Bug 1445872 - [abrt] gdb-headless: value_entirely_covered_by_range_vector(): gdb killed by signal 11
Summary: [abrt] gdb-headless: value_entirely_covered_by_range_vector(): gdb killed by ...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora
Classification: Fedora
Component: gdb
Version: 26
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kevin Buettner
QA Contact: Fedora Extras Quality Assurance
URL: https://retrace.fedoraproject.org/faf...
Whiteboard: abrt_hash:916d2d2f1d8422f74ed041aaa3f...
: 1446812 1517399 1528553 1528669 1529537 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-04-26 16:57 UTC by Gwendal
Modified: 2021-10-13 20:58 UTC (History)
12 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-10-13 20:58:07 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: backtrace (96.02 KB, text/plain)
2017-04-26 16:57 UTC, Gwendal
no flags Details
File: cgroup (289 bytes, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: core_backtrace (20.64 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: cpuinfo (1.34 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: dso_list (18.22 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: environ (2.50 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: exploitable (112 bytes, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: limits (1.29 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: maps (75.26 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: open_fds (11.70 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: proc_pid_status (1.28 KB, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
File: var_log_messages (316 bytes, text/plain)
2017-04-26 16:58 UTC, Gwendal
no flags Details
Result of "rpm -qa" on my system (124.34 KB, text/plain)
2017-05-10 14:05 UTC, Gwendal
no flags Details

Description Gwendal 2017-04-26 16:57:49 UTC
Description of problem:
I think this happened when abrt tried to generated a trace for another bug that I have :)

Version-Release number of selected component:
gdb-headless-7.12.50.20170226-4.fc26

Additional info:
reporter:       libreport-2.9.1
backtrace_rating: 4
cmdline:        /usr/libexec/gdb -batch -iex add-auto-load-safe-path /var/cache/abrt-di/usr/lib/debug -iex add-auto-load-scripts-directory /var/cache/abrt-di/usr/lib/debug -ex set debug-file-directory /usr/lib/debug:/var/cache/abrt-di/usr/lib/debug -ex file /usr/bin/python3.6 -ex core-file ./coredump -ex thread apply all -ascending backtrace 1024 full -ex info sharedlib -ex print (char*)__abort_msg -ex print (char*)__glib_assert_msg -ex info all-registers -ex disassemble
crash_function: value_entirely_covered_by_range_vector
executable:     /usr/libexec/gdb
journald_cursor: s=4f8d7f101de94929a4320b33f9a4bded;i=3d3a2;b=c21faf8f225246279ea1980ffcd9bfd2;m=8f77b0f2f;t=54e14b3529448;x=1ff552ef3de23fe
kernel:         4.11.0-0.rc7.git0.1.fc26.x86_64
rootdir:        /
runlevel:       N 5
type:           CCpp
uid:            1000

Truncated backtrace:
Thread no. 1 (10 frames)
 #0 value_entirely_covered_by_range_vector at ../../gdb/value.c:401
 #1 value_entirely_optimized_out at ../../gdb/value.c:426
 #2 cp_print_static_field at ../../gdb/cp-valprint.c:642
 #3 cp_print_value_fields at ../../gdb/cp-valprint.c:333
 #4 cp_print_value_fields_rtti at ../../gdb/cp-valprint.c:454
 #5 c_val_print_struct at ../../gdb/c-valprint.c:408
 #6 c_val_print at ../../gdb/c-valprint.c:529
 #7 val_print at ../../gdb/valprint.c:1118
 #8 cp_print_value_fields at ../../gdb/cp-valprint.c:357
 #9 cp_print_value_fields_rtti at ../../gdb/cp-valprint.c:454

Comment 1 Gwendal 2017-04-26 16:57:58 UTC
Created attachment 1274318 [details]
File: backtrace

Comment 2 Gwendal 2017-04-26 16:58:00 UTC
Created attachment 1274319 [details]
File: cgroup

Comment 3 Gwendal 2017-04-26 16:58:11 UTC
Created attachment 1274320 [details]
File: core_backtrace

Comment 4 Gwendal 2017-04-26 16:58:13 UTC
Created attachment 1274321 [details]
File: cpuinfo

Comment 5 Gwendal 2017-04-26 16:58:15 UTC
Created attachment 1274322 [details]
File: dso_list

Comment 6 Gwendal 2017-04-26 16:58:17 UTC
Created attachment 1274323 [details]
File: environ

Comment 7 Gwendal 2017-04-26 16:58:18 UTC
Created attachment 1274324 [details]
File: exploitable

Comment 8 Gwendal 2017-04-26 16:58:20 UTC
Created attachment 1274325 [details]
File: limits

Comment 9 Gwendal 2017-04-26 16:58:23 UTC
Created attachment 1274326 [details]
File: maps

Comment 10 Gwendal 2017-04-26 16:58:25 UTC
Created attachment 1274327 [details]
File: open_fds

Comment 11 Gwendal 2017-04-26 16:58:27 UTC
Created attachment 1274328 [details]
File: proc_pid_status

Comment 12 Gwendal 2017-04-26 16:58:29 UTC
Created attachment 1274329 [details]
File: var_log_messages

Comment 13 Claudio Rimmele 2017-04-29 02:57:13 UTC
*** Bug 1446812 has been marked as a duplicate of this bug. ***

Comment 14 Gwendal 2017-05-10 09:27:09 UTC
Similar problem has been detected:

This happened during some "analyze_CCpp" that ABRT was performing for another bug I encountered with another package (git-cola, and the bug is titled "python 3.6 killed with signal 11").

To reproduce, I can simply try again to send a bug report for the aforementionned bug, and this will happend again.

reporter:       libreport-2.9.1
backtrace_rating: 4
cmdline:        /usr/libexec/gdb -batch -iex add-auto-load-safe-path /var/cache/abrt-di/usr/lib/debug -iex add-auto-load-scripts-directory /var/cache/abrt-di/usr/lib/debug -ex set debug-file-directory /usr/lib/debug:/var/cache/abrt-di/usr/lib/debug -ex file /usr/bin/python3.6 -ex core-file ./coredump -ex thread apply all -ascending backtrace 1024 full -ex info sharedlib -ex print (char*)__abort_msg -ex print (char*)__glib_assert_msg -ex info all-registers -ex disassemble
crash_function: value_entirely_covered_by_range_vector
executable:     /usr/libexec/gdb
journald_cursor: s=2452df2be3cf449b95dca72eecea6d51;i=112fb;b=47a368b6a782414c9f8d446c0184a575;m=27552bf8a;t=54f2801418b96;x=33a9c440d1c0df86
kernel:         4.11.0-1.fc26.x86_64
package:        gdb-headless-7.12.50.20170226-4.fc26
reason:         gdb killed by signal 11
rootdir:        /
runlevel:       N 5
type:           CCpp
uid:            1000

Comment 15 Jan Kratochvil 2017-05-10 09:29:53 UTC
(In reply to Gwendal from comment #14)
> To reproduce, I can simply try again to send a bug report for the
> aforementionned bug, and this will happend again.

Could you send the core file on which GDB crashes from /var/spool/abrt/ ?
I do not see from the bugreport which one it was.
Also I do not want core of the GDB crashed on that original core.
I want the original core.  Thanks.

Comment 17 Jan Kratochvil 2017-05-10 11:02:16 UTC
Could you please?
  rpm -qf /usr/bin/python3
or even:
  rpm -qa

Comment 18 Gwendal 2017-05-10 14:05:24 UTC
Created attachment 1277623 [details]
Result of "rpm -qa" on my system

Comment 19 Gwendal 2017-05-10 14:06:22 UTC
Just out of curiosity: why is comment 16 tagged as "RED HAT CONFIDENTIAL"? That's the first time I'm seeing that.

Comment 20 Jan Kratochvil 2017-05-10 14:12:32 UTC
(In reply to Gwendal from comment #19)
> Just out of curiosity: why is comment 16 tagged as "RED HAT CONFIDENTIAL"?
> That's the first time I'm seeing that.

I was not sure whether you are aware of all the possible information disclosure from your system from the core file.  So I at least made that core-file non-public.  If you are really sure there cannot be any secure information of your system in that core file I can make the comment public again (or you could post the URL again).

Comment 21 Gwendal 2017-05-10 15:41:21 UTC
(In reply to Jan Kratochvil from comment #20)
> (In reply to Gwendal from comment #19)
> > Just out of curiosity: why is comment 16 tagged as "RED HAT CONFIDENTIAL"?
> > That's the first time I'm seeing that.
> 
> I was not sure whether you are aware of all the possible information
> disclosure from your system from the core file.  So I at least made that
> core-file non-public.  If you are really sure there cannot be any secure
> information of your system in that core file I can make the comment public
> again (or you could post the URL again).

Indeed I am not really aware of what such file would disclose... so thanks for doing that!

Comment 22 Loic Wendling 2017-11-24 21:14:39 UTC
*** Bug 1517399 has been marked as a duplicate of this bug. ***

Comment 23 Fedora End Of Life 2018-05-03 08:31:19 UTC
This message is a reminder that Fedora 26 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 26. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora  'version'
of '26'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version'
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not
able to fix it before Fedora 26 is end of life. If you would still like
to see this bug fixed and are able to reproduce it against a later version
of Fedora, you are encouraged  change the 'version' to a later Fedora
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's
lifetime, sometimes those efforts are overtaken by events. Often a
more recent Fedora release includes newer upstream software that fixes
bugs or makes them obsolete.

Comment 24 Fedora End Of Life 2018-05-29 11:53:05 UTC
Fedora 26 changed to end-of-life (EOL) status on 2018-05-29. Fedora 26
is no longer maintained, which means that it will not receive any
further security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.

Comment 25 Sergio Durigan Junior 2018-07-01 04:15:13 UTC
I'm reopening the bug.

Gwendal, I know it's been some time, but are you able to reproduce the bug again?

Jan, do you remember if you were able to make any progress here?

Thanks.

Comment 26 Sergio Durigan Junior 2018-07-01 04:15:43 UTC
*** Bug 1528553 has been marked as a duplicate of this bug. ***

Comment 27 Sergio Durigan Junior 2018-07-01 04:16:31 UTC
*** Bug 1529537 has been marked as a duplicate of this bug. ***

Comment 28 Sergio Durigan Junior 2018-07-01 04:16:53 UTC
*** Bug 1528669 has been marked as a duplicate of this bug. ***

Comment 29 Jan Kratochvil 2018-07-01 15:06:02 UTC
(In reply to Sergio Durigan Junior from comment #25)
> Jan, do you remember if you were able to make any progress here?

I do not remember anything regarding this Bug.

Comment 30 Gwendal 2018-07-05 08:11:49 UTC
Sorry, I have no idea how to reproduce it, I would need to have a bug filled in abrt that would make abrt crash when trying to process it... and I never encountered such a bug since then =[.

Comment 31 Ben Cotton 2018-11-26 15:52:40 UTC
This message is a reminder that Fedora 27 is nearing its end of life.
On 2018-Nov-30  Fedora will stop maintaining and issuing updates for
Fedora 27. It is Fedora's policy to close all bug reports from releases
that are no longer maintained. At that time this bug will be closed as
EOL if it remains open with a Fedora  'version' of '27'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 27 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 32 Guinevere Larsen 2021-10-13 20:58:07 UTC
Because this is a bug from an old Fedora Release and there are no reproducers, I am closing this bug with "insuficient_data". If this problem happens again, feel free to open another bug. If you do, something that would help a lot is also submitting the coredump that was being analyzed.


Note You need to log in before you can comment on or make changes to this bug.