GNU bug report logs - #77271
[PATCH 1/2] gnu: openbox: Fix alt-tabbing crash

Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.

Package: guix-patches; Reported by: msglm <msglm@HIDDEN>; Keywords: patch; Done: Danny Milosavljevic <dannym@HIDDEN>; Maintainer for guix-patches is guix-patches@HIDDEN.
bug closed, send any further explanations to 77271 <at> debbugs.gnu.org and msglm <msglm@HIDDEN> Request was from Danny Milosavljevic <dannym@HIDDEN> to control <at> debbugs.gnu.org. Full text available.

Message received at 77271 <at> debbugs.gnu.org:


Received: (at 77271) by debbugs.gnu.org; 6 Jun 2025 00:11:02 +0000
From debbugs-submit-bounces <at> debbugs.gnu.org Thu Jun 05 20:11:02 2025
Received: from localhost ([127.0.0.1]:39481 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>)
	id 1uNKfm-0003IG-ES
	for submit <at> debbugs.gnu.org; Thu, 05 Jun 2025 20:11:02 -0400
Received: from chameleon.ash.relay.mailchannels.net ([23.83.222.33]:47859)
 by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.84_2) (envelope-from <dannym@HIDDEN>)
 id 1uNKfk-0003HS-26
 for 77271 <at> debbugs.gnu.org; Thu, 05 Jun 2025 20:11:00 -0400
X-Sender-Id: dreamhost|x-authsender|dannym@HIDDEN
Received: from relay.mailchannels.net (localhost [127.0.0.1])
 by relay.mailchannels.net (Postfix) with ESMTP id 931A18C37AE;
 Fri,  6 Jun 2025 00:10:57 +0000 (UTC)
Received: from pdx1-sub0-mail-a209.dreamhost.com
 (100-117-153-253.trex-nlb.outbound.svc.cluster.local [100.117.153.253])
 (Authenticated sender: dreamhost)
 by relay.mailchannels.net (Postfix) with ESMTPA id 3FD7E8C3FFA;
 Fri,  6 Jun 2025 00:10:57 +0000 (UTC)
ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1749168657; a=rsa-sha256;
 cv=none;
 b=QJaxiMjBFFbrPl6+96jxSBZcZTEmQbBTg7DbcNhsDdGc4Cs9bQ69PsBW6b+Vzzj2FEN+ds
 ThrhiIX2fpDVbkhcrrtzffEss553pjrz2ESiuCj9+JzmLlA4fKqZcb30KuljVvK7g/uhJ3
 6K5AXMZ6NUc7SfYyJH5hQuxD4syRL98035q1cC2x4GPYNg8UkquWmdFfovIpFHNCDoxqzt
 +YDgXMpKQDIlagav8OlEaIusR00Pf6ElNTadTU5WSn7U4D051ua57cRwkl9U+zcZAOqJMI
 gChNCBvYO3zVI4WrXhzGkWTR1f5B6JF5KgNyDnoQlNEO4LMzs4gy7BPcxPqdXQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed;
 d=mailchannels.net; s=arc-2022; t=1749168657;
 h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
 dkim-signature; bh=UylNBu8ZbFjTvxXADe9LWk8zPVz+pBLrERHNyv2uwtQ=;
 b=Co9t9+imOnNagMQGXu8WTFcoXGPlAJoUX35AODy6C8L+sJoTI31bOwnL6QcanUU1NpPtJz
 IT8lCLGz4Y6ijoKpAF8fLfOyG4oHO4W4dl2kfd5R7pXF3f0mNap7SaPRp/VNMhfOaaK1CD
 X0AP1HE3XHdkq6cNo1pVeG1ESsi64G4VgBVNDByFAgbe7QNXIp39F4ZLY8Cve1A37uzXHz
 QvzsUU74KxZlDU+IjpiaprmLjnmsAiKTZjbmj9PJL/O4Pt/dvLa3CxAqP5kTnN+WesAw7h
 sFc4x53Z9nRgLCmkqYqwCBZasQSAGX+qpPvx5CPfcXe/+0kipqpOGKb6fyAgxA==
ARC-Authentication-Results: i=1; rspamd-5674bcf875-l8nxc;
 auth=pass smtp.auth=dreamhost smtp.mailfrom=dannym@HIDDEN
X-Sender-Id: dreamhost|x-authsender|dannym@HIDDEN
X-MC-Relay: Bad
X-MailChannels-SenderId: dreamhost|x-authsender|dannym@HIDDEN
X-MailChannels-Auth-Id: dreamhost
X-Abiding-Bubble: 7bf0413e7ab03161_1749168657316_3966770741
X-MC-Loop-Signature: 1749168657316:362953544
X-MC-Ingress-Time: 1749168657316
Received: from pdx1-sub0-mail-a209.dreamhost.com (pop.dreamhost.com
 [64.90.62.162]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384)
 by 100.117.153.253 (trex/7.0.3); Fri, 06 Jun 2025 00:10:57 +0000
Received: from nova (84-115-226-251.cable.dynamic.surfer.at [84.115.226.251])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest
 SHA256) (No client certificate requested)
 (Authenticated sender: dannym@HIDDEN)
 by pdx1-sub0-mail-a209.dreamhost.com (Postfix) with ESMTPSA id 4bD1tm0nnkzMP; 
 Thu,  5 Jun 2025 17:10:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=friendly-machines.com; s=dreamhost; t=1749168657;
 bh=UylNBu8ZbFjTvxXADe9LWk8zPVz+pBLrERHNyv2uwtQ=;
 h=From:To:Cc:Subject:Date:Content-Type;
 b=xvt8sz76rO4yg9lbz02lDQcFqPX2GmihP5eBmfEepHYKWs6UBA5Fejr9wiZ7wTqin
 u8iiwCshpAWuXdoLc6lyHJ6noYNZx/YKlBD4i01SHm+IYZFFre9vZsVHYQxC91RgDD
 u2vhJ0N0+p0ldZhCCn3sVaKZ1AEZsWqqZzttpead+YlgPCq+84yfPlwqDHJOSPPNWz
 5IzsK0jcHpaKI2jzCmHrSSn7bFpl2olMlQFprQA9EOGvb3tGzKgHuEp88pBEbQgSa7
 lCg9N0Fv+RxKfj3s+JR5um+Z/MFvP+qNfND+c5Nfng4UdF4BKRlCDzIlB1A8TTQ2k+
 g3kplowC9Lf9g==
From: Danny Milosavljevic <dannym@HIDDEN>
To: msglm <msglm@HIDDEN>
Subject: Re: [bug#77271] [PATCH 1/2] gnu: openbox: Fix alt-tabbing crash
User-Agent: mu4e 1.12.11; emacs 29.4
Date: Fri, 06 Jun 2025 02:10:52 +0200
Message-ID: <87ikl93f1v.fsf@HIDDEN>
MIME-Version: 1.0
Content-Type: text/plain
X-Spam-Score: 3.6 (+++)
X-Spam-Report: Spam detection software, running on the system "debbugs.gnu.org",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 the administrator of that system for details.
 Content preview: Thanks! Pushed to guix master as commit
 60e332adae600e230efb76e4027b764e3ae2c7dc.
 Content analysis details:   (3.6 points, 10.0 required)
 pts rule name              description
 ---- ---------------------- --------------------------------------------------
 0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The
 query to Validity was blocked.  See
 https://knowledge.validity.com/hc/en-us/articles/20961730681243
 for more information.
 [23.83.222.33 listed in sa-trusted.bondedsender.org]
 0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The
 query to Validity was blocked.  See
 https://knowledge.validity.com/hc/en-us/articles/20961730681243
 for more information.
 [23.83.222.33 listed in bl.score.senderscore.com]
 -0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at https://www.dnswl.org/,
 no trust [23.83.222.33 listed in list.dnswl.org]
 3.6 RCVD_IN_SBL_CSS        RBL: Received via a relay in Spamhaus SBL-CSS
 [84.115.226.251 listed in zen.spamhaus.org]
 -0.0 SPF_PASS               SPF: sender matches SPF record
 0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record
X-Debbugs-Envelope-To: 77271
Cc: 77271 <at> debbugs.gnu.org
X-BeenThere: debbugs-submit <at> debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
X-Spam-Score: 2.6 (++)
X-Spam-Report: Spam detection software, running on the system "debbugs.gnu.org",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 the administrator of that system for details.
 
 Content preview:  Thanks! Pushed to guix master as commit 60e332adae600e230efb76e4027b764e3ae2c7dc.
    
 
 Content analysis details:   (2.6 points, 10.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
 -0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at https://www.dnswl.org/,
                              no trust
                             [23.83.222.33 listed in list.dnswl.org]
  0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                           [23.83.222.33 listed in sa-trusted.bondedsender.org]
  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [23.83.222.33 listed in bl.score.senderscore.com]
  3.6 RCVD_IN_SBL_CSS        RBL: Received via a relay in Spamhaus SBL-CSS
                             [84.115.226.251 listed in zen.spamhaus.org]
 -0.0 SPF_PASS               SPF: sender matches SPF record
  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record
 -1.0 MAILING_LIST_MULTI     Multiple indicators imply a widely-seen list
                             manager

Thanks!

Pushed to guix master as commit 60e332adae600e230efb76e4027b764e3ae2c7dc.




Information forwarded to guix-patches@HIDDEN:
bug#77271; Package guix-patches. Full text available.

Message received at submit <at> debbugs.gnu.org:


Received: (at submit) by debbugs.gnu.org; 26 Mar 2025 08:04:51 +0000
From debbugs-submit-bounces <at> debbugs.gnu.org Wed Mar 26 04:04:51 2025
Received: from localhost ([127.0.0.1]:41161 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>)
	id 1txLko-0003fv-NN
	for submit <at> debbugs.gnu.org; Wed, 26 Mar 2025 04:04:51 -0400
Received: from lists.gnu.org ([2001:470:142::17]:58760)
 by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.84_2) (envelope-from <msglm@HIDDEN>)
 id 1txLkm-0003fa-9q
 for submit <at> debbugs.gnu.org; Wed, 26 Mar 2025 04:04:49 -0400
Received: from eggs.gnu.org ([2001:470:142:3::10])
 by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <msglm@HIDDEN>)
 id 1txLkg-0007Rj-TI
 for guix-patches@HIDDEN; Wed, 26 Mar 2025 04:04:42 -0400
Received: from techchud.xyz ([2001:19f0:6401:770:5400:3ff:feee:3207]
 helo=mail.techchud.xyz)
 by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <msglm@HIDDEN>)
 id 1txLke-0007Ua-T4
 for guix-patches@HIDDEN; Wed, 26 Mar 2025 04:04:42 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=techchud.xyz; s=mail;
 t=1742976275; bh=8vjJiK3YkX2Uw5Tc5d8fiskLfnf6BaU8tr2OIbcdw8w=;
 h=From:To:Cc:Subject:Date:From;
 b=d/+CbpFbunjL47LulIF1oH2L5ii1xNa0wwPg4CrEoKe4oS8rZ6QaOftEhE23LavxN
 XOJv5Zouox3J+hOGLvcEyhkgeIbEbDRbp/3Bkoir6JCNYFPMid8w1xVwbkM/knP8n0
 UQxuN1wrRhJk/pfX3bqU4UB9gt45xqOeFaFsrglB3ngGboA57KLgvSgJOX1rw3d740
 OT3v8PD3TvE0y+Xg5tQRvDwLv9xcMCBKZnfFoyS+Vh079Gt3bLF6pCSWaXyZab770b
 Hs0FxtY4mgqILYfi9UeMwVtG7UkTU/pzNUgRnypb3B1ao5a41p9bA9cNciUuouxJ3F
 OZVIaquce7e5Q==
From: msglm <msglm@HIDDEN>
To: guix-patches@HIDDEN
Subject: [PATCH 1/2] gnu: openbox: Fix alt-tabbing crash
Date: Wed, 26 Mar 2025 03:03:27 -0500
Message-ID: <9d96f0a2d095e74f1a4bf0ef1d8f60138810321d.1742976208.git.msglm@HIDDEN>
X-Mailer: git-send-email 2.48.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Received-SPF: pass client-ip=2001:19f0:6401:770:5400:3ff:feee:3207;
 envelope-from=msglm@HIDDEN; helo=mail.techchud.xyz
X-Spam_score_int: 16
X-Spam_score: 1.6
X-Spam_bar: +
X-Spam_report: (1.6 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_SUSPICIOUS_NTLD=0.499,
 FROM_SUSPICIOUS_NTLD_FP=1.179, PDS_OTHER_BAD_TLD=1.999, SPF_HELO_NONE=0.001,
 SPF_PASS=-0.001 autolearn=no autolearn_force=no
X-Spam_action: no action
X-Spam-Score: 4.6 (++++)
X-Spam-Report: Spam detection software, running on the system "debbugs.gnu.org",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 the administrator of that system for details.
 Content preview: Add patch to fix crashing when full screening and
 alt-tabbing. Patch harvested from:
 https://bugs.archlinux.org/attachments/77853/22501/0001-add-fix-for-glib2-exposed-segfault.patch
 * gnu/packages/openbox.scm (openbox): New patch *
 gnu/packages/patches/openbox-add-fix-for-glib2-exposed-segfault.patch:
 New File 
 Content analysis details:   (4.6 points, 10.0 required)
 pts rule name              description
 ---- ---------------------- --------------------------------------------------
 -0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at https://www.dnswl.org/,
 no trust [2001:470:142:0:0:0:0:17 listed in] [list.dnswl.org]
 2.0 PDS_OTHER_BAD_TLD      Untrustworthy TLDs
 [URI: techchud.xyz (xyz)]
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
 0.9 SPF_FAIL               SPF: sender does not match SPF record (fail)
 [SPF failed: Please see http://www.openspf.org/Why?s=mfrom;
 id=msglm%40techchud.xyz; ip=2001%3A470%3A142%3A%3A17; r=debbugs.gnu.org]
 1.2 FROM_SUSPICIOUS_NTLD_FP From abused NTLD
 0.5 FROM_SUSPICIOUS_NTLD   From abused NTLD
X-Debbugs-Envelope-To: submit
Cc: msglm <msglm@HIDDEN>
X-BeenThere: debbugs-submit <at> debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
X-Spam-Score: 2.4 (++)
X-Spam-Report: Spam detection software, running on the system "debbugs.gnu.org",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 the administrator of that system for details.
 
 Content preview:  Add patch to fix crashing when full screening and alt-tabbing.
    Patch harvested from: https://bugs.archlinux.org/attachments/77853/22501/0001-add-fix-for-glib2-exposed-segfault.patch
    * gnu/packages/openbox.scm (openbox): New patch * gnu/packages/patches/openbox-add-fix-for-glib2-exposed-segfault.patch:
    New File 
 
 Content analysis details:   (2.4 points, 10.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
 -0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at https://www.dnswl.org/,
                              no trust
                             [2001:470:142:0:0:0:0:17 listed in]
                             [list.dnswl.org]
  2.0 PDS_OTHER_BAD_TLD      Untrustworthy TLDs
                             [URI: techchud.xyz (xyz)]
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
  0.9 SPF_FAIL               SPF: sender does not match SPF record (fail)
 [SPF failed: Please see http://www.openspf.org/Why?s=mfrom;id=msglm%40techchud.xyz;ip=2001%3A470%3A142%3A%3A17;r=debbugs.gnu.org]
  0.5 FROM_SUSPICIOUS_NTLD   From abused NTLD
 -1.0 MAILING_LIST_MULTI     Multiple indicators imply a widely-seen list
                             manager

Add patch to fix crashing when full screening and alt-tabbing.
Patch harvested from:
https://bugs.archlinux.org/attachments/77853/22501/0001-add-fix-for-glib2-exposed-segfault.patch

* gnu/packages/openbox.scm (openbox): New patch
* gnu/packages/patches/openbox-add-fix-for-glib2-exposed-segfault.patch: New File

Change-Id: I593b50bf14bdbeb300ea545ab9efe184651112fb
---
 gnu/packages/openbox.scm                      |  2 +-
 ...x-add-fix-for-glib2-exposed-segfault.patch | 50 +++++++++++++++++++
 2 files changed, 51 insertions(+), 1 deletion(-)
 create mode 100644 gnu/packages/patches/openbox-add-fix-for-glib2-exposed-segfault.patch

diff --git a/gnu/packages/openbox.scm b/gnu/packages/openbox.scm
index 38afb9d9a0..85c3bda958 100644
--- a/gnu/packages/openbox.scm
+++ b/gnu/packages/openbox.scm
@@ -51,7 +51,7 @@ (define-public openbox
               (sha256
                (base32
                 "0vg2y1qddsdxkjv806mzpvmkgzliab8ll4s7zm7ma5jnriamirxb"))
-              (patches (search-patches "openbox-python3.patch"))))
+              (patches (search-patches "openbox-add-fix-for-glib2-exposed-segfault.patch" "openbox-python3.patch"))))
     (build-system gnu-build-system)
     (arguments
      (list #:phases
diff --git a/gnu/packages/patches/openbox-add-fix-for-glib2-exposed-segfault.patch b/gnu/packages/patches/openbox-add-fix-for-glib2-exposed-segfault.patch
new file mode 100644
index 0000000000..ef68d31213
--- /dev/null
+++ b/gnu/packages/patches/openbox-add-fix-for-glib2-exposed-segfault.patch
@@ -0,0 +1,50 @@
+From 9ed6fdd71890c5cc43747f105382d5677e5d37e7 Mon Sep 17 00:00:00 2001
+From: pldubouilh <pldubouilh@HIDDEN>
+Date: Fri, 17 Mar 2023 18:23:47 +0100
+Subject: [PATCH] Fix list traversal issue in client_calc_layer
+
+The calls to client_calc_layer_internal can modify stacking_list, which
+can cause us to follow dangling ->next pointers (either by the pointer
+itself already being freed, or it pointing to a freed area). Avoid this
+by copying the list first, the goal is to visit every client in the list
+once so this should be fine.
+---
+ openbox/client.c | 9 +++++++--
+ 1 file changed, 7 insertions(+), 2 deletions(-)
+
+diff --git a/openbox/client.c b/openbox/client.c
+index 7168b2407..b8264587c 100644
+--- a/openbox/client.c
++++ b/openbox/client.c
+@@ -2742,9 +2742,12 @@ static void client_calc_layer_internal(ObClient *self)
+ void client_calc_layer(ObClient *self)
+ {
+     GList *it;
++    /* the client_calc_layer_internal calls below modify stacking_list,
++       so we have to make a copy to iterate over */
++    GList *list = g_list_copy(stacking_list);
+ 
+     /* skip over stuff above fullscreen layer */
+-    for (it = stacking_list; it; it = g_list_next(it))
++    for (it = list; it; it = g_list_next(it))
+         if (window_layer(it->data) <= OB_STACKING_LAYER_FULLSCREEN) break;
+ 
+     /* find the windows in the fullscreen layer, and mark them not-visited */
+@@ -2757,7 +2760,7 @@ void client_calc_layer(ObClient *self)
+     client_calc_layer_internal(self);
+ 
+     /* skip over stuff above fullscreen layer */
+-    for (it = stacking_list; it; it = g_list_next(it))
++    for (it = list; it; it = g_list_next(it))
+         if (window_layer(it->data) <= OB_STACKING_LAYER_FULLSCREEN) break;
+ 
+     /* now recalc any windows in the fullscreen layer which have not
+@@ -2768,6 +2771,8 @@ void client_calc_layer(ObClient *self)
+                  !WINDOW_AS_CLIENT(it->data)->visited)
+             client_calc_layer_internal(it->data);
+     }
++
++    g_list_free(it);
+ }
+ 
+ gboolean client_should_show(ObClient *self)

base-commit: 4d655e48836d5be89942a38da532431316f6887b
-- 
2.48.1





Acknowledgement sent to msglm <msglm@HIDDEN>:
New bug report received and forwarded. Copy sent to guix-patches@HIDDEN. Full text available.
Report forwarded to guix-patches@HIDDEN:
bug#77271; Package guix-patches. Full text available.
Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.
Last modified: Fri, 6 Jun 2025 00:15:02 UTC

GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.