News: 0001526202

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Mesa 25.0-rc3 Released With Numerous RADV & RadeonSI Fixes

([Mesa] 5 Hours Ago Mesa 25.0-rc3)


Mesa 25.0-rc3 is out today as a rather large weekly release candidate to [1]Mesa 25.0 that will be debuting as stable later this month.

Of the dozens of fixes in this week's Mesa 25.0-rc3, the RadeonSI and RADV drivers lead with the number of changes. Among the AMD Radeon driver changes are fixing AV1 film grain for VCN5 hardware, fixing error reporting for VkExternalMemoryTypeFlagBitsKHR, fixing GravityMark corruption for RadeonSI with the ACO back-end, fixing caching of on-demand meta shaders in RADV, and other fixes.

Mesa 25.0-rc3 also has a fix for scissor bounds on NVK, a 32-bit build crash fix for the Raspberry Pi V3DV Vulkan driver, the Intel ANV driver adding a sampler coordinate precision workaround for Dynasty Warriors, and other fixes.

Downloads and more details on the changes in Mesa 25.0-rc3 via the [2]release announcement . See [3]this earlier article for more details on the feature changes for the Mesa 25.0 quarterly feature release.

As of writing there are no open blocker bugs so things look good for seeing Mesa 25.0 debut next Wednesday or otherwise the following week if any last minute issues surface for these open-source OpenGL and Vulkan drivers.



[1] https://www.phoronix.com/search/Mesa+25.0

[2] https://lists.freedesktop.org/archives/mesa-dev/2025-February/226463.html

[3] https://www.phoronix.com/news/Mesa-25.0-rc1



JEBjames

shmerl

Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...