Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 576132 Details for
Bug 810798
[abrt] nautilus-2.28.4-2.fc12: Process /usr/bin/nautilus was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 2.09 KB, created by
mbreitfe
on 2012-04-09 08:24:07 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
mbreitfe
Created:
2012-04-09 08:24:07 UTC
Size:
2.09 KB
patch
obsolete
>BFD: Warning: /var/spool/abrt/ccpp-1328567838-2081/coredump is truncated: expected core file size >= 62963712, found: 13107200. >[New Thread 3061] >[New Thread 2638] >[New Thread 2666] >Core was generated by `nautilus'. >Program terminated with signal 6, Aborted. >#0 0x0019e424 in __kernel_vsyscall () > >Thread 4 (Thread 2666): >Cannot access memory at address 0xb280ddf0 > >Thread 3 (Thread 2638): >Cannot access memory at address 0xb69ff094 > >Thread 2 (Thread 3061): >Cannot access memory at address 0xb1e00464 > >Thread 1 (Thread 2081): >Cannot access memory at address 0xbfad9ccc >From To Syms Read Shared Object Library >0x008f7830 0x0090ef8f Yes (*) /lib/ld-linux.so.2 >(*): Shared library is missing debugging information. >No symbol "__abort_msg" in current context. >No symbol "__glib_assert_msg" in current context. >eax 0x0 0 >ecx 0x821 2081 >edx 0x6 6 >ebx 0x821 2081 >esp 0xbfad9cc0 0xbfad9cc0 >ebp 0xbfad9cd8 0xbfad9cd8 >esi 0xa5496f 10832239 >edi 0xa8dff4 11067380 >eip 0x19e424 0x19e424 <__kernel_vsyscall+16> >eflags 0x200206 [ PF IF ID ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function __kernel_vsyscall: >0x0019e414 <__kernel_vsyscall+0>: push %ecx >0x0019e415 <__kernel_vsyscall+1>: push %edx >0x0019e416 <__kernel_vsyscall+2>: push %ebp >0x0019e417 <__kernel_vsyscall+3>: mov %esp,%ebp >0x0019e419 <__kernel_vsyscall+5>: sysenter >0x0019e41b <__kernel_vsyscall+7>: nop >0x0019e41c <__kernel_vsyscall+8>: nop >0x0019e41d <__kernel_vsyscall+9>: nop >0x0019e41e <__kernel_vsyscall+10>: nop >0x0019e41f <__kernel_vsyscall+11>: nop >0x0019e420 <__kernel_vsyscall+12>: nop >0x0019e421 <__kernel_vsyscall+13>: nop >0x0019e422 <__kernel_vsyscall+14>: jmp 0x19e417 <__kernel_vsyscall+3> >0x0019e424 <__kernel_vsyscall+16>: pop %ebp >0x0019e425 <__kernel_vsyscall+17>: pop %edx >0x0019e426 <__kernel_vsyscall+18>: pop %ecx >0x0019e427 <__kernel_vsyscall+19>: ret >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 810798
: 576132