On Wed, 2004-07-07 at 09:57, Alan Stern wrote:
> 
> A stack trace (alt-SysRq-T) showing where the usbhid module is hung up 
> would be helpful.
> 

Here you go:

udevd         S C039ACA0     0   188      1          6149   136 (NOTLB)
f7588eb4 00000086 f7bee090 c039aca0 c02fb044 000000d0 f5a3b470 00000001 
       00004b33 679fccfb 0000001a f7bee090 f7bee238 00000000 7fffffff
00000004 
       00000004 c02ba7b5 f74be7c0 00000008 00000003 c027254b f7584f60
f7fb5898 
Call Trace:
 [<c02ba7b5>] schedule_timeout+0xb5/0xc0
 [<c027254b>] datagram_poll+0x2b/0xe0
 [<c026c5d9>] sock_poll+0x29/0x40
 [<c016216f>] do_select+0x18f/0x2d0
 [<c0161e30>] __pollwait+0x0/0xd0
 [<c016259f>] sys_select+0x2bf/0x4c0
 [<c014f6d8>] vfs_read+0xb8/0x130
 [<c011c987>] sys_waitpid+0x27/0x2b
 [<c0104035>] sysenter_past_esp+0x52/0x71
hotplug       S C039ACA0     0  4834      4  4835               (NOTLB)
f7aa2f3c 00000086 f76b31b0 c039aca0 c0114f3c f77432a0 f76e2e94 080e2fa8 
       0001b11a 0c6a6164 0000000e f76b31b0 f76b3358 fffffe00 f7aa2000
f76b3248 
       f76b3248 c011c884 ffffffff 00000000 f7c6a070 bffff7a4 f7aa2000
00000001 
Call Trace:
 [<c0114f3c>] do_page_fault+0x34c/0x549
 [<c011c884>] sys_wait4+0x194/0x270
 [<c0116830>] default_wake_function+0x0/0x20
 [<c0116830>] default_wake_function+0x0/0x20
 [<c0124670>] sys_rt_sigprocmask+0xa0/0x100
 [<c011c987>] sys_waitpid+0x27/0x2b
 [<c0104035>] sysenter_past_esp+0x52/0x71
usb.agent     S C039ACA0     0  4835   4834  4857               (NOTLB)
f7aa8f3c 00000082 f7c6a070 c039aca0 c0114f3c f75fc880 f772e7b0 080e2fa8 
       00023623 1204286e 0000000e f7c6a070 f7c6a218 fffffe00 f7aa8000
f7c6a108 
       f7c6a108 c011c884 ffffffff 00000000 f76b20d0 bfffedf4 f7aa8000
00000001 
Call Trace:
 [<c0114f3c>] do_page_fault+0x34c/0x549
 [<c011c884>] sys_wait4+0x194/0x270
 [<c0116830>] default_wake_function+0x0/0x20
 [<c0116830>] default_wake_function+0x0/0x20
 [<c010673b>] do_IRQ+0x14b/0x1a0
 [<c011c987>] sys_waitpid+0x27/0x2b
 [<c0104035>] sysenter_past_esp+0x52/0x71
modprobe      D C039ACA0     0  4857   4835                     (NOTLB)
f6e2df3c 00000082 f76b20d0 c039aca0 00000001 c012fb68 f89c1000 00000019 
       0031dd45 1201f24b 0000000e f76b20d0 f76b2278 c033a404 f76b20d0
f76b20d0 
       c02fac60 c02baaad f89a4b8c f6cee4c0 c033a408 f7c33ed8 c033a408
f76b20d0 
Call Trace:
 [<c012fb68>] load_module+0x788/0xa30
 [<c02baaad>] rwsem_down_write_failed+0x8d/0x195
 [<c0250970>] .text.lock.usb+0x5a/0xaa
 [<c024f95d>] usb_register+0x3d/0xb0
 [<f896600f>] hid_init+0xf/0x2d [usbhid]
 [<c012ff24>] sys_init_module+0x114/0x230
 [<c0104035>] sysenter_past_esp+0x52/0x71

Jesse

-- 
Jesse Stockall <[EMAIL PROTECTED]>



-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com
_______________________________________________
[EMAIL PROTECTED]
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel

Reply via email to