xrandr --output DP-0 --scale-from 1920x1080 #--scale 0.5x0.5
xrandr --output DP-0 --scale-from 2560x1440
xrandr --output DP-0 --scale 1x1
Looks like the logic inside modern Intel CPUs are too aggressive in pre-loading cache data and forget to check security boundaries... loading data from kernel (or possible other code space) into a region that malicious code could have access too:
Good starting links for learning about dithering:
Remapping channels to/from other devices (examples): (remember pacmd)
# from XR18 to OSB (inputs)
load-module module-remap-source channels=2 [...]
The fork with features (branches) and one fix (already applied upstream to original project).
* local icons (the TTF is open source, and not everybody will have internet access)
* two panels for Transitions and Panels
The upstream project maintainer will probably accept the feature pulls soon.