On Wed, 2004-07-07 at 09:57, Alan Stern wrote:
>
> A stack trace (alt-SysRq-T) showing where the usbhid module is hung up
> would be helpful.
>
Here you go:
udevd S C039ACA0 0 188 1 6149 136 (NOTLB)
f7588eb4 00000086 f7bee090 c039aca0 c02fb044 000000d0 f5a3b470 00000001
00004b33 679fccfb 0000001a f7bee090 f7bee238 00000000 7fffffff
00000004
00000004 c02ba7b5 f74be7c0 00000008 00000003 c027254b f7584f60
f7fb5898
Call Trace:
[<c02ba7b5>] schedule_timeout+0xb5/0xc0
[<c027254b>] datagram_poll+0x2b/0xe0
[<c026c5d9>] sock_poll+0x29/0x40
[<c016216f>] do_select+0x18f/0x2d0
[<c0161e30>] __pollwait+0x0/0xd0
[<c016259f>] sys_select+0x2bf/0x4c0
[<c014f6d8>] vfs_read+0xb8/0x130
[<c011c987>] sys_waitpid+0x27/0x2b
[<c0104035>] sysenter_past_esp+0x52/0x71
hotplug S C039ACA0 0 4834 4 4835 (NOTLB)
f7aa2f3c 00000086 f76b31b0 c039aca0 c0114f3c f77432a0 f76e2e94 080e2fa8
0001b11a 0c6a6164 0000000e f76b31b0 f76b3358 fffffe00 f7aa2000
f76b3248
f76b3248 c011c884 ffffffff 00000000 f7c6a070 bffff7a4 f7aa2000
00000001
Call Trace:
[<c0114f3c>] do_page_fault+0x34c/0x549
[<c011c884>] sys_wait4+0x194/0x270
[<c0116830>] default_wake_function+0x0/0x20
[<c0116830>] default_wake_function+0x0/0x20
[<c0124670>] sys_rt_sigprocmask+0xa0/0x100
[<c011c987>] sys_waitpid+0x27/0x2b
[<c0104035>] sysenter_past_esp+0x52/0x71
usb.agent S C039ACA0 0 4835 4834 4857 (NOTLB)
f7aa8f3c 00000082 f7c6a070 c039aca0 c0114f3c f75fc880 f772e7b0 080e2fa8
00023623 1204286e 0000000e f7c6a070 f7c6a218 fffffe00 f7aa8000
f7c6a108
f7c6a108 c011c884 ffffffff 00000000 f76b20d0 bfffedf4 f7aa8000
00000001
Call Trace:
[<c0114f3c>] do_page_fault+0x34c/0x549
[<c011c884>] sys_wait4+0x194/0x270
[<c0116830>] default_wake_function+0x0/0x20
[<c0116830>] default_wake_function+0x0/0x20
[<c010673b>] do_IRQ+0x14b/0x1a0
[<c011c987>] sys_waitpid+0x27/0x2b
[<c0104035>] sysenter_past_esp+0x52/0x71
modprobe D C039ACA0 0 4857 4835 (NOTLB)
f6e2df3c 00000082 f76b20d0 c039aca0 00000001 c012fb68 f89c1000 00000019
0031dd45 1201f24b 0000000e f76b20d0 f76b2278 c033a404 f76b20d0
f76b20d0
c02fac60 c02baaad f89a4b8c f6cee4c0 c033a408 f7c33ed8 c033a408
f76b20d0
Call Trace:
[<c012fb68>] load_module+0x788/0xa30
[<c02baaad>] rwsem_down_write_failed+0x8d/0x195
[<c0250970>] .text.lock.usb+0x5a/0xaa
[<c024f95d>] usb_register+0x3d/0xb0
[<f896600f>] hid_init+0xf/0x2d [usbhid]
[<c012ff24>] sys_init_module+0x114/0x230
[<c0104035>] sysenter_past_esp+0x52/0x71
Jesse
--
Jesse Stockall <[EMAIL PROTECTED]>
-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 -
digital self defense, top technical experts, no vendor pitches,
unmatched networking opportunities. Visit www.blackhat.com
_______________________________________________
[EMAIL PROTECTED]
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel