abrt-action-analyze-xorg [-v] [-d DIR]
The tool reads the file named Xorg.0.log and checks if any black listed module was loaded. If so, not-reportable file is created with an appropriate explanation text. If no black listed module was loaded, the tool reads the file named backtrace from a problem data directory record and generates a duplication hash and a universally unique identifier (UUID). Then it saves this data as new elements duphash and uuid.
abrt-action-analyze-xorg can be used to generate the duplication hash of a newly discovered Xorg backtraces.
EVENT=post-create analyzer=Xorg abrt-action-analyze-xorg
-d DIR
-v
/etc/abrt/plugins/xorg.conf
abrt-dump-journal-xorg(1) abrt-xorg.conf(5)