03-18-2015
I guess what I had last should work. Try it and let us know.
9 More Discussions You Might Find Interesting
1. Programming
I am using gdb to examine a core file but the output contains only the method addresses in hex.
Is there anyway to translate these addresses to a human-readable form? :confused: (0 Replies)
Discussion started by: ciregbu
0 Replies
2. Programming
I am trying to print a stack trace programatically using backtrace and backtrace_symbols.
The problem is that the stack being printed in a mangled format. Is there a way to get the output in more of a human readable form?
I am using Red Hat and the program is written in c++. (2 Replies)
Discussion started by: dmirza
2 Replies
3. Shell Programming and Scripting
Hi all,
I was hoping someone can point me in the right direction. I'm trying to filter out errors from a web log- any lines with ERROR in it. I know I could simply use the grep command to do this. However, there are times when a stack trace follows the error line. I would like to capture these... (2 Replies)
Discussion started by: gswhoops
2 Replies
4. UNIX for Advanced & Expert Users
Hi all,
One of our programs written in Java, produced this logfile. This job runs 48 threads and only one thread failed with this error. The code is a blackbox(external product), so cant look at the source code. From what I can infer from the log, the job was trying to write the log messages into... (9 Replies)
Discussion started by: ranj@chn
9 Replies
5. Filesystems, Disks and Memory
I'm on solaris 8. I need to check the stack trace inside my C program. I don't have printstack or walkstack. I tested getcontext and it works. But how do I get the symbols from "stack_t" ? Help please. Many thanks! (4 Replies)
Discussion started by: rydahl
4 Replies
6. AIX
Hi All,
I am trying to debug my core file using kdb.
When I try to get the stack trace I am facing this error.
core mapped from @ 700000000000000 to @ 70000000306fc04
Preserving 1680415 bytes of symbol table
Dump does not start with valid magic number
WARNING: Possibly truncated or... (2 Replies)
Discussion started by: Sachin1987
2 Replies
7. Shell Programming and Scripting
Hi All
Thought it would be kind of fun to implement a stack trace for a shell script that calls functions within a sub shell. This is for bash under Linux and probably not portable -
#! /bin/bash
error_exit()
{
echo "======================="
echo $1
echo... (4 Replies)
Discussion started by: steadyonabix
4 Replies
8. Programming
I have a C program which is running as daemon and has some threads.
The program is running on dual core cpu and it may happen that different threads may run on different cpu core.
The problem is sometimes it crashes with some heap memory corruption probably between threads.
GDB command(t a a... (2 Replies)
Discussion started by: rupeshkp728
2 Replies
9. Linux
Hi everyone,
Our Red Hat server hung yesterday, and I managed to log into the console and see the following message:
RIP: 0010: mwait_idle_with_hints+0x66/
0x67
RSP: 0018:ffffffff80457f40 EFLAGS: 00000046
RAX: 0000000000000010 RBX: ffff810c20075910 RCX: 0000000000000001
RDX:... (6 Replies)
Discussion started by: badoshi
6 Replies
LEARN ABOUT CENTOS
abrt-auto-reporting
ABRT-AUTO-REPORTIN(1) ABRT Manual ABRT-AUTO-REPORTIN(1)
NAME
abrt-auto-reporting - Get or modify a value of the auto reporting option
SYNOPSIS
abrt-auto-reporting [-v] [ enabled | yes | 1 | disabled | no | 0 ]
DESCRIPTION
Reads the configuration from abrt.conf and saves the changes to the same file.
The changes will take effect immediately without necessity to restart any ABRT process and will be persistent.
disabled
User have to report the detect problems manually
enabled
ABRT uploads an uReport which was generated for a detected problem immediately after the detection phase.
uReport description
ABRT supports uReports for four types of crashes: crashes of C/C++ programs that result in a core dump, uncaught Python exceptions,
uncaught Java exceptions and kernel oopses.
Each uReport generally contains a stack trace, or multiple stack traces in the case of multi-threaded C/C++ and Java programs. The stack
trace only describes the call stack of the program at the time of the crash and does not contain contents of any variables.
Every uReport also contains identification of the operating system, versions of the RPM packages involved in the crash, and whether the
program ran under a root user.
There are also items specific to each crash type:
C/C++ crashes
these are path to the executable and signal delivered to the program,
Python exceptions
there is the type of the exception (without the error message, which may contain sensitive data),
for kernel oopses
these are list of loaded kernel modules, list of taint flags, and full text of the kernel oops.
Warning: The full text of a kernel oops might contain information like the identification of the host hardware type. You should disable the
autoreporting feature if you do not want to share this information with Red Hat.
OPTIONS
-v, --verbose
Be more verbose. Can be given multiple times.
SEE ALSO
abrt.conf(5)
AUTHORS
o ABRT team
abrt 2.1.11 06/18/2014 ABRT-AUTO-REPORTIN(1)