Nice work Mathieu. This is the stuff we need except for one thing, the
stacktrace seems to be missing function names and variables for the
evdev driver. This can be fixed quite easily though. Please add these
lines to your /etc/apt/sources.list file:

      deb http://ddebs.ubuntu.com jaunty main restricted universe multiverse
      deb http://ddebs.ubuntu.com jaunty-updates main restricted universe 
multiverse 
      deb http://ddebs.ubuntu.com jaunty-security main restricted universe 
multiverse
      deb http://ddebs.ubuntu.com jaunty-proposed main restricted universe 
multiverse

And then run "sudo apt-get update". This will make a BLAH-dbgsym package 
available for each normal package BLAH. If you want, you can read more about 
this repository here: https://wiki.ubuntu.com/DebuggingProgramCrash
After you have added these ddeb repositories, please install the following 
packages:

sudo apt-get install xserver-xorg-input-evdev-dbgsym libc6-dbg xserver-
xorg-core-dbg xserver-xorg-video-ati-dbg xserver-xorg-input-kbd-dbgsym
xserver-xorg-input-synaptics-dbgsym xserver-xorg-input-mouse-dbgsym

Finally, please trigger the crash with gdb attached to the X process again just 
like you did before. This time hopefully
the "bt full" command will give us better data. Attach the improved output of 
"bt full" to the bug please. Thanks.

-- 
Barcode reader kill X on scan
https://bugs.launchpad.net/bugs/370851
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to