Displaying 20 results from an estimated 100 matches similar to: "CEBA-2013:1289 CentOS 6 abrt Update"
2013 Sep 27
0
CentOS-announce Digest, Vol 103, Issue 16
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2017 Jan 21
0
Abrt Error abrt-cli list --since 1484935231
Hi, hopping everyone is fine. I am using a Centos 7 server based on Nginx.
I am using the server for providing downloadable data. Around 8 TB per day
is downloaded. The server was working fine and perfectly.
I hired a freelancer to limit the download speed as i am unexperienced with
linux (Worst Mistake Ever)
he messed up the server and after 4 hours said he cant impletement a simple
2013 Feb 01
0
CESA-2013:0215 Important CentOS 6 abrt Update
CentOS Errata and Security Advisory 2013:0215 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0215.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
99851e81e7cac7d406e9931753af92833ecc58fdcf5e328e715334382e169337 abrt-2.0.8-6.el6.centos.2.i686.rpm
2011 Dec 04
0
Abrt: kernel crash on boot -- but the system runs fine
using a fully up to date 6.0 (and the CR repo) on my eeepc 901, every
time the system boots and log in,, almost immediately (sometimes a few
seconds later) get a popup from abrt complaining of a crash in the kernel
package. yet the system continues to run fine, as far as I can tell.
Package: kernel
Latest Crash: Sun 04 Dec 2011 04:08:15 PM
Command: not_applicable
Reason:
2012 Sep 18
1
abrt-dump-oops
There is a program that starts up abrt-dump-oops.
What controls that starting up?
It does not seem to be a "service"
Thanks,
Jerry
2013 Nov 02
0
How to debug a crash.. Looks like an abrt file.
I have to say the CentOS machines I have used so far seem to work well, so
I was surprised the other day when an HP DL580G5 I had running CentOS 6.4
x86_64 the other day for some VM's under KVM/QEMU went belly up. Sadly the
sucker was a remote box, so I wasn't just sitting in front of the console,
but it looks like it left some files in
/var/spool/abrt/oops-2013-11-01-14:00:22-8047-1 on
2015 Oct 15
1
abrt-auto-reporting
Hello,
centos 7(1)
I have a question about abrt-auto-reporting?
should this work normal ?
I have on my System Problems to report the Errors.
Thanks for a answer,
--
mit freundlichen Gr?ssen / best regards,
G?nther J. Niederwimmer
2017 Jan 30
0
Strange ABRT error when I try to switch to su
Hello all
One of my VMs, running RHEL 7, has been giving me the following ABRT error
when I try to login as su Ive seen this error the past three times that
Ive logged in. I know that the VM is using Red Hat,but seeing that
RHEL/CentOS are pretty much the same thing, I figured I should ask the
CentOS mailing list for help. Here is the error:
$ su
Password:
ABRT has detected 1 problem(s). For
2018 Dec 20
0
abrt-watch-log -F BUG: WARNING:
Hi,
Please what is this error ?
/usr/bin/abrt-watch-log -F BUG: WARNING: at WARNING: CPU: INFO: possible
recursive locking detected ernel BUG at list_del corruption list_add
corruption do_IRQ: stack overflow: ear stack overflow (cur: eneral
protection fault nable to handle kernel ouble fault: RTNL: assertion failed
eek! page_mapcount(page) went negative! adness at NETDEV WATCHDOG ysctl
table
2019 Feb 08
0
C7, enable an abrt for a daemon
I've mentioned here before that gssproxy is crashing all over the place
with a SEGV. However, there's no /var/spool/abrt/... when it does. How do
I enable the daemon to give me an abrt with information? I'm just not sure
of what the right word is for systemd, so online searching isn't always
useful.
Thanks in advance.
mark
2014 Nov 17
0
ABRT for CentOS Linux is now live
ABRT is a collection of scripts that makes it easier to report bugs and
crashes in various components of the distribution to a central server.
Metadata from this allows developers and upstream projects to evaluate
their priority chain, and also get crucial information on why their
software might not be performing as expected on CentOS Linux.
This information is sent to the server in a json format
2015 Aug 20
1
Fwd: ABRT Daemon/sosreport disaster
On Sunday, I did a "yum update" which installed kernel
2.6.32-573.3.1.el6.i686 on half a dozen virtual machines running
CentOS 6.7.
Since then, two of them have gone into "meltdown", and started spewing
"ABRT Daemon" emails: one on Tuesday, and one tonight.
The machines have a very light workload -- one runs "trac", and a handful
of development systems,
2015 Aug 24
1
abrt-watch-log -F BUG: WARNING: at WARNING: CPU: INFO: possible recursive locking detected
Hi All,
I've been tuning a server recently and just today this has started to
appear in my top/htop output.
[root at db1 ~]# ps -aux | grep kernel
root 1011 0.0 0.0 212048 4532 ? Ss 13:34 0:00 /usr/bin/abrt-watch-log -F
BUG: WARNING: at WARNING: CPU: INFO: possible recursive locking detected
ernel BUG at list_del corruption list_add corruption do_IRQ: stack
overflow: ear stack overflow
2012 Jul 10
0
CESA-2012:0841 Low CentOS 6 abrt Update
CentOS Errata and Security Advisory 2012:0841 Low
Upstream details at : https://rhn.redhat.com/errata/RHSA-2012-0841.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
a761ddbf659067983214235c2729f1247efa178eeb6f9ca87d2dc463afea3c71 abrt-2.0.8-6.el6.centos.i686.rpm
2015 Jun 15
0
CESA-2015:1083 Important CentOS 7 abrt Security Update
CentOS Errata and Security Advisory 2015:1083 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1083.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
4b27d42a4ed792b8cc8729cc65e6d70a82225000bbad1aa0f002a05582679de2 abrt-2.1.11-22.el7.centos.0.1.x86_64.rpm
2017 Apr 07
0
abrt reported "imap killed by SIGBUS"
Please keep responses on list.
Can you please run valgrind on this, as it appears to be some sort of memory corruption issue.
Aki
> On April 7, 2017 at 5:37 AM Hongying Liu <hongyliu at redhat.com> wrote:
>
>
> Thanks for your response.
>
> (gdb) p cache
> $1 = (struct mail_cache *) 0x7fc4a811a320
> (gdb) p cache->hdr
> $2 = (const struct mail_cache_header
2017 Apr 10
0
abrt reported "imap killed by SIGBUS"
Sorry for late response.
This issue occurs ran randomly. So I don't know how to run valgrind command.
2017-04-10 17:14 GMT+08:00 Hongying Liu <hongyliu at redhat.com>:
> Sorry for late response.
>
> This issue occurs ran randomly. So I don't know how to run valgrind
> command.
>
> I upload the coredump.
>
> The version of dovecot is
2012 Jul 25
2
[PATCH 1/2] sysprep: remove the auto generated abrt data
remove the automatically generated abrt data.
Signed-off-by: Wanlong Gao <gaowanlong at cn.fujitsu.com>
---
po/POTFILES-ml | 1 +
sysprep/Makefile.am | 2 ++
sysprep/sysprep_operation_abrt_data.ml | 47 ++++++++++++++++++++++++++++++++++
3 files changed, 50 insertions(+)
create mode 100644 sysprep/sysprep_operation_abrt_data.ml
diff --git
2020 Sep 18
1
[libnbd PATCH] nbdsh: Hide nbd.Error from abrt-python3-handler
When using nbdsh for scripting, it is convenient to let nbdsh fail
with status 1 when encountering an API failure. However, doing so by
letting the nbd.Error exception leak all the way causes ABRT (on
Fedora 32 at least) to assume the program crashed from a programming
error, and needlessly complicates clients to have to add try: blocks.
Better is if nbdsh itself prints the same stack trace that
2013 Feb 23
0
Centos 6.3 and dovecot with an abrt problem
Everyone,
I have a mail server running CentOS release 6.3 (Final) with
2.6.32-279.22.1.el6.i686 kernel that is reporting errors to me
pertaining dovecot. I have appended the error message to this note.
There is only one user that appears to generate this message, and it is
generated to me by way of e-mail without a perceptible problem to the
user which is not me.
This particular user had an