hotfix: intel CPU Hardware decoding

This commit is contained in:
KaitoTLex 2025-03-07 12:18:43 -08:00
parent 01927022a9
commit 60d3c9041f
No known key found for this signature in database
GPG key ID: C5F52A3C0F3B4A77
4 changed files with 201 additions and 62 deletions

192
flake.lock generated
View file

@ -70,44 +70,45 @@
"base16-vim": { "base16-vim": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1735953590, "lastModified": 1732806396,
"narHash": "sha256-YbQwaApLFJobn/0lbpMKcJ8N5axKlW2QIGkDS5+xoSU=", "narHash": "sha256-e0bpPySdJf0F68Ndanwm+KWHgQiZ0s7liLhvJSWDNsA=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-vim", "repo": "base16-vim",
"rev": "c2a1232aa2c0ed27dcbf005779bcfe0e0ab5e85d", "rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "base16-vim", "repo": "base16-vim",
"rev": "577fe8125d74ff456cf942c733a85d769afe58b7",
"type": "github" "type": "github"
} }
}, },
"cpu-microcodes": { "cpu-microcodes": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1737223256, "lastModified": 1740920267,
"narHash": "sha256-aETUoryCkJSRWlxbgL8im40+2FfOm0u4X9aP5aZueME=", "narHash": "sha256-OzItboxMQdjBZGYgggTeUMlKD3u5egpQxs2zLZ+IPmM=",
"owner": "platomav", "owner": "platomav",
"repo": "CPUMicrocodes", "repo": "CPUMicrocodes",
"rev": "984b766433e99c7e945b5cc17519bb088084b3fd", "rev": "f22581017de2d0a67b9fb4109ea04b5fda649966",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "platomav", "owner": "platomav",
"repo": "CPUMicrocodes", "repo": "CPUMicrocodes",
"rev": "984b766433e99c7e945b5cc17519bb088084b3fd", "rev": "f22581017de2d0a67b9fb4109ea04b5fda649966",
"type": "github" "type": "github"
} }
}, },
"firefox-gnome-theme": { "firefox-gnome-theme": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1736899990, "lastModified": 1739223196,
"narHash": "sha256-S79Hqn2EtSxU4kp99t8tRschSifWD4p/51++0xNWUxw=", "narHash": "sha256-vAxN2f3rvl5q62gQQjZGVSvF93nAsOxntuFz+e/655w=",
"owner": "rafaelmardojai", "owner": "rafaelmardojai",
"repo": "firefox-gnome-theme", "repo": "firefox-gnome-theme",
"rev": "91ca1f82d717b02ceb03a3f423cbe8082ebbb26d", "rev": "a89108e6272426f4eddd93ba17d0ea101c34fb21",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -117,7 +118,6 @@
} }
}, },
"flake-compat": { "flake-compat": {
"flake": false,
"locked": { "locked": {
"lastModified": 1733328505, "lastModified": 1733328505,
"narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=", "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=",
@ -132,19 +132,25 @@
"type": "github" "type": "github"
} }
}, },
"flake-compat_2": { "flake-parts": {
"flake": false, "inputs": {
"nixpkgs-lib": [
"stylix",
"nur",
"nixpkgs"
]
},
"locked": { "locked": {
"lastModified": 1733328505, "lastModified": 1733312601,
"narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=", "narHash": "sha256-4pDvzqnegAfRkPwO3wmwBhVi/Sye1mzps0zHWYnP88c=",
"owner": "edolstra", "owner": "hercules-ci",
"repo": "flake-compat", "repo": "flake-parts",
"rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec", "rev": "205b12d8b7cd4802fbcb8e8ef6a0f1408781a4f9",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "edolstra", "owner": "hercules-ci",
"repo": "flake-compat", "repo": "flake-parts",
"type": "github" "type": "github"
} }
}, },
@ -198,11 +204,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1735882644, "lastModified": 1737465171,
"narHash": "sha256-3FZAG+pGt3OElQjesCAWeMkQ7C/nB1oTHLRQ8ceP110=", "narHash": "sha256-R10v2hoJRLq8jcL4syVFag7nIGE7m13qO48wRIukWNg=",
"owner": "cachix", "owner": "cachix",
"repo": "git-hooks.nix", "repo": "git-hooks.nix",
"rev": "a5a961387e75ae44cc20f0a57ae463da5e959656", "rev": "9364dc02281ce2d37a1f55b6e51f7c0f65a75f17",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -257,11 +263,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1737188535, "lastModified": 1741217763,
"narHash": "sha256-O2ttwW1/dUc/Y+Rf48Njtr4tZpRJhy8FhafikekIjMY=", "narHash": "sha256-g/TrltIjFHIjtzKY5CJpoPANfHQWDD43G5U1a/v5oVg=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "1e36429705f9af2d00a517ba46a4f21ef8a8194f", "rev": "486b066025dccd8af7fbe5dd2cc79e46b88c80da",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -278,11 +284,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1736785676, "lastModified": 1740347597,
"narHash": "sha256-TY0jUwR3EW0fnS0X5wXMAVy6h4Z7Y6a3m+Yq++C9AyE=", "narHash": "sha256-st5q9egkPGz8TUcVVlIQX7y6G3AzHob+6M963bwVq74=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "fc52a210b60f2f52c74eac41a8647c1573d2071d", "rev": "12e26a74e5eb1a31e13daaa08858689e25ebd449",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -308,11 +314,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1737062831, "lastModified": 1741246872,
"narHash": "sha256-Tbk1MZbtV2s5aG+iM99U8FqwxU/YNArMcWAv6clcsBc=", "narHash": "sha256-Q6pMP4a9ed636qilcYX8XUguvKl/0/LGXhHcRI91p0U=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5df43628fdf08d642be8ba5b3625a6c70731c19c", "rev": "10069ef4cf863633f57238f179a0297de84bd8d3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -332,11 +338,11 @@
"plugins-pomo-nvim": "plugins-pomo-nvim" "plugins-pomo-nvim": "plugins-pomo-nvim"
}, },
"locked": { "locked": {
"lastModified": 1737164379, "lastModified": 1741330840,
"narHash": "sha256-/lERZhJCq+eXPUENu0a8MwVbO8CMMn2ooej3l3+jc1U=", "narHash": "sha256-wFdRuxHa2S+ThnISL/YRfNgHMgRH/4xCWxVzgYGDUS8=",
"owner": "kaitotlex", "owner": "kaitotlex",
"repo": "vix1", "repo": "vix1",
"rev": "30506bcd245c0d44d8cfcda446ff7abb2b12ae1f", "rev": "32526e16993656421d44d14222b559ca80849c96",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -345,6 +351,29 @@
"type": "github" "type": "github"
} }
}, },
"nur": {
"inputs": {
"flake-parts": "flake-parts",
"nixpkgs": [
"stylix",
"nixpkgs"
],
"treefmt-nix": "treefmt-nix"
},
"locked": {
"lastModified": 1740408283,
"narHash": "sha256-2xECnhgF3MU9YjmvOkrRp8wRFo2OjjewgCtlfckhL5s=",
"owner": "nix-community",
"repo": "NUR",
"rev": "496a4a11162bdffb9a7b258942de138873f019f7",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "NUR",
"type": "github"
}
},
"plugins-blink-ripgrep": { "plugins-blink-ripgrep": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -392,17 +421,17 @@
}, },
"spicetify": { "spicetify": {
"inputs": { "inputs": {
"flake-compat": "flake-compat",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
] ],
"systems": "systems"
}, },
"locked": { "locked": {
"lastModified": 1737173687, "lastModified": 1740889006,
"narHash": "sha256-+WxaXc30KhTuCa9U8Nv2mJApIBq85CfA5fbcVsvdfxo=", "narHash": "sha256-A1iyKVvZrLdLwqWPC9OvPjC85ADQn2R1EGfCzJBl+wI=",
"owner": "Gerg-L", "owner": "Gerg-L",
"repo": "spicetify-nix", "repo": "spicetify-nix",
"rev": "c68c2ac0814ab386d2cbd3b9178e729b4fc805f0", "rev": "f8d3757d4ae3af2175a631fb9598a42d30ee75fc",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -418,7 +447,7 @@
"base16-helix": "base16-helix", "base16-helix": "base16-helix",
"base16-vim": "base16-vim", "base16-vim": "base16-vim",
"firefox-gnome-theme": "firefox-gnome-theme", "firefox-gnome-theme": "firefox-gnome-theme",
"flake-compat": "flake-compat_2", "flake-compat": "flake-compat",
"flake-utils": "flake-utils", "flake-utils": "flake-utils",
"git-hooks": "git-hooks", "git-hooks": "git-hooks",
"gnome-shell": "gnome-shell", "gnome-shell": "gnome-shell",
@ -426,18 +455,20 @@
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
], ],
"systems": "systems", "nur": "nur",
"systems": "systems_2",
"tinted-foot": "tinted-foot", "tinted-foot": "tinted-foot",
"tinted-kitty": "tinted-kitty", "tinted-kitty": "tinted-kitty",
"tinted-schemes": "tinted-schemes",
"tinted-tmux": "tinted-tmux", "tinted-tmux": "tinted-tmux",
"tinted-zed": "tinted-zed" "tinted-zed": "tinted-zed"
}, },
"locked": { "locked": {
"lastModified": 1737207873, "lastModified": 1741112087,
"narHash": "sha256-XTCuMv753lpm8DvdVf9q2mH3rhlfsKrCUYbaADPC/bA=", "narHash": "sha256-dBGwN4aHmX2QUXolZDhV+p06+WM5ZykL4wd9BD6bT7k=",
"owner": "danth", "owner": "danth",
"repo": "stylix", "repo": "stylix",
"rev": "51ad2cec11e773a949bdbec88bed2524f098f49a", "rev": "11780517948f214b9f93d1bf5a2d29bc181d3a33",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -461,6 +492,21 @@
"type": "github" "type": "github"
} }
}, },
"systems_2": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"tinted-foot": { "tinted-foot": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -495,14 +541,30 @@
"type": "github" "type": "github"
} }
}, },
"tinted-schemes": {
"flake": false,
"locked": {
"lastModified": 1740351358,
"narHash": "sha256-Hdk850xgAd3DL8KX0AbyU7tC834d3Lej1jOo3duWiOA=",
"owner": "tinted-theming",
"repo": "schemes",
"rev": "a1bc2bd89e693e7e3f5764cfe8114e2ae150e184",
"type": "github"
},
"original": {
"owner": "tinted-theming",
"repo": "schemes",
"type": "github"
}
},
"tinted-tmux": { "tinted-tmux": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1735737224, "lastModified": 1740272597,
"narHash": "sha256-FO2hRBkZsjlIRqzNHCPc/52yxg11kHGA8MEtSun9RwE=", "narHash": "sha256-/etfUV3HzAaLW3RSJVwUaW8ULbMn3v6wbTlXSKbcoWQ=",
"owner": "tinted-theming", "owner": "tinted-theming",
"repo": "tinted-tmux", "repo": "tinted-tmux",
"rev": "aead506a9930c717ebf81cc83a2126e9ca08fa64", "rev": "b6c7f46c8718cc484f2db8b485b06e2a98304cd0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -527,16 +589,38 @@
"type": "github" "type": "github"
} }
}, },
"treefmt-nix": {
"inputs": {
"nixpkgs": [
"stylix",
"nur",
"nixpkgs"
]
},
"locked": {
"lastModified": 1733222881,
"narHash": "sha256-JIPcz1PrpXUCbaccEnrcUS8jjEb/1vJbZz5KkobyFdM=",
"owner": "numtide",
"repo": "treefmt-nix",
"rev": "49717b5af6f80172275d47a418c9719a31a78b53",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "treefmt-nix",
"type": "github"
}
},
"ucodenix": { "ucodenix": {
"inputs": { "inputs": {
"cpu-microcodes": "cpu-microcodes" "cpu-microcodes": "cpu-microcodes"
}, },
"locked": { "locked": {
"lastModified": 1737386190, "lastModified": 1741024244,
"narHash": "sha256-r9UOn9nMqDjY+ohnNCKs8SgN55UXTPI+RWhka2RcsXY=", "narHash": "sha256-nuyOvpKTqpE0dQjqtm17C/QEXhIXUpsmosuzDhSAe/c=",
"owner": "e-tho", "owner": "e-tho",
"repo": "ucodenix", "repo": "ucodenix",
"rev": "4c7931fcf713c4ddf730d275f07d916c5f4c4e7a", "rev": "2fb0f8ad462f3233ef91b471ee6f1f7c2689a4f9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -568,11 +652,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1737173095, "lastModified": 1740729275,
"narHash": "sha256-32xX3cAIQovRNtW5cHirLvSC87uoOfLcaYGUOrTyhx4=", "narHash": "sha256-/0dJi65+7oBpfEYWrg4jihkEzAf975TVeOk+FpxaW6o=",
"owner": "youwen5", "owner": "youwen5",
"repo": "zen-browser-flake", "repo": "zen-browser-flake",
"rev": "e91b2aa537c1492efd1c5f35f1f204c685e461ab", "rev": "17bd241d6a5692848b01737f595824a707de855a",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -13,13 +13,26 @@
]; ];
services.fprintd.enable = true; services.fprintd.enable = true;
security.pam.services.login.fprintAuth = true; security.pam.services.login.fprintAuth = true;
hardware.graphics.extraPackages = with pkgs; [ vaapiIntel intel-media-driver ];
hardware.opengl = {
enable = true;
extraPackages = with pkgs; [
# your Open GL, Vulkan and VAAPI drivers
vpl-gpu-rt # for newer GPUs on NixOS >24.05 or unstable
# onevpl-intel-gpu # for newer GPUs on NixOS <= 24.05
# intel-media-sdk # for older GPUs
];
};
hardware = { hardware = {
graphics.enable32Bit = true; graphics.enable32Bit = true;
pulseaudio.support32Bit = true; pulseaudio.support32Bit = true;
openrazer.enable = true; openrazer.enable = true;
}; };
virtualisation.podman = {
enable = true;
dockerCompat = true;
};
boot = { boot = {
# Bootloader. # Bootloader.
loader.systemd-boot.enable = true; loader.systemd-boot.enable = true;
@ -113,6 +126,7 @@
}; };
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
openrazer-daemon openrazer-daemon
distrobox
]; ];
# Set your time zone. # Set your time zone.
time.timeZone = "America/Los_Angeles"; # Asia/Taipei lib.mkDefault time.timeZone = "America/Los_Angeles"; # Asia/Taipei lib.mkDefault
@ -135,6 +149,46 @@
}; };
}; };
# Select internationalisation properties. # Select internationalisation properties.
networking.firewall = {
allowedUDPPorts = [ 51820 ]; # Clients and peers can use the same port, see listenport
};
# Enable WireGuard
# networking.wireguard.interfaces = {
# # "wg0" is the network interface name. You can name the interface arbitrarily.
# wg0 = {
# # Determines the IP address and subnet of the client's end of the tunnel interface.
# ips = [ "10.100.0.2/24" ];
# listenPort = 51820; # to match firewall allowedUDPPorts (without this wg uses random port numbers)
#
# # Path to the private key file.
# #
# # Note: The private key can also be included inline via the privateKey option,
# # but this makes the private key world-readable; thus, using privateKeyFile is
# # recommended.
# privateKeyFile = "path to private key file";
#
# peers = [
# # For a client configuration, one peer entry for the server will suffice.
#
# {
# # Public key of the server (not a file path).
# publicKey = "{server public key}";
#
# # Forward all the traffic via VPN.
# allowedIPs = [ "0.0.0.0/0" ];
# # Or forward only particular subnets
# #allowedIPs = [ "10.100.0.1" "91.108.12.0/22" ];
#
# # Set this to the server IP and port.
# endpoint = "{server ip}:51820"; # ToDo: route to endpoint not automatically configured https://wiki.archlinux.org/index.php/WireGuard#Loop_routing https://discourse.nixos.org/t/solved-minimal-firewall-setup-for-wireguard-client/7577
#
# # Send keepalives every 25 seconds. Important to keep NAT tables alive.
# persistentKeepalive = 25;
# }
# ];
# };
# };
i18n.defaultLocale = "en_US.UTF-8"; i18n.defaultLocale = "en_US.UTF-8";
i18n.extraLocaleSettings = { i18n.extraLocaleSettings = {

View file

@ -6,7 +6,7 @@
stylix = { stylix = {
enable = true; enable = true;
image = "${inputs.wallpapers}/vtubers/nordMachi-resized.png"; image = "${inputs.wallpapers}/math/fastInversNord.png";
polarity = "dark"; polarity = "dark";
base16Scheme = "${pkgs.base16-schemes}/share/themes/rose-pine.yaml"; base16Scheme = "${pkgs.base16-schemes}/share/themes/rose-pine.yaml";

View file

@ -22,6 +22,9 @@
home.packages = with pkgs; [ home.packages = with pkgs; [
# here is some command line tools I use frequently # here is some command line tools I use frequently
# feel free to add your own or remove some of them # feel free to add your own or remove some of them
gfortran
affine-bin
elmPackages.elm
kicad kicad
android-tools android-tools
wacomtablet wacomtablet
@ -80,7 +83,6 @@
sl sl
piper piper
nwg-displays nwg-displays
dolphin
xfce.thunar xfce.thunar
tailwindcss tailwindcss
@ -166,7 +168,6 @@
texlivePackages.csquotes texlivePackages.csquotes
texlivePackages.csquotes-de texlivePackages.csquotes-de
texlivePackages.collection-latexextra texlivePackages.collection-latexextra
texpresso
btop # replacement of htop/nmon btop # replacement of htop/nmon
iotop # io monitoring iotop # io monitoring
@ -200,7 +201,7 @@
netcat netcat
nmap nmap
metasploit metasploit
john #john
lynis lynis
hydra-cli hydra-cli
#ghidra #ghidra
@ -230,7 +231,7 @@
userEmail = "wlin@kaitotlex.systems"; userEmail = "wlin@kaitotlex.systems";
signing = { signing = {
signByDefault = true; signByDefault = true;
key = "2AE6771F14386F9B85E48685A9209668BFA39C0E"; key = "BC04C0C14AEDA705B8FBACE8C5F52A3C0F3B4A77";
}; };
}; };