Nice work Mathieu. This is the stuff we need except for one thing, the
stacktrace seems to be missing function names and variables for the
evdev driver. This can be fixed quite easily though. Please add these
lines to your /etc/apt/sources.list file:
deb http://ddebs.ubuntu.com jaunty main restricted universe multiverse
deb http://ddebs.ubuntu.com jaunty-updates main restricted universe
multiverse
deb http://ddebs.ubuntu.com jaunty-security main restricted universe
multiverse
deb http://ddebs.ubuntu.com jaunty-proposed main restricted universe
multiverse
And then run "sudo apt-get update". This will make a BLAH-dbgsym package
available for each normal package BLAH. If you want, you can read more about
this repository here: https://wiki.ubuntu.com/DebuggingProgramCrash
After you have added these ddeb repositories, please install the following
packages:
sudo apt-get install xserver-xorg-input-evdev-dbgsym libc6-dbg xserver-
xorg-core-dbg xserver-xorg-video-ati-dbg xserver-xorg-input-kbd-dbgsym
xserver-xorg-input-synaptics-dbgsym xserver-xorg-input-mouse-dbgsym
Finally, please trigger the crash with gdb attached to the X process again just
like you did before. This time hopefully
the "bt full" command will give us better data. Attach the improved output of
"bt full" to the bug please. Thanks.
--
Barcode reader kill X on scan
https://bugs.launchpad.net/bugs/370851
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs