Re: [PATCH] bttv driver memory corruption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Oct 25, 2010 at 11:34:40AM -0400, Laurent Birtz wrote:
> I've observed that the poison was corrupted at some random pages, but
> always in the first four bytes. The value of those bytes is 0x23232323.
> This byte sequence often appears in kernel oops reports on my setup.

I couldn't verify your findings by mallocing an equivalent of the
physical memory, filling everything with 0xdeadbeef, and then
periodically checking it didn't change while watching tv at 768x576
in YUY2.

Which video mode and resolution did you use in your tests?
Did you try loading bttv with triton1=1 and vsfx=1?

  Daniel
--
To unsubscribe from this list: send the line "unsubscribe linux-media" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Input]     [Video for Linux]     [Gstreamer Embedded]     [Mplayer Users]     [Linux USB Devel]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Yosemite Backpacking]
  Powered by Linux