It seems I got a valid backtrace. I installed xserver-xorg-core-hwe-18.04-dbgsym and it was possible to get a backtrace with more data. Here is it:
(gdb) bt f #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51 set = {__val = {171516928, 0, 0, 0, 0, 94568085079104, 94568054863600, 67108868, 140083657316496, 0, 94568084835824, 94568085157664, 94568085157664, 94568085534016, 0, 0}} pid = <optimized out> tid = <optimized out> ret = <optimized out> #1 0x00007f67c465e801 in __GI_abort () at abort.c:79 save_stage = 1 act = {__sigaction_handler = {sa_handler = 0x5602591f7720, sa_sigaction = 0x5602591f7720}, sa_mask = {__val = {94568085534016, 0 <repeats 11 times>, 67108868, 140083657316496, 5467293301926151424, 0}}, sa_flags = 1465188592, sa_restorer = 0x7ffc2f5ddeb0} sigs = {__val = {32, 0 <repeats 15 times>}} __cnt = <optimized out> __set = <optimized out> __cnt = <optimized out> __set = <optimized out> #2 0x00005602575166da in OsAbort () at ../../../../os/utils.c:1351 No locals. #3 0x000056025751c273 in AbortServer () at ../../../../os/log.c:879 No locals. #4 0x000056025751d095 in FatalError (f=f@entry=0x5602575500f0 "Caught signal %d (%s). Server aborting\n") at ../../../../os/log.c:1017 args = {{gp_offset = 24, fp_offset = 48, overflow_arg_area = 0x7ffc2f5ddfa0, reg_save_area = 0x7ffc2f5dded0}} args2 = {{gp_offset = 8, fp_offset = 48, overflow_arg_area = 0x7ffc2f5ddfa0, reg_save_area = 0x7ffc2f5dded0}} beenhere = 1 #5 0x0000560257513773 in OsSigHandler (signo=11, sip=<optimized out>, unused=<optimized out>) at ../../../../os/osinit.c:156 unused = <optimized out> sip = <optimized out> signo = 11 #6 <signal handler called> No locals. #7 _XkbSetMapChecks (client=client@entry=0x560259cd7c40, req=req@entry=0x56025a1b4dd0, values=values@entry=0x56025a1b4df4 "", dev=<optimized out>) at ../../../../xkb/xkb.c:2387 xkbi = <error reading variable xkbi (Não é possível acessar a memória no endereço 0x68)> xkb = <optimized out> error = <optimized out> nTypes = 0 nActions = <optimized out> mapWidths = '\000' <repete 255 vezes> symsPerKey = {0 <repeats 256 times>} map = <optimized out> i = <optimized out> #8 0x00005602574b734f in ProcXkbSetMap (client=0x560259cd7c40) at ../../../../xkb/xkb.c:2655 other = 0x560258ea7d40 dev = 0x560258ea84d0 tmp = 0x56025a1b4df4 "" rc = 0 stuff = <optimized out> master = 0x560258ea84d0 #9 0x00005602573b64e8 in Dispatch () at ../../../../dix/dispatch.c:478 result = <optimized out> client = <optimized out> start_tick = 1390 #10 0x00005602573ba4e8 in dix_main (argc=11, argv=0x7ffc2f5de988, envp=<optimized out>) at ../../../../dix/main.c:276 i = <optimized out> alwaysCheckForInput = {0, 1} #11 0x00007f67c463fb97 in __libc_start_main (main=0x5602573a4150 <main>, argc=11, argv=0x7ffc2f5de988, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7ffc2f5de978) at ../csu/libc-start.c:310 self = <optimized out> __self = <optimized out> result = <optimized out> unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, -957471381706168478, 94568053358944, 140721103169920, 0, 0, -6824483104159357086, -6882266889145079966}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7f67c7364733 <_dl_init+259>, 0x7f67c7352438}, data = {prev = 0x0, cleanup = 0x0, canceltype = -952744141}}} not_first_call = <optimized out> #12 0x00005602573a418a in _start () No symbol table info available.
It seems I got a valid backtrace. I installed xserver- xorg-core- hwe-18. 04-dbgsym and it was possible to get a backtrace with more data. Here is it:
(gdb) bt f unix/sysv/ linux/raise. c:51 handler = {sa_handler = 0x5602591f7720, sa_sigaction = 0x5602591f7720}, sa_mask = {__val = {94568085534016, 0 <repeats 11 times>, 67108868, 140083657316496, 546729330192615 1424, 0}}, sa_flags = 1465188592, sa_restorer = 0x7ffc2f5ddeb0} ./../os/ utils.c: 1351 ./../os/ log.c:879 0x5602575500f0 "Caught signal %d (%s). Server aborting\n") at ../../. ./../os/ log.c:1017 ./../os/ osinit. c:156 client@ entry=0x560259c d7c40, req=req@ entry=0x56025a1 b4dd0, values= values@ entry=0x56025a1 b4df4 "", dev=<optimized out>) at ../../. ./../xkb/ xkb.c:2387 0x560259cd7c40) at ../../. ./../xkb/ xkb.c:2655 ./../dix/ dispatch. c:478 e988, envp=<optimized out>) at ../../. ./../dix/ main.c: 276
alwaysCheckFor Input = {0, 1} a4150 <main>, argc=11, argv=0x7ffc2f5d e988, init=<optimized out>, fini=<optimized out>, rtld_fini= <optimized out>, stack_end= 0x7ffc2f5de978) at ../csu/ libc-start. c:310 8478, 94568053358944, 140721103169920, 0, 0, -68244831041593 57086, -68822668891450 79966}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7f67c7364733 <_dl_init+259>, 0x7f67c7352438}, data = {prev = 0x0, cleanup = 0x0, canceltype = -952744141}}}
not_first_ call = <optimized out>
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/
set = {__val = {171516928, 0, 0, 0, 0, 94568085079104, 94568054863600, 67108868, 140083657316496, 0, 94568084835824, 94568085157664, 94568085157664, 94568085534016, 0, 0}}
pid = <optimized out>
tid = <optimized out>
ret = <optimized out>
#1 0x00007f67c465e801 in __GI_abort () at abort.c:79
save_stage = 1
act = {__sigaction_
sigs = {__val = {32, 0 <repeats 15 times>}}
__cnt = <optimized out>
__set = <optimized out>
__cnt = <optimized out>
__set = <optimized out>
#2 0x00005602575166da in OsAbort () at ../../.
No locals.
#3 0x000056025751c273 in AbortServer () at ../../.
No locals.
#4 0x000056025751d095 in FatalError (f=f@entry=
args = {{gp_offset = 24, fp_offset = 48, overflow_arg_area = 0x7ffc2f5ddfa0, reg_save_area = 0x7ffc2f5dded0}}
args2 = {{gp_offset = 8, fp_offset = 48, overflow_arg_area = 0x7ffc2f5ddfa0, reg_save_area = 0x7ffc2f5dded0}}
beenhere = 1
#5 0x0000560257513773 in OsSigHandler (signo=11, sip=<optimized out>, unused=<optimized out>) at ../../.
unused = <optimized out>
sip = <optimized out>
signo = 11
#6 <signal handler called>
No locals.
#7 _XkbSetMapChecks (client=
xkbi = <error reading variable xkbi (Não é possível acessar a memória no endereço 0x68)>
xkb = <optimized out>
error = <optimized out>
nTypes = 0
nActions = <optimized out>
mapWidths = '\000' <repete 255 vezes>
symsPerKey = {0 <repeats 256 times>}
map = <optimized out>
i = <optimized out>
#8 0x00005602574b734f in ProcXkbSetMap (client=
other = 0x560258ea7d40
dev = 0x560258ea84d0
tmp = 0x56025a1b4df4 ""
rc = 0
stuff = <optimized out>
master = 0x560258ea84d0
#9 0x00005602573b64e8 in Dispatch () at ../../.
result = <optimized out>
client = <optimized out>
start_tick = 1390
#10 0x00005602573ba4e8 in dix_main (argc=11, argv=0x7ffc2f5d
i = <optimized out>
#11 0x00007f67c463fb97 in __libc_start_main (main=0x5602573
self = <optimized out>
__self = <optimized out>
result = <optimized out>
unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, -95747138170616
#12 0x00005602573a418a in _start ()
No symbol table info available.