lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 9 Nov 2006 13:44:45 -0500
From:	Andrew James Wade <andrew.j.wade@...il.com>
To:	"Richardson, Charlotte" <Charlotte.Richardson@...atus.com>
Cc:	andrew.j.wade@...il.com, "Andrew Morton" <akpm@...l.org>,
	linux-kernel@...r.kernel.org,
	"Kimball Murray" <kimball.murray@...il.com>,
	linux-fbdev-devel@...ts.sourceforge.net
Subject: Re: 2.6.19-rc4-mm2

Hello Charlotte,

     I have just noticed that the garbled X-server mode is different
than what I thought it was. rinfo->depth is 24, but rinfo->bpp is 32.
(measured in radeon_write_mode). I haven't yet thought through the
implications of this. I've been unable to get the display correct, but
I've been trying to fix the wrong mode.
     The console mode is ->depth==8, ->bpp==8, and presumably the same
when it's garbled, but I've been unable to reproduce the problem since
instrumenting the kernel.

On Wednesday 08 November 2006 09:01, Richardson, Charlotte wrote:
> ... Do you think I should submit
> a patch that at least enables 24bpp for the chip I have where it
> definitely does work? I'm sure that is overly restrictive, but I don't
> know which ones work and which are broken at this point.

That sounds like a good idea to me, but I'm not very familiar with the
programming practices here.

...
> If you get a chance before I do, you might look at what Xfree86 does -
> they might have the workaround.

It looks like the X.org radeon driver doesn't support 24bpp.

-ajw
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ