search for: 1f4

Displaying 7 results from an estimated 7 matches for "1f4".

Did you mean: 14
2001 Jun 04
1
Ooops output
...00000001 00000400 00000000 d15a0c00 c02adfe0 c2f324e4 dc8b1720 e0877539 Call Trace: [<e0877267>] [<e0877539>] [<e0877ae9>] [<ffff0018>] [<c01056dc>] Code: 0f 0b 83 c4 0c 90 56 e8 f2 15 00 00 89 c7 b8 00 e0 ff ff 21 >>EIP; c015822a <ext3_prepare_write+5e/1f4> <===== Trace; e0877267 <END_OF_CODE+1000802f/????> Trace; e0877539 <END_OF_CODE+10008301/????> Trace; e0877ae9 <END_OF_CODE+100088b1/????> Trace; ffff0018 <END_OF_CODE+2f780de0/????> Trace; c01056dc <kernel_thread+28/38> Code; c015822a <ext3_prepare_write+...
2002 Jul 02
1
Rsync: Segmentation fault
Rsync 2.5.5; transfer via ssh; sparc-sun-solaris2.5 (Ultra 1); gcc 2.8.1. Every time rsync on this box causes boundary violation. I attached two strange examples. I have a few rsync's corefiles (100MB and above) and I can examine them. I will be grateful for any help. -Mirek <-------------------------------------------------------------------------> received 966761 names done
2001 Dec 03
6
smbpasswd and ldap
...[testmess.bat] scriptPath is set to testmess.bat get_single_attribute: [profilePath] = [\\samba\profiles\Administrator] profilePath is set to \\samba\profiles\Administrator get_single_attribute: [description] = [NULL] get_single_attribute: [userWorkstations] = [NULL] get_single_attribute: [rid] = [1f4] get_single_attribute: [primaryGroupID] = [200] ldap_open_connection: connection opened ldap_connect_system: succesful connection to the LDAP server ldap_search_one_user: searching for:[(&(uid=)(objectclass=sambaAccount))] No user to modify! Failed to modify entry for user Administrator. Failed...
2008 Dec 10
2
Possible (bug) in winamp in_flac.dll decoder
...c ntdll.dll RtlReleasePebLock 77c09d78 +11 msvcrt.dll _initterm 7c92c260 +13 ntdll.dll LdrFindResourceDirectory_U 7c920412 +25 ntdll.dll RtlAcquirePebLock 7c92043d +0c ntdll.dll RtlReleasePebLock 77c09d78 +11 msvcrt.dll _initterm thread $138: 7c91da8a +a ntdll.dll NtReplyWaitReceivePortEx thread $1f4: 7c91d1fa +0a ntdll.dll NtDelayExecution 7c8023eb +4b kernel32.dll SleepEx 7c802450 +0a kernel32.dll Sleep 7c920412 +25 ntdll.dll RtlAcquirePebLock thread $2b0: <priority:15> 7c91df3a +0a ntdll.dll NtWaitForSingleObject 7c8025d5 +85 kernel32.dll WaitForSingleObjectEx 7c80253d +0d kernel32.dl...
2013 Jun 30
0
[PATCH v2] nv50: H.264/MPEG2 decoding support via VP2, available on NV84-NV96, NVA0
...{ + uint8_t scaling_lists_4x4[6][16]; // 00 + uint8_t scaling_lists_8x8[2][64]; // 60 + uint32_t width; // e0 + uint32_t height; // e4 + uint64_t ref1_addrs[16]; // e8 + uint64_t ref2_addrs[16]; // 168 + uint32_t unk1e8; + uint32_t unk1ec; + uint32_t w1; // 1f0 + uint32_t w2; // 1f4 + uint32_t w3; // 1f8 + uint32_t h1; // 1fc + uint32_t h2; // 200 + uint32_t h3; // 204 + uint32_t unk208; + uint32_t field_pic_flag; + uint32_t format; + uint32_t unk214; +}; + +struct h264_iparm2 { + uint32_t width; // 00 + uint32_t height; // 04 + uint32_t mbs; // 08 + ui...
2013 Jun 27
4
[PATCH] nv50: H.264/MPEG2 decoding support via VP2, available on NV84-NV96, NVA0
...{ + uint8_t scaling_lists_4x4[6][16]; // 00 + uint8_t scaling_lists_8x8[2][64]; // 60 + uint32_t width; // e0 + uint32_t height; // e4 + uint64_t ref1_addrs[16]; // e8 + uint64_t ref2_addrs[16]; // 168 + uint32_t unk1e8; + uint32_t unk1ec; + uint32_t w1; // 1f0 + uint32_t w2; // 1f4 + uint32_t w3; // 1f8 + uint32_t h1; // 1fc + uint32_t h2; // 200 + uint32_t h3; // 204 + uint32_t unk208; + uint32_t field_pic_flag; + uint32_t format; + uint32_t unk214; +}; + +struct h264_iparm2 { + uint32_t width; // 00 + uint32_t height; // 04 + uint32_t mbs; // 08 + ui...
2003 Dec 01
0
No subject
...174 buffer: q.m.c.3.3.0...p.p.d...q.m.c.3.3.0...b.p.d...q.s.c.r.i.p.t...h.l.p...q.s.c.r.p.t.u.i...d.l.l...q.s.c.r.i.p.t...d.l.l..... rpc_api_pipe_req: Outgoing data not a multiple of 8 bytes.... create_rpc_request: opnum: 0x9 data_len: 0x204 create_rpc_request: data_len: 204 auth_len: 0 alloc_hint: 1f4 000000 smb_io_rpc_hdr hdr 0000 major : 05 0001 minor : 00 0002 pkt_type : 00 0003 flags : 03 0004 pack_type0: 10 0005 pack_type1: 00 0006 pack_type2: 00 0007 pack_type3: 00 0008 frag_len : 0204 000a auth_len : 0000 000c call_id : 00000002...