similar to: How to debug a crash.. Looks like an abrt file.

Displaying 20 results from an estimated 7000 matches similar to: "How to debug a crash.. Looks like an abrt file."

2005 Jul 24
1
Help with Asterisk@home and Broadvoice incoming calls..
Hello everyone, Well here is my initial posting to the list, and I will admit Asterisk is new to me. I just got everything running here a couple days ago, so still learning the ropes for sure. OK, here is my problem. Currently I have it setup talking to a couple Cisco IP phones, and some Xten softphones, this works great. I also got an account with FreeWorld Dialup using IAX2 and that
2005 Jul 26
2
Stumped on vMail problem, any ideas?
Hello all, I think I have most of my AAH 1.3 setup running (Asterisk 1.0.9), but somehow something is not quite right with my vMail setup. I would have sworn this was all working, but maybe I was just dreaming. Anyway here is what is happening, say I am on extension 200 and I want to call to extension 201. If extension 201 is no connected, then it rolls right into vMail with the message the
2013 Feb 01
0
CESA-2013:0215 Important CentOS 6 abrt Update
CentOS Errata and Security Advisory 2013:0215 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0215.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 99851e81e7cac7d406e9931753af92833ecc58fdcf5e328e715334382e169337 abrt-2.0.8-6.el6.centos.2.i686.rpm
2013 Sep 26
0
CEBA-2013:1289 CentOS 6 abrt Update
CentOS Errata and Bugfix Advisory 2013:1289 Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1289.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: b201d09a7b2122d998fcf5aeeac00c57adc238968c89fe705e5f6b65efc5c86d abrt-2.0.8-16.el6.centos.1.i686.rpm
2014 Nov 17
0
ABRT for CentOS Linux is now live
ABRT is a collection of scripts that makes it easier to report bugs and crashes in various components of the distribution to a central server. Metadata from this allows developers and upstream projects to evaluate their priority chain, and also get crucial information on why their software might not be performing as expected on CentOS Linux. This information is sent to the server in a json format
2015 Jun 15
0
CESA-2015:1083 Important CentOS 7 abrt Security Update
CentOS Errata and Security Advisory 2015:1083 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1083.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 4b27d42a4ed792b8cc8729cc65e6d70a82225000bbad1aa0f002a05582679de2 abrt-2.1.11-22.el7.centos.0.1.x86_64.rpm
2012 Jul 10
0
CESA-2012:0841 Low CentOS 6 abrt Update
CentOS Errata and Security Advisory 2012:0841 Low Upstream details at : https://rhn.redhat.com/errata/RHSA-2012-0841.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: a761ddbf659067983214235c2729f1247efa178eeb6f9ca87d2dc463afea3c71 abrt-2.0.8-6.el6.centos.i686.rpm
2015 Aug 20
1
Fwd: ABRT Daemon/sosreport disaster
On Sunday, I did a "yum update" which installed kernel 2.6.32-573.3.1.el6.i686 on half a dozen virtual machines running CentOS 6.7. Since then, two of them have gone into "meltdown", and started spewing "ABRT Daemon" emails: one on Tuesday, and one tonight. The machines have a very light workload -- one runs "trac", and a handful of development systems,
2017 Jan 30
0
Strange ABRT error when I try to switch to su
Hello all One of my VMs, running RHEL 7, has been giving me the following ABRT error when I try to login as su Ive seen this error the past three times that Ive logged in. I know that the VM is using Red Hat,but seeing that RHEL/CentOS are pretty much the same thing, I figured I should ask the CentOS mailing list for help. Here is the error: $ su Password: ABRT has detected 1 problem(s). For
2017 Apr 07
0
abrt reported "imap killed by SIGBUS"
Please keep responses on list. Can you please run valgrind on this, as it appears to be some sort of memory corruption issue. Aki > On April 7, 2017 at 5:37 AM Hongying Liu <hongyliu at redhat.com> wrote: > > > Thanks for your response. > > (gdb) p cache > $1 = (struct mail_cache *) 0x7fc4a811a320 > (gdb) p cache->hdr > $2 = (const struct mail_cache_header
2017 Apr 10
0
abrt reported "imap killed by SIGBUS"
Sorry for late response. This issue occurs ran randomly. So I don't know how to run valgrind command. 2017-04-10 17:14 GMT+08:00 Hongying Liu <hongyliu at redhat.com>: > Sorry for late response. > > This issue occurs ran randomly. So I don't know how to run valgrind > command. > > I upload the coredump. > > The version of dovecot is
2012 Jul 25
2
[PATCH 1/2] sysprep: remove the auto generated abrt data
remove the automatically generated abrt data. Signed-off-by: Wanlong Gao <gaowanlong at cn.fujitsu.com> --- po/POTFILES-ml | 1 + sysprep/Makefile.am | 2 ++ sysprep/sysprep_operation_abrt_data.ml | 47 ++++++++++++++++++++++++++++++++++ 3 files changed, 50 insertions(+) create mode 100644 sysprep/sysprep_operation_abrt_data.ml diff --git
2018 Dec 20
0
abrt-watch-log -F BUG: WARNING:
Hi, Please what is this error ? /usr/bin/abrt-watch-log -F BUG: WARNING: at WARNING: CPU: INFO: possible recursive locking detected ernel BUG at list_del corruption list_add corruption do_IRQ: stack overflow: ear stack overflow (cur: eneral protection fault nable to handle kernel ouble fault: RTNL: assertion failed eek! page_mapcount(page) went negative! adness at NETDEV WATCHDOG ysctl table
2019 Feb 08
0
C7, enable an abrt for a daemon
I've mentioned here before that gssproxy is crashing all over the place with a SEGV. However, there's no /var/spool/abrt/... when it does. How do I enable the daemon to give me an abrt with information? I'm just not sure of what the right word is for systemd, so online searching isn't always useful. Thanks in advance. mark
2012 Jan 13
1
what to do about [abrt] full crash report kernel taint?
I have a machine with a recent install of centos (2.6.32-220.2.1.el6.x86_64 kernel). It crashed 3 times this week, and sent emails like the one below complaining about kernel taint. I've gone back to a previous kernel to see if that helps, but otherwise I don't know how to investigate this. What should I do? Here's stuff from the log and one of the emails:
2015 Aug 24
1
abrt-watch-log -F BUG: WARNING: at WARNING: CPU: INFO: possible recursive locking detected
Hi All, I've been tuning a server recently and just today this has started to appear in my top/htop output. [root at db1 ~]# ps -aux | grep kernel root 1011 0.0 0.0 212048 4532 ? Ss 13:34 0:00 /usr/bin/abrt-watch-log -F BUG: WARNING: at WARNING: CPU: INFO: possible recursive locking detected ernel BUG at list_del corruption list_add corruption do_IRQ: stack overflow: ear stack overflow
2017 Jan 21
0
Abrt Error abrt-cli list --since 1484935231
Hi, hopping everyone is fine. I am using a Centos 7 server based on Nginx. I am using the server for providing downloadable data. Around 8 TB per day is downloaded. The server was working fine and perfectly. I hired a freelancer to limit the download speed as i am unexperienced with linux (Worst Mistake Ever) he messed up the server and after 4 hours said he cant impletement a simple
2012 Mar 19
1
ABRT interpretation / guidance needed
Greetings - I have a Centos 6 box fully updated that intermittently sends me an "[abrt] full crash report" email. I am not familiar with these at all and in my limited google search have not found good information to interpret this information. The most recent (and the most frequent one) is listed below, also I have listed the lines from /var/log/messages that correspond to
2020 Sep 18
1
[libnbd PATCH] nbdsh: Hide nbd.Error from abrt-python3-handler
When using nbdsh for scripting, it is convenient to let nbdsh fail with status 1 when encountering an API failure. However, doing so by letting the nbd.Error exception leak all the way causes ABRT (on Fedora 32 at least) to assume the program crashed from a programming error, and needlessly complicates clients to have to add try: blocks. Better is if nbdsh itself prints the same stack trace that
2012 Sep 18
1
abrt-dump-oops
There is a program that starts up abrt-dump-oops. What controls that starting up? It does not seem to be a "service" Thanks, Jerry