search for: rt0

Displaying 20 results from an estimated 37 matches for "rt0".

Did you mean: r10
2016 May 10
2
[Bug 95330] New: [NV84] Hangs with gr: DATA_ERROR [INVALID_BITFIELD], TRAP_PROP [RT_FAULT], fb: trapped write [PGRAPH] [PROP] [RT0] [PAGE_NOT_PRESENT], bsp: Watchdog interrupt, engine hung
https://bugs.freedesktop.org/show_bug.cgi?id=95330 Bug ID: 95330 Summary: [NV84] Hangs with gr: DATA_ERROR [INVALID_BITFIELD], TRAP_PROP [RT_FAULT], fb: trapped write [PGRAPH] [PROP] [RT0] [PAGE_NOT_PRESENT], bsp: Watchdog interrupt, engine hung Product: xorg Version: unspecified Hardware: Other OS: All Status: NEW Severity: normal Priority: medium Component: Driver/nouveau...
2017 Oct 11
1
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
...--git a/arch/x86/crypto/des3_ede-asm_64.S b/arch/x86/crypto/des3_ede-asm_64.S index 8e49ce117494..4bbd3ec78df5 100644 --- a/arch/x86/crypto/des3_ede-asm_64.S +++ b/arch/x86/crypto/des3_ede-asm_64.S @@ -138,21 +138,29 @@ movzbl RW0bl, RT2d; \ movzbl RW0bh, RT3d; \ shrq $16, RW0; \ - movq s8(, RT0, 8), RT0; \ - xorq s6(, RT1, 8), to; \ + leaq s8(%rip), RW1; \ + movq (RW1, RT0, 8), RT0; \ + leaq s6(%rip), RW1; \ + xorq (RW1, RT1, 8), to; \ movzbl RW0bl, RL1d; \ movzbl RW0bh, RT1d; \ shrl $16, RW0d; \ - xorq s4(, RT2, 8), RT0; \ - xorq s2(, RT3, 8), to; \ + leaq s4(%rip), RW1; \ + xorq (...
2014 Aug 20
26
[Bug 82835] New: GeForce 8800 GS VDPAU h264 decoding hang
https://bugs.freedesktop.org/show_bug.cgi?id=82835 Priority: medium Bug ID: 82835 Assignee: nouveau at lists.freedesktop.org Summary: GeForce 8800 GS VDPAU h264 decoding hang QA Contact: xorg-team at lists.x.org Severity: normal Classification: Unclassified OS: Linux (All) Reporter: randrik at mail.ru
2015 Mar 13
11
[Bug 89572] New: [NV86] Video playback corruption with nouveau, vdpau
https://bugs.freedesktop.org/show_bug.cgi?id=89572 Bug ID: 89572 Summary: [NV86] Video playback corruption with nouveau, vdpau Product: xorg Version: unspecified Hardware: x86-64 (AMD64) OS: Linux (All) Status: NEW Severity: normal Priority: medium Component: Driver/nouveau
2018 Jan 30
0
[Bug 1219] New: nftables prints the routing header type rules incorrectly
...I was using nftables to add rules to routing header type 0, I found that nft list ruleset command prints them incorrectly. The configuration I was using is shown bellow nft add table ip6 filter nft add chain ip6 filter input { type filter hook input priority 0\;} nft add rule ip6 filter input rt0 addr [1]A::2 nft list ruleset table ip6 filter { chain input { type filter hook input priority 0; policy accept; hbh unknown 0xa0000000000000000000000000002 [invalid type] } } I'm quite to nftables implementation, but after some walkthrough the code I think the probl...
2006 Mar 18
2
IPSEC with MAC/MLS support crack
...400, ifnetlabel=0x12, m=0xc16e5600, mbuflabel=0x12) at ../../../security/mac_mls/mac_mls.c:1564 #5 0xc07b49fb in mac_check_ifnet_transmit (ifnet=0xc1646400, mbuf=0xc16e5600) at ../../../security/mac/mac_net.c:409 #6 0xc06bfb46 in ether_output (ifp=0xc1646400, m=0xc16e5600, dst=0xc1a16330, rt0=0xc1816840) at ../../../net/if_ethersubr.c:161 #7 0xc06f3662 in ip_output (m=0xc16e5600, opt=0xc16e56ec, ro=0xc1a1632c, flags=0, imo=0x0, inp=0xc186d654) at ../../../netinet/ip_output.c:778 #8 0xc06fca6a in tcp_output (tp=0xc186fac8) at ../../../netinet/tcp_output.c:1080 #9 0xc0704bbc in...
2013 Dec 22
5
[Bug 72978] New: nouveau E[ PFIFO][0000:01:00.0] CACHE_ERROR
...E[ PGRAPH][0000:01:00.0] TRAP [ 7283.222242] nouveau E[ PGRAPH][0000:01:00.0] ch 4 [0x001fbe9000 gnome-shell[1368]] subc 3 class 0x8297 mthd 0x1ac4 data 0x24500001 [ 7283.222254] nouveau E[ PFB][0000:01:00.0] trapped write at 0x004a9e0000 on channel 0x0001fbe9 [gnome-shell[1368]] PGRAPH/PROP/RT0 reason: PAGE_NOT_PRESENT [ 7283.230968] nouveau E[ PFB][0000:01:00.0] trapped write at 0x004aa91900 on channel 0x0001fbe9 [gnome-shell[1368]] PGRAPH/PROP/RT0 reason: PAGE_NOT_PRESENT [ 7401.313131] usb 1-4.1.3: new high-speed USB device number 7 using ehci-pci [ 7401.387876] usb 1-4.1.3: New US...
2014 Jan 17
2
[PATCH] nv50, nvc0: only clear out the buffers that we were asked to clear
Fixes fbo-drawbuffers-none glClearBuffer piglit test. Signed-off-by: Ilia Mirkin <imirkin at alum.mit.edu> --- Only tested on nv50, but implementations seem similar enough. src/gallium/drivers/nouveau/nv50/nv50_surface.c | 17 +++++++++-------- src/gallium/drivers/nouveau/nvc0/nvc0_surface.c | 17 +++++++++-------- 2 files changed, 18 insertions(+), 16 deletions(-) diff --git
2014 Jan 23
2
[Mesa-dev] [PATCH] nv50, nvc0: only clear out the buffers that we were asked to clear
...RT may not have been there, and that seemed simpler than the thing that I have now (as evidenced by the code I have now which has more complex logic). > > The corrected version in your github branch looks alot better, it > handles the above case and does not overwrite the clear buffer on rt0. Christoph was really keen on doing the common-case color/depth clear all in one clear buffers command, so yeah -- I redid it that way. Enjoy the layered version of that in a later commit. > > That one is Reviewed-by: Emil Velikov <emil.l.velikov at gmail.com> >> if (buffers...
2014 Jan 23
0
[Mesa-dev] [PATCH] nv50, nvc0: only clear out the buffers that we were asked to clear
...I'm not sure why you've dropped the mode from above. I'm guessing that the initial assumption was that if there is a color buffer it must be at cbuf[0]. The corrected version in your github branch looks alot better, it handles the above case and does not overwrite the clear buffer on rt0. That one is Reviewed-by: Emil Velikov <emil.l.velikov at gmail.com> > if (buffers & PIPE_CLEAR_DEPTH) { > @@ -425,12 +422,16 @@ nv50_clear(struct pipe_context *pipe, unsigned buffers, > mode |= NV50_3D_CLEAR_BUFFERS_S; > } > > - BEGIN_NV04(push, NV50...
2014 Jan 23
0
[Mesa-dev] [PATCH] nv50, nvc0: only clear out the buffers that we were asked to clear
...th and clear_stencil for the first buffer, regardless of what is being passed by gallium. I'm not sure that was strictly correct. -Emil >> >> The corrected version in your github branch looks alot better, it >> handles the above case and does not overwrite the clear buffer on rt0. > > Christoph was really keen on doing the common-case color/depth clear > all in one clear buffers command, so yeah -- I redid it that way. > Enjoy the layered version of that in a later commit. > >> >> That one is Reviewed-by: Emil Velikov <emil.l.velikov at gmail...
2015 Nov 12
9
[Bug 92922] New: Xorg random freeze
https://bugs.freedesktop.org/show_bug.cgi?id=92922 Bug ID: 92922 Summary: Xorg random freeze Product: xorg Version: unspecified Hardware: x86-64 (AMD64) OS: Linux (All) Status: NEW Severity: major Priority: medium Component: Driver/nouveau Assignee: nouveau at
2014 Aug 06
16
[Bug 82255] New: [VP2] Chroma planes are vertically stretched during VDPAU playback
https://bugs.freedesktop.org/show_bug.cgi?id=82255 Priority: medium Bug ID: 82255 Assignee: nouveau at lists.freedesktop.org Summary: [VP2] Chroma planes are vertically stretched during VDPAU playback Severity: normal Classification: Unclassified OS: All Reporter: emil.l.velikov at gmail.com
2016 Apr 24
5
[Bug 95109] New: multiple instances of buffer 186 on validation list
..., e1c: 00000000, e20: 00002a00, e24: 00030000 kernel: nouveau E[ PGRAPH][0000:01:00.0] ch 4 [0x003fc2a000 gnome-shell[2035]] subc 3 class 0x8297 mthd 0x15e0 data 0x00000000 kernel: nouveau E[ PFB][0000:01:00.0] trapped write at 0x00465f0000 on channel 0x0003fc2a [gnome-shell[2035]] PGRAPH/PROP/RT0 reason: Gnome pointer is alive, no window buttons function. After about 2 minutes the system returns to normal. -- You are receiving this mail because: You are the assignee for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://lists.freedesktop...
2008 Sep 12
4
Custom build kernel patch fails big time.
...rm4_policy_afinfo; +static void xfrm4_update_pmtu(struct dst_entry *dst, u32 mtu); + static int xfrm4_dst_lookup(struct xfrm_dst **dst, struct flowi *fl) { return __ip_route_output_key((struct rtable**)dst, fl); @@ -53,17 +55,20 @@ struct dst_entry *dst, *dst_prev; struct rtable *rt0 = (struct rtable*)(*dst_p); struct rtable *rt = rt0; - u32 remote = fl->fl4_dst; - u32 local = fl->fl4_src; struct flowi fl_tunnel = { .nl_u = { .ip4_u = { - .saddr = local, - .daddr = remote, + .saddr = fl-&g...
2013 Aug 12
5
[Bug 68037] New: TRAP_TPDMA - TP0: Unhandled ustatus 0x00000008 ; and other NV50 log spam errors
...- TP0: Unhandled ustatus 0x00000008 nouveau E[ PGRAPH][0000:02:00.0] TRAP nouveau E[ PGRAPH][0000:02:00.0] ch 2 [0x0007b45000 Xorg[4836]] subc 7 class 0x8397 mthd 0x15e0 data 0x00000000 nouveau E[ PFB][0000:02:00.0] trapped write at 0x0020491500 on channel 0x00007b45 [Xorg[4836]] PGRAPH/PROP/RT0 reason: PAGE_NOT_PRESENT nouveau E[ PFIFO][0000:02:00.0] DMA_PUSHER - ch 2 [Xorg[4836]] get 0x0020025494 put 0x0020025f28 ib_get 0x000000aa ib_put 0x000000c9 state 0x8000e684 (err: INVALID_CMD) push 0x00400040 nouveau E[ PGRAPH][0000:02:00.0] DATA_ERROR BEGIN_END_ACTIVE nouveau E[ PGRAPH][0000:...
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to