Bug 612052 - [abrt] crash in avant-window-navigator-0.4.0-1.fc12: Process /usr/bin/avant-window-navigator was killed by signal 6 (SIGABRT)
Summary: [abrt] crash in avant-window-navigator-0.4.0-1.fc12: Process /usr/bin/avant-w...
Alias: None
Product: Fedora
Classification: Fedora
Component: avant-window-navigator
Version: 12
Hardware: i686
OS: Linux
Target Milestone: ---
Assignee: leigh scott
QA Contact: Fedora Extras Quality Assurance
Whiteboard: abrt_hash:44e4936884c34ce777b301c8097...
Depends On:
TreeView+ depends on / blocked
Reported: 2010-07-07 07:50 UTC by Alex
Modified: 2010-07-30 16:45 UTC (History)
2 users (show)

Clone Of:
Last Closed: 2010-07-30 16:45:57 UTC

Attachments (Terms of Use)
File: backtrace (1.99 KB, text/plain)
2010-07-07 07:50 UTC, Alex
no flags Details

Description Alex 2010-07-07 07:50:14 UTC
abrt 1.1.1 detected a crash.

architecture: i686
cmdline: avant-window-navigator --startup
component: avant-window-navigator
executable: /usr/bin/avant-window-navigator
global_uuid: 44e4936884c34ce777b301c8097164ea6291cd4f
package: avant-window-navigator-0.4.0-1.fc12
rating: 4
reason: Process /usr/bin/avant-window-navigator was killed by signal 6 (SIGABRT)
release: Fedora release 12 (Constantine)

BFD: Warning: /var/cache/abrt/ccpp-1278396042-1811/coredump is truncated: expected core file size >= 13377536, found: 372736.
warning: core file may not match specified executable file.
[New Thread 2162]
Core was generated by `avant-window-navigator --startup'.
Program terminated with signal 6, Aborted.
#0  0x006f6424 in __kernel_vsyscall ()

Thread 2 (Thread 2162):
Cannot access memory at address 0xb6919250

Thread 1 (Thread 1811):
Cannot access memory at address 0xbf8a12bc
From        To          Syms Read   Shared Object Library
0x001e7830  0x001fecdf  Yes (*)     /lib/ld-linux.so.2
(*): Shared library is missing debugging information.
No symbol "__abort_msg" in current context.
No symbol "__glib_assert_msg" in current context.
eax            0x0	0
ecx            0x713	1811
edx            0x6	6
ebx            0x713	1811
esp            0xbf8a12b0	0xbf8a12b0
ebp            0xbf8a12c8	0xbf8a12c8
esi            0x340e6f	3411567
edi            0x37aff4	3649524
eip            0x6f6424	0x6f6424 <__kernel_vsyscall+16>
eflags         0x200202	[ IF ID ]
cs             0x73	115
ss             0x7b	123
ds             0x7b	123
es             0x7b	123
fs             0x0	0
gs             0x33	51
Dump of assembler code for function __kernel_vsyscall:
0x006f6414 <__kernel_vsyscall+0>:	push   %ecx
0x006f6415 <__kernel_vsyscall+1>:	push   %edx
0x006f6416 <__kernel_vsyscall+2>:	push   %ebp
0x006f6417 <__kernel_vsyscall+3>:	mov    %esp,%ebp
0x006f6419 <__kernel_vsyscall+5>:	sysenter 
0x006f641b <__kernel_vsyscall+7>:	nop
0x006f641c <__kernel_vsyscall+8>:	nop
0x006f641d <__kernel_vsyscall+9>:	nop
0x006f641e <__kernel_vsyscall+10>:	nop
0x006f641f <__kernel_vsyscall+11>:	nop
0x006f6420 <__kernel_vsyscall+12>:	nop
0x006f6421 <__kernel_vsyscall+13>:	nop
0x006f6422 <__kernel_vsyscall+14>:	jmp    0x6f6417 <__kernel_vsyscall+3>
0x006f6424 <__kernel_vsyscall+16>:	pop    %ebp
0x006f6425 <__kernel_vsyscall+17>:	pop    %edx
0x006f6426 <__kernel_vsyscall+18>:	pop    %ecx
0x006f6427 <__kernel_vsyscall+19>:	ret    
End of assembler dump.

Comment 1 Alex 2010-07-07 07:50:16 UTC
Created attachment 429979 [details]
File: backtrace

Note You need to log in before you can comment on or make changes to this bug.