GNOME Bugzilla – Bug 537645
crash in Open Folder:
Last modified: 2008-06-10 19:09:37 UTC
Version: 2.20.0 What were you doing when the application crashed? Distribution: Debian lenny/sid Gnome Release: 2.22.2 2008-05-29 (Debian) BugBuddy Version: 2.22.0 System: Linux 2.6.24-1-686 #1 SMP Thu May 8 02:16:39 UTC 2008 i686 X Vendor: The X.Org Foundation X Vendor Release: 10400090 Selinux: No Accessibility: Disabled GTK+ Theme: Clearlooks Icon Theme: gnome Memory status: size: 103440384 vsize: 103440384 resident: 28987392 share: 17321984 rss: 28987392 rss_rlim: 4294967295 CPU usage: start_time: 1213119938 rtime: 469 utime: 432 stime: 37 cutime:0 cstime: 0 timeout: 0 it_real_value: 0 frequency: 100 Backtrace was generated from '/usr/bin/nautilus' Using host libthread_db library "/lib/i686/cmov/libthread_db.so.1". [Thread debugging using libthread_db enabled] [New Thread 0xb6ab6940 (LWP 3644)] [New Thread 0xb38a1b90 (LWP 3926)] [New Thread 0xb5e64b90 (LWP 3899)] [New Thread 0xb4e62b90 (LWP 3896)] 0xffffe410 in __kernel_vsyscall ()
+ Trace 200055
Thread 1 (Thread 0xb6ab6940 (LWP 3644))
----------- .xsession-errors --------------------- CALLBACK: fill-authentication!!! connection_message_func(): Callback CALLBACK: full-authentication!!! ** (nautilus:3644): WARNING **: Hit unhandled case 31 (Operation cancelled) in fm_report_error_loading_directory connection_message_func(): Callback CALLBACK: fill-authentication!!! connection_message_func(): Callback CALLBACK: fill-authentication!!! connection_message_func(): Callback CALLBACK: full-authentication!!! connection_message_func(): Callback CALLBACK: save-authentication!!! Cannot access memory at address 0x0 Cannot access memory at address 0x0 --------------------------------------------------
Thanks for taking the time to report this bug. This particular bug has already been reported into our bug tracking system, but we are happy to tell you that the problem has already been fixed. It should be solved in the next software version. You may want to check for a software upgrade. *** This bug has been marked as a duplicate of 522534 ***