-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
override_redirect protection breaks context menus on ultrawide #6518
override_redirect protection breaks context menus on ultrawide #6518
Comments
After a dom0 update this bug appears on my system too. It's super annoying! Basic apps that used to work fine (like Firefox) now crash quite often.
Here's what I see in the
|
Also note that, the warning states:
But at the top of
Can we:
|
This should be filed as a separate issue, as it would be a separate enhancement. |
This bug regularly occurs for me and messes up the NetworkManager's sys-net system tray icon, despite the fact that I should have disabled the
|
Same for me. This issue is making it impossible for me to use most apps, like Firefox, which show context menus / popups. Could someone please state the exact steps to disable this? |
String "false" actually is not a boolean negative value... An empty string is (see
But also, it should not trigger on normal usage, and I never got it for NetworkManager, Firefox or any other similar common applications. Can anyone who is affected set |
Yes sure, I can try to post a debug log in a bit. Thanks a lot for the instructions as well, @marmarek! |
I can reproduce this 100% of the time with the steps in my first post. After disabling gui-override-redirect-protection and triggering the issue, the top right menu completely breaks in Thunderbird:
I have to close and re-open the Thunderbird to recover. |
Thanks, that's exactly the log I needed!
Negative size! It wrapped around into absurdly large window. I guess something went wrong in QubesOS/qubes-gui-daemon#56 |
Is this accurate for your (combined) screen size? if you have external monitor connected, then likely not... |
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Laptop only
Monitor only
Laptop+monitor mirrored
|
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
It is _NET_CURRENT_DESKTOP, not _NET_WM_CURRENT_DESKTOP. Adjust variable name too. QubesOS/qubes-issues#6518
Subscribe to root window's property change events, otherwise gui-daemon won't receive _NET_WORKAREA change events. Update it also after re-reading root window size. QubesOS/qubes-issues#6518
Instead of trying to check for offscreen windows while sanitizing window positions, return early in the case of offscreen windows, and then sanitize x, y, width, height, x + width, and y + height separately. This takes more code, but the new code is much, *much* simpler and easier to understand. Fixes QubesOS/qubes-issues#6518.
We try to be a bit stricter how VM can place its windows, to prevent it obscuring critical UI elements. With dom0 windows, it's directly responsibility of the window manager only, and apparently it knows more accurate definition of allowed areas. |
What does |
Automated announcement from builder-github The package
|
Automated announcement from builder-github The component
Or update dom0 via Qubes Manager. |
Automated announcement from builder-github The component
|
Marking as draft because I am not sure if the call to abort() is justified. Fixes QubesOS/qubes-issues#6518.
Marking as draft because I am not sure if the call to abort() is justified. Fixes QubesOS/qubes-issues#6518.
This issue is being closed because:
If anyone believes that this issue should be reopened, please leave a comment saying so. |
Qubes OS version
Qubes 4.1
Brief summary
When I connect an ultrawide monitor to a laptop, then open a context menu in an application on the far right side of the screen, the overridde_redirect protection triggers and the context menu does not open.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
Context menu opens.
Actual behavior
Context menu flickers and closes. The override_redirect protection popup shows.
Solutions you've tried
Restarting the VM after the screen settings have been changed allows the context menu to behave as expected
Additional context
When opening the context menu, a window opens that extends from the left edge of the screen to the place where the context menu should open, then immediately closes. I wonder if:
I'm not sure how to debug this, but I also don't see how else this bug would trigger.
Related, non-duplicate issues
QubesOS/qubes-gui-daemon#41
#4705
The text was updated successfully, but these errors were encountered: