GNOME Bugzilla – Bug 535565
crash in Open Folder:
Last modified: 2008-05-30 11:24:15 UTC
Version: 2.20.0 What were you doing when the application crashed? Distribution: Debian lenny/sid Gnome Release: 2.22.1 2008-04-08 (Debian) BugBuddy Version: 2.22.0 System: Linux 2.6.24-1-686 #1 SMP Thu May 8 02:16:39 UTC 2008 i686 X Vendor: The X.Org Foundation X Vendor Release: 10400090 Selinux: No Accessibility: Disabled GTK+ Theme: Clearlooks Icon Theme: gnome Memory status: size: 89706496 vsize: 89706496 resident: 35729408 share: 17375232 rss: 35729408 rss_rlim: 4294967295 CPU usage: start_time: 1212073456 rtime: 1030 utime: 980 stime: 50 cutime:16 cstime: 2 timeout: 0 it_real_value: 0 frequency: 100 Backtrace was generated from '/usr/bin/nautilus' (no debugging symbols found) Using host libthread_db library "/lib/i686/cmov/libthread_db.so.1". (no debugging symbols found) [Thread debugging using libthread_db enabled] [New Thread 0xb6b85720 (LWP 3354)] (no debugging symbols found) 0xffffe410 in __kernel_vsyscall ()
+ Trace 199036
Thread 1 (Thread 0xb6b85720 (LWP 3354))
----------- .xsession-errors --------------------- (gnome-terminal:8084): GnomeUI-WARNING **: While connecting to session manager: Authentication Rejected, reason : None of the authentication protocols specified are supported and host-based authentication failed. ** (nautilus:3354): WARNING **: No description found for mime type "x-directory/smb-share" (file is "chadmichael"), please tell the gnome-vfs mailing list. connection_message_func(): Callback CALLBACK: fill-authentication!!! ... ... ... ... connection_message_func(): Callback CALLBACK: fill-authentication!!! connection_message_func(): Callback CALLBACK: fill-authentication!!! --------------------------------------------------
Thanks for taking the time to report this bug. This particular bug has already been reported into our bug tracking system, but we are happy to tell you that the problem has already been fixed. It should be solved in the next software version. You may want to check for a software upgrade. *** This bug has been marked as a duplicate of 522534 ***