Skip to content

add known issues to gui-domain docs #1440

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 15, 2025
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 22 additions & 6 deletions user/advanced-topics/gui-domain.md
Original file line number Diff line number Diff line change
Expand Up @@ -120,13 +120,33 @@ A VNC server session is running on `localhost:5900` in `sys-gui-vnc`. In order t
> **WARNING**: This setup raises multiple security issues: 1) Anyone who can reach the `VNC` server, can take over the control of the Qubes OS machine, 2) A second client can connect even if a connection is already active and potentially get disconnected, 3) You can get disconnected by some unrelated network issues. Generally, if this `VNC` server is exposed to open network, it must be protected with some other (cryptographic) layer like `VPN`. The setup as is, is useful only for purely testing machine.


### Troubleshooting
### Known issues

#### Application menu lacks qubes entries in a fresh GUI domain

See [QubesOS/qubes-issues#5804](https://github.com/QubesOS/qubes-issues/issues/5804)

#### Delete GUI domain
#### Cannot update dom0 from sys-gui

See [QubesOS/qubes-issues#8934](https://github.com/QubesOS/qubes-issues/issues/8934)

#### GUI of HVM qubes not visible

See [QubesOS/qubes-issues#9385](https://github.com/QubesOS/qubes-issues/issues/9385)

### Power saving/screensaver issues

See [QubesOS/qubes-issues#9033](https://github.com/QubesOS/qubes-issues/issues/9033), [QubesOS/qubes-issues#9384](https://github.com/QubesOS/qubes-issues/issues/9384), [QubesOS/qubes-issues#7989](https://github.com/QubesOS/qubes-issues/issues/7989)

#### Qube startup order (sys-usb and sys-gui)

See [QubesOS/qubes-issues#7954](https://github.com/QubesOS/qubes-issues/issues/7954)

#### Other GUI domain issues

see existing issues `QubesOS/qubes-issues` under [C: gui-domain](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+label%3A%22C%3A+gui-domain%22) label.

### Reverting sys-gui

The following commands have to be run in `dom0`.

Expand All @@ -149,7 +169,3 @@ You are now able to delete the GUI domain, for example `sys-gui-gpu`:
```bash
qvm-remove -f sys-gui-gpu
```

#### General issues

For any general GUI domain issues, please take a loot at existing issues `QubesOS/qubes-issues` under [C: gui-domain](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+label%3A%22C%3A+gui-domain%22) label.