Hi,
I'm in contact with some people reporting here: https://github.com/ibus/ibus/issues/2588 They report it's fixing their issue. I've tested myself and it seems ok to me too.
Best regards
Still broken with Davinci Resolve as was 6.6.2 https://bugzilla.redhat.com/show_bug.cgi?id=2252130
This fix an issue with Davinci Resolve: not being able to use video medias.
Log from Davinci Resolve: 0x7fc84edf06c0 | DVIP | ERROR | 2023-06-03 00:19:22,637 | Failed to create OpenCL context:
DVIP Exception: OpenCL error - API: OpenCL - API Error Code: CL_OUT_OF_HOST_MEMORY (-6)
Works as expect. Do not crash anymore at startup (from the previous version)
Using Fedora 35, works here (Steam + proton + gamemoderun %command%) Thank you!
ty @hreindl, $ sudo dracut -f fixed the issue. Why is this command not part of the install process of microcode_ctl?
I reported my issue as a bug here: https://bugzilla.redhat.com/show_bug.cgi?id=1616433
Hi, The upgrade does not work here. I suspect a bug somewhere...
$ sudo dnf list installed | grep microcode microcode_ctl.x86_64 2:2.1-26.fc28 @updates-testing $ dmesg | grep microcode [ 0.520184] microcode: sig=0x306c3, pf=0x2, revision=0x24 [ 0.520453] microcode: Microcode Update Driver: v2.2. $ lscpu | grep Intel Identifiant constructeur : GenuineIntel Nom de modèle : Intel(R) Core(TM) i7-4790K CPU @ 4.00GHz
According to upstream documentation here: https://downloadcenter.intel.com/download/28039/Linux-Processor-Microcode-Data-File == 20180807 Release == ../.. ---- updated platforms ------------------------------------ ../.. HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024->00000025 Core Gen4 Desktop; Xeon E3 v3
It should be "revision=0x25" but it is "24".
The checker script found here : https://github.com/speed47/spectre-meltdown-checker reports: Spectre and Meltdown mitigation detection tool v0.39+ ../.. * CPU microcode is the latest known available version: NO (you have version 0x24 and latest known version is 0x25) ../.. CVE-2018-3640 [rogue system register read] aka 'Variant 3a' * CPU microcode mitigates the vulnerability: NO
STATUS: VULNERABLE (an up-to-date CPU microcode is needed to mitigate this vulnerability)
CVE-2018-3639 [speculative store bypass] aka 'Variant 4' * Mitigated according to the /sys interface: NO (Vulnerable) * Kernel supports speculation store bypass: YES (found in /proc/self/status)
STATUS: VULNERABLE (Your CPU doesn't support SSBD)
IMHO the new microcode is not applied by the kernel for some reason.
Tested glycin-loaders-1.0.1-6.fc40, with images from https://openexr.com/en/latest/test_images/index.html . Some works, some are displayed wrong (e.g. : https://raw.githubusercontent.com/AcademySoftwareFoundation/openexr-images/main/ScanLines/Blobbies.jpg or https://openexr.com/en/latest/test_images/ScanLines/CandleGlass.html ). Or a feature of the format is not supported yet "channel subsampling not supported yet" https://openexr.com/en/latest/test_images/Chromaticities/Rec709_YC.html .
Thank you.