Pokud jsem prihlasenej jako ROOT, ALSA normalne funguje. Pokud se ale prihrasim jako normalni user, vsechny aplikace ktere zkouseji prehravat zvuk pres ALSU zatuhnou. Aplikace pak nejde killnout, dokonce linux ani nemuze rebootovat, zatuhne pri vypinani acpid. Emulace OSS ale funguje 
Zvukova zarizeni maji (doufam) spravne nastavena prava, uzivatel patri do skupiny audio.
Kernel mam gentoo-2.6.9, ALSA 1.0.6 zkompilovana primo v kernelu.
Zvukovka kterou mam v notebooku (neomagic 256AV) ma sice p@sranej ovladac pro linux (pri boot velice casto zatuhava komp), to je ale znama vec, pisou to i v readme pro ALSU.
Kód:
vytah z dmesg:
Advanced Linux Sound Architecture Driver Version 1.0.6 (Sun Aug 15 07:17:53 2004 UTC).
PCI: Enabling device 0000:01:00.1 (0000 -> 0002)
ACPI: PCI interrupt 0000:01:00.1[B] -> GSI 5 (level, low) -> IRQ 5
nm256: Mapping port 1 from 0x2709a0 - 0x27ec00
ALSA device list:
#0: NeoMagic NM256AV at 0xf8e709a0 & 0xfda00000, irq 5
ls -l /dev/snd/
crw-rw---- 1 root audio 116, 0 Jan 1 1970 controlC0
crw-rw---- 1 root audio 116, 24 Jan 1 1970 pcmC0D0c
crw-rw---- 1 root audio 116, 16 Jan 1 1970 pcmC0D0p
crw-rw---- 1 root audio 116, 33 Jan 1 1970 timer
ls -l /dev/sound/
crw-rw---- 1 root audio 14, 4 Jan 1 1970 audio
crw-rw---- 1 root audio 14, 3 Jan 1 1970 dsp
crw-rw---- 1 root audio 14, 0 Jan 1 1970 mixer
Takhle krasnym chybovym hlasenim me vzdy potesi aplay:
Unable to handle kernel NULL pointer dereference at virtual address 00000060
printing eip:
*pde = 00000000
Oops: 0000 [#1]
PREEMPT
Modules linked in:
CPU: 0
EIP: 0060:[<c02c96c7>] Not tainted VLI
EFLAGS: 00010286 (2.6.9-gentoo-r1)
EIP is at snd_pcm_mmap_data_open+0x7/0x20
eax: 00000000 ebx: c13fecf0 ecx: c44f8000 edx: c02c96c0
esi: 00000000 edi: c13fed44 ebp: c7c9d8c0 esp: c44f9ecc
ds: 007b es: 007b ss: 0068
Process aplay (pid: 4169, threadinfo=c44f8000 task=c13f9560)
Stack: c0119184 c13fecf0 c7c9dae0 c13fecf0 c13feeac c44f8000 c7c9db0c c13fed08
c13fed10 c13fecfc c13fe078 c44f8000 c7c9dae0 c134a560 c13df544 00000000
00000011 c0119a5d 00000011 c134a560 c4eb357c 00000000 c015ff1f c44f9f70
Call Trace:
[<c0119184>] copy_mm+0x354/0x3e0
[<c0119a5d>] copy_process+0x37d/0xaa0
[<c015ff1f>] sys_chmod+0xcf/0x100
[<c017c180>] iget5_locked+0x50/0x110
[<c0179543>] dput+0x33/0x220
[<c011a289>] do_fork+0x79/0x1b5
[<c02ec2cf>] sys_socketcall+0xbf/0x260
[<c0103b51>] sys_fork+0x31/0x40
[<c010518b>] syscall_call+0x7/0xb
Code: 00 00 00 00 89 1c 24 e8 d8 2b e8 ff 89 34 24 e8 d0 2b e8 ff 83 c4 0c 89 f8 5b 5e 5f 5d c3 8d b6 00 00 00 00 8b 44
24 04 8b 40 50 <8b> 40 60 ff 80 a4 00 00 00 c3 eb 0d 90 90 90 90 90 90 90 90 90