----------------------------------------------------------------------------------
@MSGID: <6bm*d+FtA@news.chiark.greenend.org.uk>
c06f328e
@REPLY: <10h7212$9mii$1@dont-email.me> 09b7852f
@PID: PyGate 1.5.2
@TID: PyGate/Linux 1.5.2
@CHRS: ASCII 1
@TZUTC: 0000
@REPLYADDR theom+news@chiark.greenend.org.uk
@REPLYTO 3:633/10 UUCP
bp@www.zefox.net wrote:
> [apologies for the wide lines]
>
> Theo <
theom+news@chiark.greenend.org.uk> wrote:
> >
> > Depending on what kind of device it appears as (serial, keyboard, mass
> > storage, network, ...) see if you can work out what other app might have
> > grabbed it. (`sudo lsof` is handy here, if it appears as a device node that
> > you can grep for)
>
> Sudo lsof is loquatious, but not obviously informative. These tests were
> on a Pi5 running up-to-date Bookworm, but the behavior is outwardly the
> same as Trixie on Pi2.
What I`m looking for is something having grabbed the USB device. This is
hard to specify without knowing how the OWON does its USB, but for example
if it was serial I`d `lsof | grep /dev/tty` and look for things using the
/dev/ttyUSB0 or /devttyACM0 device the OWON probably uses.
Since the OWON app has failed to grab the USB you`re looking for other apps
that have grabbed it, ie not at the OWON app.
Theo
--- PyGate Linux v1.5.2
* Origin: Dragon`s Lair, PyGate NNTP<>Fido Gate (3:633/10)
SEEN-BY: 19/10 50/109 153/757 218/840 840 220/70
221/1 6 360 226/17 100
SEEN-BY: 229/426 240/1120 267/800 301/1 113 812
310/31 335/364 341/66 463/68
SEEN-BY: 633/10 280 414 418 420 422 509 2744
712/848 770/1 3 100 340 350
SEEN-BY: 772/210 220 230 5019/40 5020/715 848 1042
4441 12000 5030/49 722
SEEN-BY: 5030/1081 1474 5053/55 5061/133 5075/128
@PATH: 633/10 280 770/1 218/840 221/6 301/1
5020/1042 4441