X2Go Bug report logs - #1085
VcXsrv crash after CTRL ALT f

version graph

Package: x2goclient; Maintainer for x2goclient is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goclient is src:x2goclient.

Reported by: Troels Arvin <troels@arvin.dk>

Date: Tue, 13 Sep 2016 07:15:02 UTC

Severity: normal

Found in version 4.0.5.1

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#1085: VcXsrv crash after CTRL ALT f
Reply-To: Troels Arvin <troels@arvin.dk>, 1085@bugs.x2go.org
Resent-From: Troels Arvin <troels@arvin.dk>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Tue, 13 Sep 2016 07:15:02 +0000
Resent-Message-ID: <handler.1085.B.147375088120185@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: report 1085
X-X2Go-PR-Package: x2goclient
X-X2Go-PR-Keywords: 
Received: via spool by submit@bugs.x2go.org id=B.147375088120185
          (code B); Tue, 13 Sep 2016 07:15:02 +0000
Received: (at submit) by bugs.x2go.org; 13 Sep 2016 07:14:41 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-0.5 required=3.0 tests=BAYES_05,SPF_HELO_PASS,
	URIBL_BLOCKED autolearn=ham version=3.3.2
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 380135DA91
	for <submit@bugs.x2go.org>; Tue, 13 Sep 2016 09:14:39 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id JsiwfWZfyZSP for <submit@bugs.x2go.org>;
	Tue, 13 Sep 2016 09:14:32 +0200 (CEST)
Received: from arvin.dk (home.borberg.arvin.dk [2.107.65.14])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 712E55DA90
	for <submit@bugs.x2go.org>; Tue, 13 Sep 2016 09:14:32 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
	by arvin.dk (Postfix) with ESMTP id 21415330A
	for <submit@bugs.x2go.org>; Tue, 13 Sep 2016 09:14:32 +0200 (CEST)
X-Virus-Scanned: amavisd-new at arvin.dk
Received: from arvin.dk ([127.0.0.1])
	by localhost (arvinserver2.home.borberg.arvin.dk [127.0.0.1]) (amavisd-new, port 10024)
	with LMTP id ZToAPMlNxK4y for <submit@bugs.x2go.org>;
	Tue, 13 Sep 2016 09:14:29 +0200 (CEST)
Received: from kurt.home.borberg.arvin.dk (kurt [192.168.1.2])
	by arvin.dk (Postfix) with ESMTP id C477835C
	for <submit@bugs.x2go.org>; Tue, 13 Sep 2016 09:14:29 +0200 (CEST)
From: Troels Arvin <troels@arvin.dk>
To: submit@bugs.x2go.org
Message-ID: <52131556-8e55-75e1-10f9-cc7e4e91c174@arvin.dk>
Date: Tue, 13 Sep 2016 09:14:29 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101
 Thunderbird/45.3.0
MIME-Version: 1.0
Content-Type: multipart/mixed;
 boundary="------------6BAE5B74751D431E6CEE15FC"
[Message part 1 (text/plain, inline)]
Package: x2goclient
Version: 4.0.5.1

I consistently get a VcXsrv crash when using the CTRL ALT f key 
combination to (try to) move from non-fullscreen mode to full-screen 
mode; screenshot attached. The text (which is in Danish) reads:

   VcXsrv windows xserver (X2Go/Arctica Builds) has stopped working.
   A problem caused the program to stop functioning properly. Close the 
program.

I have tried copying in the latest VcXsrv binaries from 
http://vcxsrv.sourceforge.net/ to X2go's directory, but that doesn't help.

Client OS: Windows 8.1 Enterprise 64 bit. The issue has consistently 
been reproduced on both a physical and an KVM-virtualized Windows client.

When running x2go from Fedora Linux, I don't see crashes when toggling 
fullscreen mode with CTRL ALT f.


-- 
Regards,
Troels Arvin <troels@arvin.dk>
http://troels.arvin.dk/


[x2go-crash-screenshot.png (image/png, attachment)]

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Thu Nov 21 18:41:22 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.