Several problems related to debuginfo were found in the kdelibs3-3.5.10-23.el6 package. These issues might affect crash analysis done by Automatic Bug Reporting Tool and its retrace server, and also prevent proper debugging of crashes via GDB.
Source file missing in debuginfo package
Multiple source files that were used by the compiler to generate a binary are missing from the debuginfo package. This is usually caused by the build script creating temporary source files during the build and deleting them after usage, or by moving source files between directories. Missing source files in debuginfo packages make debugging of crashes more difficult.
debuginfo package: kdelibs3-debuginfo-3.5.10-23.el6.i686
debuginfo file: /usr/lib/debug/usr/lib/libkhtml.so.4.2.0.debug
missing source: /usr/src/debug/kdelibs-3.5.10/khtml/css/tok
debuginfo file: /usr/lib/debug/usr/lib/libkio.so.4.2.0.debug
missing source: /usr/src/debug/kdelibs-3.5.10/kio/kio/yacc.tab.h
missing source: /usr/src/debug/kdelibs-3.5.10/kio/kio/yacc.tab.c
debuginfo file: /usr/lib/debug/usr/lib/libkjs.so.1.2.0.debug
missing source: /usr/src/debug/kdelibs-3.5.10/kjs/grammar.tab.c
Please consider changing the package build script (if that is the cause of this issue) to keep the source files on their compilation place, so rpmbuild can find them when generating debuginfo package.
No .debug_info section in a debug file
When a binary is compiled without gcc's -g option, no debugging information is generated and rpmbuild creates almost-empty debuginfo file, which cannot be used for debugging. Please fix the package build process to use $RPM_OPT_FLAGS, which include the -g option among others.
- path: /usr/lib/debug/usr/lib/libkjava.so.1.0.0.debug
- path: /usr/lib/debug/usr/lib/libkspell.so.4.2.0.debug
This issue can be investigated and tested by using eu-readelf tool from the elfutils package. Use `eu-readelf --section-headers /usr/lib/debug/usr/bin/<debuginfofile>.debug` to see if debuginfo file contains .debug_info section. It is supposed to be there.
(This bug was detected and filed by a script.)
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unfortunately unable to
address this request at this time. Red Hat invites you to
ask your support representative to propose this request, if
appropriate and relevant, in the next release of Red Hat
Enterprise Linux. If you would like it considered as an
exception in the current release, please ask your support
Red Hat Enterprise Linux 6 is in the Production 3 Phase. During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available.
The official life cycle policy can be reviewed here:
This issue does not meet the inclusion criteria for the Production 3 Phase and will be marked as CLOSED/WONTFIX. If this remains a critical requirement, please contact Red Hat Customer Support to request a re-evaluation of the issue, citing a clear business justification. Note that a strong business justification will be required for re-evaluation. Red Hat Customer Support can be contacted via the Red Hat Customer Portal at the following URL: