On Wed, 2004-07-07 at 09:57, Alan Stern wrote: > > A stack trace (alt-SysRq-T) showing where the usbhid module is hung up > would be helpful. >
Here you go: udevd S C039ACA0 0 188 1 6149 136 (NOTLB) f7588eb4 00000086 f7bee090 c039aca0 c02fb044 000000d0 f5a3b470 00000001 00004b33 679fccfb 0000001a f7bee090 f7bee238 00000000 7fffffff 00000004 00000004 c02ba7b5 f74be7c0 00000008 00000003 c027254b f7584f60 f7fb5898 Call Trace: [<c02ba7b5>] schedule_timeout+0xb5/0xc0 [<c027254b>] datagram_poll+0x2b/0xe0 [<c026c5d9>] sock_poll+0x29/0x40 [<c016216f>] do_select+0x18f/0x2d0 [<c0161e30>] __pollwait+0x0/0xd0 [<c016259f>] sys_select+0x2bf/0x4c0 [<c014f6d8>] vfs_read+0xb8/0x130 [<c011c987>] sys_waitpid+0x27/0x2b [<c0104035>] sysenter_past_esp+0x52/0x71 hotplug S C039ACA0 0 4834 4 4835 (NOTLB) f7aa2f3c 00000086 f76b31b0 c039aca0 c0114f3c f77432a0 f76e2e94 080e2fa8 0001b11a 0c6a6164 0000000e f76b31b0 f76b3358 fffffe00 f7aa2000 f76b3248 f76b3248 c011c884 ffffffff 00000000 f7c6a070 bffff7a4 f7aa2000 00000001 Call Trace: [<c0114f3c>] do_page_fault+0x34c/0x549 [<c011c884>] sys_wait4+0x194/0x270 [<c0116830>] default_wake_function+0x0/0x20 [<c0116830>] default_wake_function+0x0/0x20 [<c0124670>] sys_rt_sigprocmask+0xa0/0x100 [<c011c987>] sys_waitpid+0x27/0x2b [<c0104035>] sysenter_past_esp+0x52/0x71 usb.agent S C039ACA0 0 4835 4834 4857 (NOTLB) f7aa8f3c 00000082 f7c6a070 c039aca0 c0114f3c f75fc880 f772e7b0 080e2fa8 00023623 1204286e 0000000e f7c6a070 f7c6a218 fffffe00 f7aa8000 f7c6a108 f7c6a108 c011c884 ffffffff 00000000 f76b20d0 bfffedf4 f7aa8000 00000001 Call Trace: [<c0114f3c>] do_page_fault+0x34c/0x549 [<c011c884>] sys_wait4+0x194/0x270 [<c0116830>] default_wake_function+0x0/0x20 [<c0116830>] default_wake_function+0x0/0x20 [<c010673b>] do_IRQ+0x14b/0x1a0 [<c011c987>] sys_waitpid+0x27/0x2b [<c0104035>] sysenter_past_esp+0x52/0x71 modprobe D C039ACA0 0 4857 4835 (NOTLB) f6e2df3c 00000082 f76b20d0 c039aca0 00000001 c012fb68 f89c1000 00000019 0031dd45 1201f24b 0000000e f76b20d0 f76b2278 c033a404 f76b20d0 f76b20d0 c02fac60 c02baaad f89a4b8c f6cee4c0 c033a408 f7c33ed8 c033a408 f76b20d0 Call Trace: [<c012fb68>] load_module+0x788/0xa30 [<c02baaad>] rwsem_down_write_failed+0x8d/0x195 [<c0250970>] .text.lock.usb+0x5a/0xaa [<c024f95d>] usb_register+0x3d/0xb0 [<f896600f>] hid_init+0xf/0x2d [usbhid] [<c012ff24>] sys_init_module+0x114/0x230 [<c0104035>] sysenter_past_esp+0x52/0x71 Jesse -- Jesse Stockall <[EMAIL PROTECTED]> ------------------------------------------------------- This SF.Net email sponsored by Black Hat Briefings & Training. Attend Black Hat Briefings & Training, Las Vegas July 24-29 - digital self defense, top technical experts, no vendor pitches, unmatched networking opportunities. Visit www.blackhat.com _______________________________________________ [EMAIL PROTECTED] To unsubscribe, use the last form field at: https://lists.sourceforge.net/lists/listinfo/linux-usb-devel