <Ronan.Keryell@enstb.org>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #12 received at 446868-close@bugs.debian.org (full text, mbox, reply):
Source: qemu
Source-Version: 0.9.1-1
We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive:
qemu_0.9.1-1.diff.gz
to pool/main/q/qemu/qemu_0.9.1-1.diff.gz
qemu_0.9.1-1.dsc
to pool/main/q/qemu/qemu_0.9.1-1.dsc
qemu_0.9.1-1_amd64.deb
to pool/main/q/qemu/qemu_0.9.1-1_amd64.deb
qemu_0.9.1.orig.tar.gz
to pool/main/q/qemu/qemu_0.9.1.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 446868@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Aurelien Jarno <aurel32@debian.org> (supplier of updated qemu package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 28 Jan 2008 21:24:14 +0100
Source: qemu
Binary: qemu
Architecture: source amd64
Version: 0.9.1-1
Distribution: unstable
Urgency: low
Maintainer: Aurelien Jarno <aurel32@debian.org>
Changed-By: Aurelien Jarno <aurel32@debian.org>
Description:
qemu - fast processor emulator
Closes: 322325 402289 413315 425634 426181 437866 441119 442822 443801 446868 459801
Changes:
qemu (0.9.1-1) unstable; urgency=low
.
[ Aurelien Jarno ]
* New upstream version. (Closes: #459801)
- Supports s390 host. (Closes: #441119)
- Fix PCI bar allocation. (Closes: #413315)
- Fix typo in keys name. (Closes: #426181)
- Fix segfault of qemu-i386 (Closes: #446868).
- debian/control: bump depends on openbios-sparc to
>= 1.0~alpha2+20080106.
- debian/patches/02_snapshot_use_tmpdir.patch: Refreshed.
- debian/patches/04_do_not_print_rtc_freq_if_ok.patch: Likewise.
- debian/patches/05_non-fatal_if_linux_hd_missing.patch: Likewise.
- debian/patches/06_exit_segfault.patch: Likewise.
- debian/patches/10_signal_jobs.patch: Likewise.
- debian/patches/11_signal_sigaction.patch: Likewise.
- debian/patches/12_signal_powerpc_support.patch: Likewise.
- debian/patches/21_net_soopts.patch: Likewise.
- debian/patches/30_syscall_ipc.patch: Likewise.
- debian/patches/31_syscalls.patch: Likewise.
- debian/patches/32_syscall_sysctl.patch: Likewise.
- debian/patches/33_syscall_ppc_clone.patch: Likewise.
- debian/patches/35_syscall_sockaddr.patch: Likewise.
- debian/patches/41_arm_fpa_sigfpe.patch: Likewise.
- debian/patches/42_arm_tls.patch: Likewise.
- debian/patches/50_linuxbios_isa_bios_ram.patch: Likewise
- debian/patches/51_linuxbios_piix_ram_size.patch: Likewise
- debian/patches/61_safe_64bit_int.patch: Removed, merged upstream.
- debian/patches/63_sparc_build.patch: Refreshed.
- debian/patches/80_ui_curses.patch: Likewise.
* debian/patches/90_security.patch: fix 64-bit overflow. (Closes:
#425634)
* debian/qemu-make-debian-root: add a -s option to create sparse
image. (Closes: #322325)
* debian/control: bump depends on bochsbios to >= 2.3.5-1. Use
BIOS-qemu-latest instead of BIOS-bochs-latest. (Closes: #402289,
#442822)
* debian/rules: build the non-dyngen part with default gcc.
* debian/rules: support DEB_BUILD_OPTIONS="parallel=n".
* debian/patches/70_manpage.patch: describe the arguments of the
-usbdevice option in the manpage. (Closes: #443801)
* debian/control: now using Standards-Version 3.7.3 (no changes needed).
* debian/control: build-depends on libgnutls-dev to enable TLS support
in VNC.
* debian/patches/01_nostrip.patch: don't strip binaries during make
install. (Closes: #437866)
* debian/patches/53_openbios_size.patch: increase maximum prom size to
support latest openbios.
Files:
bc4d10de36f58fd3a20b5df3f383e7e0 1130 misc optional qemu_0.9.1-1.dsc
937c34632a59e12ba7b55054419bbe7d 2392515 misc optional qemu_0.9.1.orig.tar.gz
b4a6cdec6630ad0db22e7265a22d36ae 56901 misc optional qemu_0.9.1-1.diff.gz
d43e324d9ac6133d444e717d3de0e9f6 10946622 misc optional qemu_0.9.1-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHnjt0w3ao2vG823MRAgP8AJwKCRagHKIYwla88BhOqNRpxfD0RQCaA5iG
OYu/lKhhFW1kQ8+iNCKTjx0=
=tlc9
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sat, 08 Mar 2008 07:33:51 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Fri Nov 24 00:48:44 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.