Source: qt6-base Version: 6.8.2+dfsg-6 Severity: minor Tags: upstream X-Debbugs-Cc: a.t.chadwick+report...@gmail.com
Dear friendly Qt devs at Debian: Users coming from older Qt-using environments to KDE Plasma (like me), and perhaps fresh useru accounts, may have set the QT_SCALE_FACTOR_ROUNDING_POLICY environment variable to one of its permitted values[1] to control when and how Qt6 applies fractional scaling in a semi-high DPI environment. If they do so, they will see a spurious error message from any Qt app at startup, regardless of the value QT_SCALE_FACTOR_ROUNDING_POLICY is set to (it just needs to be set, including to an empty string): > $ pcmanfm-qt / > setHighDpiScaleFactorRoundingPolicy must be called before creating the > QGuiApplication instance > [...] There is an upstream bug about this message, and a fix has been merged for 6.10.0. Is there any chance of a backport to Debian 13 trixie? * https://bugreports.qt.io/browse/QTBUG-132430 * https://codereview.qt-project.org/c/qt/qtbase/+/631734 I'm using a Plasma on Wayland session under sddm, the standard Breeze themes, and my everyday QT environment variables are set thus: > $ env | grep QT > QT_ACCESSIBILITY=1 > QT_WAYLAND_RECONNECT=1 > QT_SCALE_FACTOR_ROUNDING_POLICY=Round > QT_AUTO_SCREEN_SCALE_FACTOR=0 I'm running a Wayland display at 150% scaling. I don't think I'm doing anything particularly weird with this setup, although I could probably drop a couple of historical environment settings now. cheers, Andrew [1] "Supported values are: Round, Ceil, Floor, RoundPreferFloor, PassThrough." -- System Information: Debian Release: trixie/sid APT prefers testing APT policy: (900, 'testing'), (5, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 6.11.2-amd64 (SMP w/20 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled