Pokud jsem prihlasenej jako ROOT, ALSA normalne funguje. Pokud se ale prihrasim jako normalni user, vsechny aplikace ktere zkouseji prehravat zvuk pres ALSU zatuhnou. Aplikace pak nejde killnout, dokonce linux ani nemuze rebootovat, zatuhne pri vypinani acpid. Emulace OSS ale funguje
Zvukova zarizeni maji (doufam) spravne nastavena prava, uzivatel patri do skupiny audio.
Kernel mam gentoo-2.6.9, ALSA 1.0.6 zkompilovana primo v kernelu.
Zvukovka kterou mam v notebooku (neomagic 256AV) ma sice p@sranej ovladac pro linux (pri boot velice casto zatuhava komp), to je ale znama vec, pisou to i v readme pro ALSU.
Kód:vytah z dmesg: Advanced Linux Sound Architecture Driver Version 1.0.6 (Sun Aug 15 07:17:53 2004 UTC). PCI: Enabling device 0000:01:00.1 (0000 -> 0002) ACPI: PCI interrupt 0000:01:00.1[B] -> GSI 5 (level, low) -> IRQ 5 nm256: Mapping port 1 from 0x2709a0 - 0x27ec00 ALSA device list: #0: NeoMagic NM256AV at 0xf8e709a0 & 0xfda00000, irq 5 ls -l /dev/snd/ crw-rw---- 1 root audio 116, 0 Jan 1 1970 controlC0 crw-rw---- 1 root audio 116, 24 Jan 1 1970 pcmC0D0c crw-rw---- 1 root audio 116, 16 Jan 1 1970 pcmC0D0p crw-rw---- 1 root audio 116, 33 Jan 1 1970 timer ls -l /dev/sound/ crw-rw---- 1 root audio 14, 4 Jan 1 1970 audio crw-rw---- 1 root audio 14, 3 Jan 1 1970 dsp crw-rw---- 1 root audio 14, 0 Jan 1 1970 mixer Takhle krasnym chybovym hlasenim me vzdy potesi aplay: Unable to handle kernel NULL pointer dereference at virtual address 00000060 printing eip: *pde = 00000000 Oops: 0000 [#1] PREEMPT Modules linked in: CPU: 0 EIP: 0060:[<c02c96c7>] Not tainted VLI EFLAGS: 00010286 (2.6.9-gentoo-r1) EIP is at snd_pcm_mmap_data_open+0x7/0x20 eax: 00000000 ebx: c13fecf0 ecx: c44f8000 edx: c02c96c0 esi: 00000000 edi: c13fed44 ebp: c7c9d8c0 esp: c44f9ecc ds: 007b es: 007b ss: 0068 Process aplay (pid: 4169, threadinfo=c44f8000 task=c13f9560) Stack: c0119184 c13fecf0 c7c9dae0 c13fecf0 c13feeac c44f8000 c7c9db0c c13fed08 c13fed10 c13fecfc c13fe078 c44f8000 c7c9dae0 c134a560 c13df544 00000000 00000011 c0119a5d 00000011 c134a560 c4eb357c 00000000 c015ff1f c44f9f70 Call Trace: [<c0119184>] copy_mm+0x354/0x3e0 [<c0119a5d>] copy_process+0x37d/0xaa0 [<c015ff1f>] sys_chmod+0xcf/0x100 [<c017c180>] iget5_locked+0x50/0x110 [<c0179543>] dput+0x33/0x220 [<c011a289>] do_fork+0x79/0x1b5 [<c02ec2cf>] sys_socketcall+0xbf/0x260 [<c0103b51>] sys_fork+0x31/0x40 [<c010518b>] syscall_call+0x7/0xb Code: 00 00 00 00 89 1c 24 e8 d8 2b e8 ff 89 34 24 e8 d0 2b e8 ff 83 c4 0c 89 f8 5b 5e 5f 5d c3 8d b6 00 00 00 00 8b 44 24 04 8b 40 50 <8b> 40 60 ff 80 a4 00 00 00 c3 eb 0d 90 90 90 90 90 90 90 90 90


Odpověď s citací


