Mailing List archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-dvb] Win-TV Nova-CI?



Hi,

has anyone managed to get a Hauppauge WIN-TV NOVA-CI DVB-S card running?

I've built one into a rather old 100 MHz Pentium which I'd like to
use for streaming DVB into my home network. The DVB drivers recognize
the card and I can tune into a channel, but with "szap -r" (or "dvbstream")
running for a few seconds I get all kinds of failures (from data corruption
in unrelated processes to complete lockups).

I've attached Oopses for two of these crashes. I don't understand very
much about these except that "something" seems to be corrupting memory
all over the place. The machine is running fine as long as I don't do
anything dvb-related, so I assume "something" is the dvb-drivers...

Any ideas? Btw, I don't have a CAM module installed if that matters.

Bye,
	Peter
-- 
Peter Conrad      | "Hi! I'm a signature virus! Copy me to your .signature,
Friedensallee 152 |  pleeeeeeeeeze!"   - found in someone else's .signature
63263 Neu-Isenburg
Germany

  email: conrad@unix-ag.uni-kl.de / WWW: http://www.unix-ag.uni-kl.de/~conrad
ksymoops 2.4.8 on i586 2.4.23.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.23/ (default)
     -m /boot/System.map (specified)

Oops: 0002
CPU:    0
EIP:    0010:[<c0111284>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010046
eax: c1d1d170   ebx: 00000000   ecx: c1255f34   edx: c1255f2c
esi: 00000246   edi: ffffe000   ebp: c1d1d000   esp: c1255f08
ds: 0018   es: 0018   ss: 0018
Process szap (pid: 765, stackpage=c1255000)
Stack: 0000004f 40015000 c0189514 c1d1d170 00000000 00000000 c1254000 00000000
       00000000 00000000 c1254000 00000000 00000000 c1d1d000 0000004f 40015000
       c1d1dc00 c0187c8b c1d1d000 c13f9ea0 40015000 0000004f 00000000 c0189470
Call Trace:    [<c0189514>] [<c0187c8b>] [<c0189470>] [<c01857c5>] [<c0189470>]
  [<c01313f8>] [<c0107073>]
Code: 89 4b 04 89 08 89 41 04 56 9d 5b 5e c3 eb 0d 90 90 90 90 90


>>EIP; c0111284 <add_wait_queue+14/30>   <=====

>>eax; c1d1d170 <_end+1a68024/254af14>
>>ecx; c1255f34 <_end+fa0de8/254af14>
>>edx; c1255f2c <_end+fa0de0/254af14>
>>ebp; c1d1d000 <_end+1a67eb4/254af14>
>>esp; c1255f08 <_end+fa0dbc/254af14>

Trace; c0189514 <write_chan+a4/200>
Trace; c0187c8b <do_tty_write+7b/124>
Trace; c0189470 <write_chan+0/200>
Trace; c01857c5 <tty_write+f5/120>
Trace; c0189470 <write_chan+0/200>
Trace; c01313f8 <sys_write+78/100>
Trace; c0107073 <system_call+33/40>

Code;  c0111284 <add_wait_queue+14/30>
00000000 <_EIP>:
Code;  c0111284 <add_wait_queue+14/30>   <=====
   0:   89 4b 04                  mov    %ecx,0x4(%ebx)   <=====
Code;  c0111287 <add_wait_queue+17/30>
   3:   89 08                     mov    %ecx,(%eax)
Code;  c0111289 <add_wait_queue+19/30>
   5:   89 41 04                  mov    %eax,0x4(%ecx)
Code;  c011128c <add_wait_queue+1c/30>
   8:   56                        push   %esi
Code;  c011128d <add_wait_queue+1d/30>
   9:   9d                        popf   
Code;  c011128e <add_wait_queue+1e/30>
   a:   5b                        pop    %ebx
Code;  c011128f <add_wait_queue+1f/30>
   b:   5e                        pop    %esi
Code;  c0111290 <add_wait_queue+20/30>
   c:   c3                        ret    
Code;  c0111291 <add_wait_queue+21/30>
   d:   eb 0d                     jmp    1c <_EIP+0x1c>
Code;  c0111293 <add_wait_queue+23/30>
   f:   90                        nop    
Code;  c0111294 <add_wait_queue+24/30>
  10:   90                        nop    
Code;  c0111295 <add_wait_queue+25/30>
  11:   90                        nop    
Code;  c0111296 <add_wait_queue+26/30>
  12:   90                        nop    
Code;  c0111297 <add_wait_queue+27/30>
  13:   90                        nop    

ksymoops 2.4.8 on i586 2.4.23.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.23/ (default)
     -m /boot/System.map (specified)

Oops: 0000
CPU:    0
EIP:    0010:[<c013ac00>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246
eax: c10aaba0   ebx: c1489f98   ecx: c1488000   edx: c1489f98
esi: c18a6001   edi: 00000000   ebp: c1489f98   esp: c1489f38
ds: 0018   es: 0018   ss: 0018
Process top (pid: 707, stackpage=c1489000)
Stack: c013af21 c10aaba0 00000001 00000009 c10aaba0 c105fe40 00001000 c18a6000
       0805f460 c013aa8a c1489f98 c18a6000 00000000 00000009 c013b6e1 c18a6000
       c18a6000 c1489f98 c013b91a c1488000 c1489f98 bffff1d0 bffff288 c01383d7
Call Trace:    [<c013af21>] [<c10aaba0>] [<c10aaba0>] [<c105fe40>] [<c18a6000>]
  [<c013aa8a>] [<c1489f98>] [<c18a6000>] [<c013b6e1>] [<c18a6000>] [<c18a6000>]
  [<c1489f98>] [<c013b91a>] [<c1488000>] [<c1489f98>] [<bffff1d0>] [<bffff288>]
  [<c01383d7>] [<c1073620>] [<c105c2e0>] [<c07ad240>] [<c0e21ba0>] [<c0e21ba0>]
  [<c1488000>] [<c0107073>] [<bffff1d0>] [<6e003233>] [<bffff1d0>] [<bffff288>]
  [<4012e548>] [<bffff1bc>]
Code: 8b 2f 6c 06 8b 4c 24 08 8b 82 98 00 00 00 85 c0 74 07 8b 40


>>EIP; c013ac00 <permission+0/30>   <=====

>>eax; c10aaba0 <_end+df5a54/254af14>
>>ebx; c1489f98 <_end+11d4e4c/254af14>
>>ecx; c1488000 <_end+11d2eb4/254af14>
>>edx; c1489f98 <_end+11d4e4c/254af14>
>>esi; c18a6001 <_end+15f0eb5/254af14>
>>ebp; c1489f98 <_end+11d4e4c/254af14>
>>esp; c1489f38 <_end+11d4dec/254af14>

Trace; c013af21 <link_path_walk+51/670>
Trace; c10aaba0 <_end+df5a54/254af14>
Trace; c10aaba0 <_end+df5a54/254af14>
Trace; c105fe40 <_end+daacf4/254af14>
Trace; c18a6000 <_end+15f0eb4/254af14>
Trace; c013aa8a <getname+4a/b0>
Trace; c1489f98 <_end+11d4e4c/254af14>
Trace; c18a6000 <_end+15f0eb4/254af14>
Trace; c013b6e1 <path_lookup+21/30>
Trace; c18a6000 <_end+15f0eb4/254af14>
Trace; c18a6000 <_end+15f0eb4/254af14>
Trace; c1489f98 <_end+11d4e4c/254af14>
Trace; c013b91a <__user_walk+2a/50>
Trace; c1488000 <_end+11d2eb4/254af14>
Trace; c1489f98 <_end+11d4e4c/254af14>
Trace; bffff1d0 Before first symbol
Trace; bffff288 Before first symbol
Trace; c01383d7 <sys_stat64+17/70>
Trace; c1073620 <_end+dbe4d4/254af14>
Trace; c105c2e0 <_end+da7194/254af14>
Trace; c07ad240 <_end+4f80f4/254af14>
Trace; c0e21ba0 <_end+b6ca54/254af14>
Trace; c0e21ba0 <_end+b6ca54/254af14>
Trace; c1488000 <_end+11d2eb4/254af14>
Trace; c0107073 <system_call+33/40>
Trace; bffff1d0 Before first symbol
Trace; 6e003233 Before first symbol
Trace; bffff1d0 Before first symbol
Trace; bffff288 Before first symbol
Trace; 4012e548 Before first symbol
Trace; bffff1bc Before first symbol

Code;  c013ac00 <permission+0/30>
00000000 <_EIP>:
Code;  c013ac00 <permission+0/30>   <=====
   0:   8b 2f                     mov    (%edi),%ebp   <=====
Code;  c013ac02 <permission+2/30>
   2:   6c                        insb   (%dx),%es:(%edi)
Code;  c013ac03 <permission+3/30>
   3:   06                        push   %es
Code;  c013ac04 <permission+4/30>
   4:   8b 4c 24 08               mov    0x8(%esp,1),%ecx
Code;  c013ac08 <permission+8/30>
   8:   8b 82 98 00 00 00         mov    0x98(%edx),%eax
Code;  c013ac0e <permission+e/30>
   e:   85 c0                     test   %eax,%eax
Code;  c013ac10 <permission+10/30>
  10:   74 07                     je     19 <_EIP+0x19>
Code;  c013ac12 <permission+12/30>
  12:   8b 40 00                  mov    0x0(%eax),%eax

 <1>Unable to handle kernel paging request at virtual address c51d33f8
c0129604
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c0129604>]    Not tainted
EFLAGS: 00010083
eax: c105d730   ebx: c105d730   ecx: c105d720   edx: 00000080
esi: c105ff18   edi: 00000246   ebp: c105d728   esp: c1d4fee0
ds: 0018   es: 0018   ss: 0018
Process showconsole (pid: 868, stackpage=c1d4f000)
Stack: 00000000 c1cb1e2c c1cb1dc0 c12a15c0 c012900f c105ff18 000001f0 c01433c9
       c105ff18 000001f0 00000000 c1cb1e2c c1cb1dc0 c12a15c0 c013ad92 c12a15c0
       c1d4ff50 00000000 c1727006 c12a15c0 c1d4ff98 c013b374 c12a15c0 c1d4ff50
Call Trace:    [<c012900f>] [<c01433c9>] [<c013ad92>] [<c013b374>] [<c013aa8a>]
  [<c013b6e1>] [<c013b91a>] [<c0138447>] [<c0107073>]
Code: 8b 44 81 18 0f af da 89 41 14 01 eb 40 74 33 57 9d 89 d8 5b


>>EIP; c0129604 <__kmem_cache_alloc+54/d0>   <=====

>>eax; c105d730 <_end+da85e4/254af14>
>>ebx; c105d730 <_end+da85e4/254af14>
>>ecx; c105d720 <_end+da85d4/254af14>
>>esi; c105ff18 <_end+daadcc/254af14>
>>ebp; c105d728 <_end+da85dc/254af14>
>>esp; c1d4fee0 <_end+1a9ad94/254af14>

Trace; c012900f <kmem_cache_alloc+f/20>
Trace; c01433c9 <d_alloc+19/160>
Trace; c013ad92 <real_lookup+82/c0>
Trace; c013b374 <link_path_walk+4a4/670>
Trace; c013aa8a <getname+4a/b0>
Trace; c013b6e1 <path_lookup+21/30>
Trace; c013b91a <__user_walk+2a/50>
Trace; c0138447 <sys_lstat64+17/70>
Trace; c0107073 <system_call+33/40>

Code;  c0129604 <__kmem_cache_alloc+54/d0>
00000000 <_EIP>:
Code;  c0129604 <__kmem_cache_alloc+54/d0>   <=====
   0:   8b 44 81 18               mov    0x18(%ecx,%eax,4),%eax   <=====
Code;  c0129608 <__kmem_cache_alloc+58/d0>
   4:   0f af da                  imul   %edx,%ebx
Code;  c012960b <__kmem_cache_alloc+5b/d0>
   7:   89 41 14                  mov    %eax,0x14(%ecx)
Code;  c012960e <__kmem_cache_alloc+5e/d0>
   a:   01 eb                     add    %ebp,%ebx
Code;  c0129610 <__kmem_cache_alloc+60/d0>
   c:   40                        inc    %eax
Code;  c0129611 <__kmem_cache_alloc+61/d0>
   d:   74 33                     je     42 <_EIP+0x42>
Code;  c0129613 <__kmem_cache_alloc+63/d0>
   f:   57                        push   %edi
Code;  c0129614 <__kmem_cache_alloc+64/d0>
  10:   9d                        popf   
Code;  c0129615 <__kmem_cache_alloc+65/d0>
  11:   89 d8                     mov    %ebx,%eax
Code;  c0129617 <__kmem_cache_alloc+67/d0>
  13:   5b                        pop    %ebx

 <1>Unable to handle kernel paging request at virtual address c51d33f8
c0129604
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c0129604>]    Not tainted
EFLAGS: 00010083
eax: c105d730   ebx: c105d730   ecx: c105d720   edx: 00000080
esi: c105ff18   edi: 00000246   ebp: c105d728   esp: c1e79ee0
ds: 0018   es: 0018   ss: 0018
Process rc (pid: 864, stackpage=c1e79000)
Stack: 00000000 c0f75a4c c0f759e0 c02b93a0 c012900f c105ff18 000001f0 c01433c9
       c105ff18 000001f0 00000000 c0f75a4c c0f759e0 c02b93a0 c013ad92 c02b93a0
       c1e79f50 00000000 c13b8020 c02b93a0 c1e79f98 c013b374 c02b93a0 c1e79f50
Call Trace:    [<c012900f>] [<c01433c9>] [<c013ad92>] [<c013b374>] [<c013aa8a>]
  [<c013b6e1>] [<c013b91a>] [<c01383d7>] [<c0107073>]
Code: 8b 44 81 18 0f af da 89 41 14 01 eb 40 74 33 57 9d 89 d8 5b


>>EIP; c0129604 <__kmem_cache_alloc+54/d0>   <=====

>>eax; c105d730 <_end+da85e4/254af14>
>>ebx; c105d730 <_end+da85e4/254af14>
>>ecx; c105d720 <_end+da85d4/254af14>
>>esi; c105ff18 <_end+daadcc/254af14>
>>ebp; c105d728 <_end+da85dc/254af14>
>>esp; c1e79ee0 <_end+1bc4d94/254af14>

Trace; c012900f <kmem_cache_alloc+f/20>
Trace; c01433c9 <d_alloc+19/160>
Trace; c013ad92 <real_lookup+82/c0>
Trace; c013b374 <link_path_walk+4a4/670>
Trace; c013aa8a <getname+4a/b0>
Trace; c013b6e1 <path_lookup+21/30>
Trace; c013b91a <__user_walk+2a/50>
Trace; c01383d7 <sys_stat64+17/70>
Trace; c0107073 <system_call+33/40>

Code;  c0129604 <__kmem_cache_alloc+54/d0>
00000000 <_EIP>:
Code;  c0129604 <__kmem_cache_alloc+54/d0>   <=====
   0:   8b 44 81 18               mov    0x18(%ecx,%eax,4),%eax   <=====
Code;  c0129608 <__kmem_cache_alloc+58/d0>
   4:   0f af da                  imul   %edx,%ebx
Code;  c012960b <__kmem_cache_alloc+5b/d0>
   7:   89 41 14                  mov    %eax,0x14(%ecx)
Code;  c012960e <__kmem_cache_alloc+5e/d0>
   a:   01 eb                     add    %ebp,%ebx
Code;  c0129610 <__kmem_cache_alloc+60/d0>
   c:   40                        inc    %eax
Code;  c0129611 <__kmem_cache_alloc+61/d0>
   d:   74 33                     je     42 <_EIP+0x42>
Code;  c0129613 <__kmem_cache_alloc+63/d0>
   f:   57                        push   %edi
Code;  c0129614 <__kmem_cache_alloc+64/d0>
  10:   9d                        popf   
Code;  c0129615 <__kmem_cache_alloc+65/d0>
  11:   89 d8                     mov    %ebx,%eax
Code;  c0129617 <__kmem_cache_alloc+67/d0>
  13:   5b                        pop    %ebx

 <1>Unable to handle kernel paging request at virtual address c51d33f8
c0129604
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c0129604>]    Not tainted
EFLAGS: 00010087
eax: c105d730   ebx: c105d730   ecx: c105d720   edx: 00000080
esi: c105ff18   edi: 00000246   ebp: c105d728   esp: c18bff18
ds: 0018   es: 0018   ss: 0018
Process cron (pid: 876, stackpage=c18bf000)
Stack: c1a6d9a0 c067c1a0 c18bff70 c1073320 c012900f c105ff18 000001f0 c01433c9
       c105ff18 000001f0 c1a6d9a0 c067c1a0 c18bff70 c0c719c0 c013a772 c1073320
       c18bff88 00000005 00000003 fffffff4 3030355b 005d3531 00000014 08049a60
Call Trace:    [<c012900f>] [<c01433c9>] [<c013a772>] [<c010bbec>] [<c0107073>]
Code: 8b 44 81 18 0f af da 89 41 14 01 eb 40 74 33 57 9d 89 d8 5b


>>EIP; c0129604 <__kmem_cache_alloc+54/d0>   <=====

>>eax; c105d730 <_end+da85e4/254af14>
>>ebx; c105d730 <_end+da85e4/254af14>
>>ecx; c105d720 <_end+da85d4/254af14>
>>esi; c105ff18 <_end+daadcc/254af14>
>>ebp; c105d728 <_end+da85dc/254af14>
>>esp; c18bff18 <_end+160adcc/254af14>

Trace; c012900f <kmem_cache_alloc+f/20>
Trace; c01433c9 <d_alloc+19/160>
Trace; c013a772 <do_pipe+b2/220>
Trace; c010bbec <sys_pipe+c/40>
Trace; c0107073 <system_call+33/40>

Code;  c0129604 <__kmem_cache_alloc+54/d0>
00000000 <_EIP>:
Code;  c0129604 <__kmem_cache_alloc+54/d0>   <=====
   0:   8b 44 81 18               mov    0x18(%ecx,%eax,4),%eax   <=====
Code;  c0129608 <__kmem_cache_alloc+58/d0>
   4:   0f af da                  imul   %edx,%ebx
Code;  c012960b <__kmem_cache_alloc+5b/d0>
   7:   89 41 14                  mov    %eax,0x14(%ecx)
Code;  c012960e <__kmem_cache_alloc+5e/d0>
   a:   01 eb                     add    %ebp,%ebx
Code;  c0129610 <__kmem_cache_alloc+60/d0>
   c:   40                        inc    %eax
Code;  c0129611 <__kmem_cache_alloc+61/d0>
   d:   74 33                     je     42 <_EIP+0x42>
Code;  c0129613 <__kmem_cache_alloc+63/d0>
   f:   57                        push   %edi
Code;  c0129614 <__kmem_cache_alloc+64/d0>
  10:   9d                        popf   
Code;  c0129615 <__kmem_cache_alloc+65/d0>
  11:   89 d8                     mov    %ebx,%eax
Code;  c0129617 <__kmem_cache_alloc+67/d0>
  13:   5b                        pop    %ebx


Home | Main Index | Thread Index