X2Go Bug report logs - #207
X2Go win32 client screen resolution bug

version graph

Package: x2goserver; Maintainer for x2goserver is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goserver is src:x2goserver.

Reported by: Konstantinos Gyftakis <gyftakiskon@gmail.com>

Date: Tue, 14 May 2013 09:03:01 UTC

Severity: important

Merged with 42

Found in version

Full log

Message #26 received at control@bugs.x2go.org (full text, mbox, reply):

Received: (at control) by bugs.x2go.org; 29 Jan 2015 23:34:31 +0000
From rtandy@sd63.bc.ca  Fri Jan 30 00:34:22 2015
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on
X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,URIBL_BLOCKED
	autolearn=unavailable version=3.3.2
X-Greylist: delayed 408 seconds by postgrey-1.34 at ymir.das-netzwerkteam.de; Fri, 30 Jan 2015 00:34:22 CET
Received: from mail.sd63.bc.ca (mail.sd63.bc.ca [])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 30EB93BC82;
	Fri, 30 Jan 2015 00:34:22 +0100 (CET)
Received: from localhost (localhost [])
	by mail.sd63.bc.ca (Postfix) with ESMTP id B49202444AF0;
	Thu, 29 Jan 2015 15:27:32 -0800 (PST)
Received: from mail.sd63.bc.ca ([])
	by localhost (mail.sd63.bc.ca []) (amavisd-new, port 10032)
	with ESMTP id Jus8NpyYJWXQ; Thu, 29 Jan 2015 15:27:31 -0800 (PST)
Received: from localhost (localhost [])
	by mail.sd63.bc.ca (Postfix) with ESMTP id AB1822444AE9;
	Thu, 29 Jan 2015 15:27:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at sd63.bc.ca
Received: from mail.sd63.bc.ca ([])
	by localhost (mail.sd63.bc.ca []) (amavisd-new, port 10026)
	with ESMTP id GN7RyYBInRZp; Thu, 29 Jan 2015 15:27:31 -0800 (PST)
Received: from bowmore (bowmore.sbo.sd63.bc.ca [])
	by mail.sd63.bc.ca (Postfix) with SMTP id 7864D2444AF0;
	Thu, 29 Jan 2015 15:27:31 -0800 (PST)
Received: (nullmailer pid 28685 invoked by uid 1000);
	Thu, 29 Jan 2015 23:27:31 -0000
Date: Thu, 29 Jan 2015 15:27:31 -0800
From: Ryan Tandy <rtandy@sd63.bc.ca>
To: 42@bugs.x2go.org, control@bugs.x2go.org
Subject: GNOME session still resizes to 1920x1200 at login
Message-ID: <20150129232731.GF2051@bowmore>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha512;
	protocol="application/pgp-signature"; boundary="veXX9dWIonWZEC6h"
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
[Message part 1 (text/plain, inline)]
unarchive 42
reopen 42
found 42


Sorry to reopen an old bug, but I still experience it with GNOME 
Flashback in Ubuntu 14.04/14.10 and current packages from the X2Go PPA. 
The screen resizes itself to the size configured in monitors.xml, or 
1920x1200 if that is missing, at login.

Please find attached debug logs of unity-settings-daemon and its xrandr 
plugin during lightdm and x2go sessions, for comparison.

Looking at the logs, I am wondering if there is a mismatch between the 
Xinerama and RandR information provided by the server. In one log the 
initial window size (1024x768) seems to be detected properly, while in 
the other, the monitor size (which I think is detected via Xinerama) is 
detected as 1920x1200, which has nothing to do with either the window 
size or my client display size (1920x1080).

I think some of the symptoms from the original report constitute a 
separate bug, that resizing the client window does not (judging from the 
gsd-randr log) generate RandR events in the session. Not sure which 
component that bug would belong to.

Ryan Tandy - Programmer/Analyst                      rtandy@sd63.bc.ca
School District 63 (Saanich)                           +1 250 652 7385
[gsd-debug-randr-lightdm.log (text/plain, attachment)]
[gsd-debug-randr-x2go.log (text/plain, attachment)]
[usd-debug-lightdm.log (text/plain, attachment)]
[usd-debug-x2go.log (text/plain, attachment)]
[signature.asc (application/pgp-signature, inline)]

Send a report that this bug log contains spam.

X2Go Developers <owner@bugs.x2go.org>. Last modified: Tue May 21 07:58:05 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.