[ALSA - driver 0002312]: Kernel oops using Tascm us-122 in RawUSB mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



A NOTE has been added to this issue.
======================================================================
<https://bugtrack.alsa-project.org/alsa-bug/view.php?id=2312> 
======================================================================
Reported By:                jaime
Assigned To:                karsten
======================================================================
Project:                    ALSA - driver
Issue ID:                   2312
Category:                   USB - usb-usx2y
Reproducibility:            always
Severity:                   crash
Priority:                   normal
Status:                     assigned
Distribution:               Debian Sid
Kernel Version:             2.6.17
======================================================================
Date Submitted:             07-29-2006 12:21 CEST
Last Modified:              07-30-2006 17:00 CEST
======================================================================
Summary:                    Kernel oops using Tascm us-122 in RawUSB mode
Description: 
jackd -d alsa -d hw:1,2 -S -P -n 2 -p 128 -r 44100
(run as root) gives kernel oops:

BUG: unable to handle kernel NULL pointer dereference at virtual address
00000030
printing eip:
d09c154f
*pde = 00000000
Oops: 0000 [#1]
Modules linked in: ipv6 button ac battery dm_mod loop mousedev tsdev
snd_usb_usx2y snd_usb_lib shpchp snd_intel8x0 snd_ac97_codec
snd_ac97_bus snd_rawmidi snd_seq_device snd_pcm snd_timer snd_hwdep snd
pci_hotplug psmouse analog i2c_sis96x soundcore parport_pc parport
serio_raw pcspkr floppy i2c_core gameport 8250_pnp snd_page_alloc evdev
sis_agp agpgart rtc ext3 jbd ide_cd cdrom ide_disk sis5513 generic
ide_core ohci_hcd ehci_hcd usbcore sis900 mii thermal processor fan
CPU:    0
EIP:    0060:[<d09c154f>]    Not tainted VLI
EFLAGS: 00010286   (2.6.17-1-486 #1)
EIP is at usX2Y_usbpcm_urbs_start+0xf/0x3f5 [snd_usb_usx2y]
eax: 00000000   ebx: b162dde4   ecx: cffef300   edx: cf63a2a0
esi: cf7f7ea0   edi: 00000000   ebp: cf63a2a0   esp: ce885db4
ds: 007b   es: 007b   ss: 0068
Process jackd (pid: 3645, threadinfo=ce884000 task=cfca2a50)
Stack: cf63a2a0 cbdf0960 00000000 00000022 d09c1337 0000ac44 b162dde4
ceced0c0
       00000000 cfca2a50 b0122a8c ce885de0 ce885de0 b162dde4 cf7f7ea0
00000000
       cf63a2a0 d09c19fb ce708c00 b162de88 cac62000 cf42e460 00000000
d09ac0e4
Call Trace:
<d09c1337> usX2Y_rate_set+0x1bf/0x1f6 [snd_usb_usx2y]  <b0122a8c>
autoremove_wake_function+0x0/0x2d
<d09c19fb> snd_usX2Y_usbpcm_prepare+0xc6/0x14b [snd_usb_usx2y]
<d099c6d5> snd_pcm_do_prepare+0x9/0x19 [snd_pcm]
<d099c324> snd_pcm_action_single+0x1d/0x40 [snd_pcm]  <d099c3bb>
snd_pcm_action_nonatomic+0x30/0x47 [snd_pcm]
<d099eb70> snd_pcm_common_ioctl1+0x4cb/0xc54 [snd_pcm]  <b01e956a>
n_tty_receive_buf+0xbe8/0xc34
<d099d69d> snd_pcm_hw_constraints_complete+0xe8/0x157 [snd_pcm]
<d099d6db> snd_pcm_hw_constraints_complete+0x126/0x157 [snd_pcm]
<d099fe8b> snd_pcm_hw_constraint_minmax+0x24/0x28 [snd_pcm]  <d099d704>
snd_pcm_hw_constraints_complete+0x14f/0x157 [snd_pcm]
<d099d890> snd_pcm_open+0x119/0x1bf [snd_pcm]  <b011262a>
default_wake_function+0x0/0xc
<b01a5fba> prio_tree_insert+0x12c/0x1ec  <b0136cf8>
vma_prio_tree_insert+0x17/0x2a
<d099f9b2> snd_pcm_playback_ioctl+0x0/0x1b [snd_pcm]  <d099f955>
snd_pcm_playback_ioctl1+0x32d/0x343 [snd_pcm]
<b013b9f3> do_mmap_pgoff+0x4b9/0x5e6  <d099f9b2> snd_pcm_playback_ioctl
+0x0/0x1b [snd_pcm]
<b015312e> do_ioctl+0x16/0x42  <b015333d> vfs_ioctl+0x1e3/0x1f1
<b0153395> sys_ioctl+0x4a/0x61  <b0102977> syscall_call+0x7/0xb
Code: 00 8d 83 d8 00 00 00 6a 00 b9 01 00 00 00 ba 03 00 00 00 e8 97 09
75 df 59 5b 5e c3 55 57 56 53 83 ec 34 89 04 24 89 c2 8b 40 04 <8b> 40
30 89 44 24 08 8b 0a 89 4c 24 0c 48 75 20 8b 81 c0 00 00
EIP: [<d09c154f>] usX2Y_usbpcm_urbs_start+0xf/0x3f5 [snd_usb_usx2y]
SS:ESP 0068:ce885db4



Please note that I'm just using standard debian-repository kernels for
the time being, so they're _not_ patched for rt-preempt. I didn't think
that this would cause this oops, but I could be very wrong.

BTW, the version of jack is 0.101.1, and I've already set
nrpacks to 1.


======================================================================

----------------------------------------------------------------------
 jaime - 07-30-06 17:00 
----------------------------------------------------------------------
I've just managed to get 64studio (http://64studio.com/) up and running,
and I've encountered a similar problem (it might be exactly the same
problem) but I'm submitting more details as I'm now running a more recent
version of the kernel/alsa:

Kernel: 2.6.17 with RT preempt patches
Alsa version: 1.0.11

"jackd -R -d alsa -d hw:1,2 -S -P -n 2 -p 128 -r 44100" gives:
BUG: unable to handle kernel NULL pointer dereference at virtual address
00000030
 printing eip:
e112cf30
*pde = 00000000
Oops: 0000 [#1]
PREEMPT
Modules linked in: button ac battery realtime commoncap ipv6 dm_mod
snd_seq_dummy snd_seq_oss snd_seq_midi snd_seq_midi_event snd_seq
ide_generic tsdev shpchp snd_usb_usx2y snd_usb_lib pci_hotplug snd_rawmidi
snd_seq_device snd_hwdep snd_intel8x0 snd_ac97_codec snd_ac97_bus
snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd soundcore snd_page_alloc
sis_agp psmouse pcspkr serio_raw parport_pc parport
evdev floppy analog gameport ext3 jbd ide_cd cdrom ide_disk sis5513
generic ohci_hcd ide_core ehci_hcd sis900 mii thermal processor fan
CPU:    0
EIP:    0060:[<e112cf30>]    Not tainted VLI
EFLAGS: 00010296   (2.6.17-2-multimedia-486 #1)
EIP is at usX2Y_usbpcm_urbs_start+0x10/0x3ff [snd_usb_usx2y]
eax: 00000000   ebx: 00000000   ecx: 00000000   edx: dfc5b720
esi: df97765c   edi: df977718   ebp: dfdd25e0   esp: dbc8ddfc
ds: 007b   es: 007b   ss: 0068   preempt: 00000001
Process jackd (pid: 4338, threadinfo=dbc8c000 task=dfe1ec70
stack_left=7624 worst_left=-1)
Stack: de987de0 dfc5b720 0000ac44 df97765c de987de0 dc6fa0c0 e11312c2
de987e64
       00000021 00000000 dfe1ec70 c01272d0 dbc8de2c dbc8de2c 00000000
df97765c
       df977718 dfdd25e0 e112d3f5 df68fee0 dada8c00 dfc5b720 df68fee0
00000000
Call Trace:
 [<c01272d0>] autoremove_wake_function+0x0/0x3a (48)
 [<e112d3f5>] snd_usX2Y_usbpcm_prepare+0xd6/0x159 [snd_usb_usx2y] (28)
 [<e11078b3>] snd_pcm_do_prepare+0xc/0x25 [snd_pcm] (32)
 [<e11073ee>] snd_pcm_action_single+0x1b/0x3e [snd_pcm] (12)
 [<e11086e3>] snd_pcm_action_nonatomic+0x3e/0x50 [snd_pcm] (28)
 [<e110a4a3>] snd_pcm_common_ioctl1+0x5a3/0x6b1 [snd_pcm] (16)
 [<c0147dd6>] page_add_file_rmap+0x17/0x1a (4)
 [<c0142ae3>] follow_page+0x8d/0x146 (28)
 [<c0142b37>] follow_page+0xe1/0x146 (12)
 [<c0144816>] get_user_pages+0x228/0x280 (28)
 [<c0144917>] make_pages_present+0xa9/0xc2 (48)
 [<e110ace8>] snd_pcm_playback_ioctl1+0x393/0x3a9 [snd_pcm] (24)
 [<c0161e80>] do_ioctl+0x1c/0x62 (36)
 [<c0162107>] vfs_ioctl+0x241/0x254 (28)
 [<c0162162>] sys_ioctl+0x48/0x62 (36)
 [<c0102b67>] syscall_call+0x7/0xb (40)
Code: 81 b8 0a 02 00 00 07 80 74 0d ba 44 ac 00 00 89 c8 5b e9 8a ef ff ff
89 d0 5b c3 55 57 56 53 83 ec 38 89 44 24 04 89 c2 8b 40 04 <8b> 40 30 89
44 24 0c 8b 0a 89 4c 24 10 48 75 20 8b 81 f8 00 00
EIP: [<e112cf30>] usX2Y_usbpcm_urbs_start+0x10/0x3ff [snd_usb_usx2y]
SS:ESP 0068:dbc8ddfc

Issue History
Date Modified  Username       Field                    Change              
======================================================================
07-29-06 12:21 jaime          New Issue                                    
07-29-06 12:21 jaime          Distribution              => Debian Sid      
07-29-06 12:21 jaime          Kernel Version            => 2.6.17          
07-30-06 17:00 jaime          Note Added: 0011319                          
======================================================================



-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys -- and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Alsa-devel mailing list
Alsa-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/alsa-devel

[Index of Archives]     [ALSA User]     [Linux Audio Users]     [Kernel Archive]     [Asterisk PBX]     [Photo Sharing]     [Linux Sound]     [Video 4 Linux]     [Gimp]     [Yosemite News]

  Powered by Linux