X2Go Bug report logs - #1276
VcXsrv windows xserver crashes when trying to resume a fullscreen session

Package: x2goclient; Maintainer for x2goclient is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goclient is src:x2goclient.

Reported by: Mathieu GALLAS <mg@progial.fr>

Date: Wed, 21 Mar 2018 12:55:01 UTC

Severity: normal

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#1276: VcXsrv windows xserver crashes when trying to resume a fullscreen session
Reply-To: x2go@0bl.net, 1276@bugs.x2go.org
Resent-From: x2go@0bl.net
Original-Sender: <x2go@fiveforty.net>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Wed, 28 Mar 2018 22:55:02 +0000
Resent-Message-ID: <handler.1276.B1276.152227750232755@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 1276
X-X2Go-PR-Package: x2goclient
X-X2Go-PR-Keywords: 
Received: via spool by 1276-submit@bugs.x2go.org id=B1276.152227750232755
          (code B ref 1276); Wed, 28 Mar 2018 22:55:02 +0000
Received: (at 1276) by bugs.x2go.org; 28 Mar 2018 22:51:42 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on
	ymir.das-netzwerkteam.de
X-Spam-Level: **
X-Spam-Status: No, score=2.3 required=3.0 tests=BAYES_50,FAKE_REPLY_C
	autolearn=ham autolearn_force=no version=3.4.1
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 4F5315DACC
	for <1276@bugs.x2go.org>; Thu, 29 Mar 2018 00:51:39 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id tmVytexBZTnK for <1276@bugs.x2go.org>;
	Thu, 29 Mar 2018 00:51:34 +0200 (CEST)
X-Greylist: delayed 401 seconds by postgrey-1.35 at ymir.das-netzwerkteam.de; Thu, 29 Mar 2018 00:51:34 CEST
Received: from fiveforty.net (w.0bl.net [184.73.239.56])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id A19C45DAE9
	for <1276@bugs.x2go.org>; Thu, 29 Mar 2018 00:51:34 +0200 (CEST)
Received: from x2go by fiveforty.net with local (Exim 4.89)
	(envelope-from <x2go@fiveforty.net>)
	id 1f1Jum-0000kJ-SN
	for 1276@bugs.x2go.org; Wed, 28 Mar 2018 22:51:32 +0000
Date: Wed, 28 Mar 2018 22:51:32 +0000
From: x2go@0bl.net
To: 1276@bugs.x2go.org
Message-ID: <20180328225132.GA2738@ip-10-233-97-181.ec2.internal>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.8.3 (2017-05-23)
Sender:  <x2go@fiveforty.net>
I have the same problem even with a single monitor system.

Environment:
- x2goserver 4.1.0.0 (ArchLinux)
- Client: Windows 10 Build 1709
- Desktop: xfce4

Steps to reproduce:

- Open Windows client (4.1.1.1), start a new session with "Connect to local desktop" (resolution does not seem to matter, but I'm using windowed 1650x1010)
- Click "Full access"
- As soon as the "New session" window appears, x2goclient crashes.

Older versions of both the client and server (tried different hardware/distros on the server also) exhibit the same issue.

Backtrace from Dr. Mingw of the debug exe:

vcxsrv.exe caused an Access Violation at location 000000006E34F608 in module MSVCR120.dll Reading from location 0000000006E04648.

Registers:
eax=01e1c71c ebx=07018154 ecx=0000067f edx=00000000 esi=06e04648 edi=07018154
eip=6e34f608 esp=00b3f3e4 ebp=00000147 iopl=0         nv up ei pl nz na po nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206

AddrPC   Params
6E34F608 07018154 06E04648 000019FC  MSVCR120.dll!memcpy  [f:\dd\vctools\crt\crtw32\string\i386\memcpy.asm @ 305]
0103B708 00000018 00000000 06BF1F8C  vcxsrv.exe!ErrorF
77231659 00000000 00000000 00000000  ntdll.dll!_RtlpAllocateHeapInternal@16

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Thu Nov 21 15:00:35 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.