Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 836361 Details for
Bug 1042919
[abrt] gnome-session-3.8.4-1.fc19: __assert_fail_base: Process /usr/libexec/gnome-session-check-accelerated-helper was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 15.09 KB, created by
preeforn
on 2013-12-13 16:01:20 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
preeforn
Created:
2013-12-13 16:01:20 UTC
Size:
15.09 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 1290] >warning: Could not load shared library symbols for %0*Zx, 0x%0*Zx). >Do you need "set solib-search-path" or "set sysroot"? >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/libexec/gnome-session-check-accelerated-helper'. >Program terminated with signal 6, Aborted. >#0 0x0000003ef5a35a19 in __GI_raise (sig=<optimized out>) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (Thread 0x7f91765b2840 (LWP 1290)): >#0 0x0000003ef5a35a19 in __GI_raise (sig=<optimized out>) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 18446744073709551615 > pid = 1290 > selftid = 1290 >#1 0x0000003ef5a37128 in __GI_abort () at abort.c:92 > self = 0x6 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x3ef5dba780 <main_arena>, sa_sigaction = 0x3ef5dba780 <main_arena>}, sa_mask = {__val = {100720, 0, 31827488, 100240, 270409387990, 4, 140735188516640, 96472646128, 140262730123872, 140262730350896, 0, 0, 0, 21474836480, 140262702968832, 270410440328}}, sa_flags = 1978944213, sa_restorer = 0x7f9175f44b70 <__PRETTY_FUNCTION__.46679>} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x0000003ef5a2e986 in __assert_fail_base (fmt=0x3ef5b7de88 "/LC_MESSAGES/%N:", assertion=0x7f9175f44ad5 "newCtx->Version > 0", file=0x7f9175f44440 "../../../src/mesa/main/context.c", line=1501, function=0x7f9175f44b70 <__PRETTY_FUNCTION__.46679> "_mesa_make_current") at assert.c:53 > __p = <optimized out> > str = 0x1e5a590 "gnome-session-check-accelerated-helper: ../../../src/mesa/main/context.c:1501: _mesa_make_current: Assertion `newCtx->Version > 0' failed.\n" > total = 4096 >#3 0x0000003ef5a2ea32 in __GI___assert_perror_fail (errnum=1290, file=0x7f9175f44440 "../../../src/mesa/main/context.c", line=1501, function=0xffffffffffffffff <Address 0xffffffffffffffff out of bounds>) at assert-perr.c:35 > errbuf = "hAB\004?\000\000\000\020\244\345\001", '\000' <repeats 28 times>, ":\276\326u\221\177\000\000`\330\340u\221\177\000\000\320\062\070v\221\177\000\000\360\062\070v\221\177\000\000\020\244\345\001\000\000\000\000\020\244\345\001", '\000' <repeats 20 times>, "\360Q\345\001", '\000' <repeats 12 times>, "\273g\353u\221\177\000\000\020\244\345\001\000\000\000\000\060\\\345\001\000\000\000\000\001\000\000\000\000\000\000\000\032\274.v\221\177\000\000\000\000\000\000\000\000\000\000\060\\\345\001", '\000' <repeats 12 times>, "\272 /v\221\177\000\000\254A\353v\377\177\000\000\000\000\000\000\000\000\000\000"... > e = <optimized out> >#4 0x0000000000000000 in ?? () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003f0bc00c60 0x0000003f0bc01638 Yes /lib64/libXcomposite.so.1 >0x0000003f04e17100 0x0000003f04e48e54 Yes /lib64/libGL.so.1 >0x0000003ef7e1a260 0x0000003ef7eb312c Yes /lib64/libglib-2.0.so.0 >0x0000003ef8e1df60 0x0000003ef8ea15ac Yes /lib64/libX11.so.6 >0x0000003ef5a1f410 0x0000003ef5b62740 Yes /lib64/libc.so.6 >0x0000003f04208e20 0x0000003f042118d0 Yes /lib64/libglapi.so.0 >0x0000003ef9a03760 0x0000003ef9a0ce70 Yes /lib64/libXext.so.6 >0x0000003f04600bd0 0x0000003f046014ec Yes /lib64/libXdamage.so.1 >0x0000003efc601580 0x0000003efc6037c8 Yes /lib64/libXfixes.so.3 >0x0000003f02000600 0x0000003f0200070c Yes /lib64/libX11-xcb.so.1 >0x0000003f05209fb0 0x0000003f0520fec8 Yes /lib64/libxcb-glx.so.0 >0x0000003f04a018b0 0x0000003f04a025c8 Yes /lib64/libxcb-dri2.so.0 >0x0000003ef9209a00 0x0000003ef92150a8 Yes /lib64/libxcb.so.1 >0x0000003f01600fa0 0x0000003f01603748 Yes /lib64/libXxf86vm.so.1 >0x0000003f056031e0 0x0000003f05607fc4 Yes /lib64/libdrm.so.2 >0x0000003ef66054b0 0x0000003ef666fbb8 Yes /lib64/libm.so.6 >0x0000003ef6205790 0x0000003ef62103b4 Yes /lib64/libpthread.so.0 >0x0000003ef5e00ed0 0x0000003ef5e019d0 Yes /lib64/libdl.so.2 >0x0000003ef7a06260 0x0000003ef7a17e9c Yes /lib64/libselinux.so.1 >0x0000003ef5600ae0 0x0000003ef561ac0a Yes /lib64/ld-linux-x86-64.so.2 >0x0000003ef9600ec0 0x0000003ef9601b3c Yes /lib64/libXau.so.6 >0x0000003ef76015f0 0x0000003ef7649cc8 Yes /lib64/libpcre.so.1 >0x00007f91762e6480 0x00007f9176388a44 Yes /usr/lib64/dri/i965_dri.so >0x00007f9175d4cfc0 0x00007f9175f41fdc Yes /lib64/libdricore9.2.0.so.1 >0x0000003efae03e00 0x0000003efae1cc1c Yes /lib64/libexpat.so.1 >0x00007f9175abde40 0x00007f9175ad0a08 Yes /lib64/libdrm_intel.so.1 >0x0000003efa65b510 0x0000003efa6be59a Yes /lib64/libstdc++.so.6 >0x0000003ef7202af0 0x0000003ef7212198 Yes /lib64/libgcc_s.so.1 >0x0000003ef8602340 0x0000003ef86064f0 Yes /lib64/libpciaccess.so.0 > No %0*Zx, 0x%0*Zx) >$1 = 0x7f917495f000 "" >$2 = 0x0 >rax 0x0 0 >rbx 0x7f917495f000 140262702968832 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x50a 1290 >rdi 0x50a 1290 >rbp 0x3ef5b7de88 0x3ef5b7de88 >rsp 0x7fff76eb3e88 0x7fff76eb3e88 >r8 0x1 1 >r9 0x3ef5dba7d8 270412785624 >r10 0x8 8 >r11 0x206 518 >r12 0x7f9175f44ad5 140262725929685 >r13 0x7f9175f44b70 140262725929840 >r14 0x1e55100 31805696 >r15 0x0 0 >rip 0x3ef5a35a19 0x3ef5a35a19 <__GI_raise+105> >eflags 0x206 [ PF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x1fa0 [ PE IM DM ZM OM UM PM ] >ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 14 times>, 0xff, 0x0 <repeats 17 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0x0, 0xff0000, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0xff000000000000, 0x0, 0x0}, v2_int128 = {0x00ff0000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x25 <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2525252525252525, 0x2525252525252525, 0x0, 0x0}, v2_int128 = {0x25252525252525252525252525252525, 0x00000000000000000000000000000000}} >ymm2 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 18 times>}, v16_int16 = {0xff00, 0x0, 0x0, 0xff, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xff00, 0xff0000, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000ff00, 0xff0000000000, 0x0, 0x0}, v2_int128 = {0x0000ff000000000000ff00000000ff00, 0x00000000000000000000000000000000}} >ymm4 {v8_float = {0x31c00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xe0, 0x98, 0xc3, 0x53, 0xcc, 0x8c, 0xd3, 0x3e, 0x0 <repeats 24 times>}, v16_int16 = {0x98e0, 0x53c3, 0x8ccc, 0x3ed3, 0x0 <repeats 12 times>}, v8_int32 = {0x53c398e0, 0x3ed38ccc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3ed38ccc53c398e0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000003ed38ccc53c398e0, 0x00000000000000000000000000000000}} >ymm5 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x74, 0x69, 0x6f, 0x6e, 0x20, 0x6e, 0x61, 0x6d, 0x65, 0x3d, 0x22, 0x66, 0x6f, 0x72, 0x63, 0x65, 0x0 <repeats 16 times>}, v16_int16 = {0x6974, 0x6e6f, 0x6e20, 0x6d61, 0x3d65, 0x6622, 0x726f, 0x6563, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x6e6f6974, 0x6d616e20, 0x66223d65, 0x6563726f, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x6d616e206e6f6974, 0x6563726f66223d65, 0x0, 0x0}, v2_int128 = {0x6563726f66223d656d616e206e6f6974, 0x00000000000000000000000000000000}} >ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0xa, 0x20 <repeats 12 times>, 0x3c, 0x6f, 0x70, 0x0 <repeats 16 times>}, v16_int16 = {0x200a, 0x2020, 0x2020, 0x2020, 0x2020, 0x2020, 0x3c20, 0x706f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x2020200a, 0x20202020, 0x20202020, 0x706f3c20, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x202020202020200a, 0x706f3c2020202020, 0x0, 0x0}, v2_int128 = {0x706f3c2020202020202020202020200a, 0x00000000000000000000000000000000}} >ymm7 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x20, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x3d, 0x22, 0x74, 0x72, 0x75, 0x65, 0x22, 0x20, 0x2f, 0x3e, 0x0 <repeats 16 times>}, v16_int16 = {0x7620, 0x6c61, 0x6575, 0x223d, 0x7274, 0x6575, 0x2022, 0x3e2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x6c617620, 0x223d6575, 0x65757274, 0x3e2f2022, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x223d65756c617620, 0x3e2f202265757274, 0x0, 0x0}, v2_int128 = {0x3e2f202265757274223d65756c617620, 0x00000000000000000000000000000000}} >ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x0, 0x0, 0x0}, v32_int8 = {0x64, 0x5f, 0x66, 0x75, 0x6e, 0x63, 0x5f, 0x65, 0x78, 0x74, 0x65, 0x6e, 0x64, 0x65, 0x64, 0x22, 0x0 <repeats 16 times>}, v16_int16 = {0x5f64, 0x7566, 0x636e, 0x655f, 0x7478, 0x6e65, 0x6564, 0x2264, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x75665f64, 0x655f636e, 0x6e657478, 0x22646564, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x655f636e75665f64, 0x226465646e657478, 0x0, 0x0}, v2_int128 = {0x226465646e657478655f636e75665f64, 0x00000000000000000000000000000000}} >ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x6c, 0x65, 0x5f, 0x62, 0x6c, 0x65, 0x6e, 0x64, 0x5f, 0x66, 0x75, 0x6e, 0x63, 0x5f, 0x65, 0x78, 0x0 <repeats 16 times>}, v16_int16 = {0x656c, 0x625f, 0x656c, 0x646e, 0x665f, 0x6e75, 0x5f63, 0x7865, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x625f656c, 0x646e656c, 0x6e75665f, 0x78655f63, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x646e656c625f656c, 0x78655f636e75665f, 0x0, 0x0}, v2_int128 = {0x78655f636e75665f646e656c625f656c, 0x00000000000000000000000000000000}} >ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm13 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm14 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm15 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >Dump of assembler code for function __GI_raise: > 0x0000003ef5a359b0 <+0>: mov %fs:0x2d4,%eax > 0x0000003ef5a359b8 <+8>: mov %eax,%ecx > 0x0000003ef5a359ba <+10>: mov %fs:0x2d0,%esi > 0x0000003ef5a359c2 <+18>: test %esi,%esi > 0x0000003ef5a359c4 <+20>: jne 0x3ef5a359f8 <__GI_raise+72> > 0x0000003ef5a359c6 <+22>: mov $0xba,%eax > 0x0000003ef5a359cb <+27>: syscall > 0x0000003ef5a359cd <+29>: mov %eax,%ecx > 0x0000003ef5a359cf <+31>: mov %eax,%fs:0x2d0 > 0x0000003ef5a359d7 <+39>: mov %eax,%esi > 0x0000003ef5a359d9 <+41>: movslq %edi,%rdx > 0x0000003ef5a359dc <+44>: movslq %esi,%rsi > 0x0000003ef5a359df <+47>: movslq %ecx,%rdi > 0x0000003ef5a359e2 <+50>: mov $0xea,%eax > 0x0000003ef5a359e7 <+55>: syscall > 0x0000003ef5a359e9 <+57>: cmp $0xfffffffffffff000,%rax > 0x0000003ef5a359ef <+63>: ja 0x3ef5a35a0a <__GI_raise+90> > 0x0000003ef5a359f1 <+65>: repz retq > 0x0000003ef5a359f3 <+67>: nopl 0x0(%rax,%rax,1) > 0x0000003ef5a359f8 <+72>: test %eax,%eax > 0x0000003ef5a359fa <+74>: jg 0x3ef5a359d9 <__GI_raise+41> > 0x0000003ef5a359fc <+76>: mov %eax,%ecx > 0x0000003ef5a359fe <+78>: neg %ecx > 0x0000003ef5a35a00 <+80>: test $0x7fffffff,%eax > 0x0000003ef5a35a05 <+85>: cmove %esi,%ecx > 0x0000003ef5a35a08 <+88>: jmp 0x3ef5a359d9 <__GI_raise+41> > 0x0000003ef5a35a0a <+90>: mov 0x38444f(%rip),%rdx # 0x3ef5db9e60 > 0x0000003ef5a35a11 <+97>: neg %eax > 0x0000003ef5a35a13 <+99>: mov %eax,%fs:(%rdx) > 0x0000003ef5a35a16 <+102>: or $0xffffffffffffffff,%rax > 0x0000003ef5a35a1a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1042919
: 836361 |
836362
|
836363
|
836364
|
836365
|
836366
|
836367
|
836368
|
836369
|
836370