On Apr 13 2019, Michael Schmitz <[email protected]> wrote: > I'm not convinced the call trace shown on 060 makes much sense at all: > > [5071106.760000] systemd-udevd S 0 175 1 0x00000000 > [5071106.770000] Stack from 0749dfcc: > 0000000a ef915664 00000009 ffffffff ffffffff > c02a0d00 > 000000fb 000000fb 00000000 0018c00f ca980080 > [5071106.780000] Call Trace: [<0018c00f>] falcon_decode_var+0x46b/0x912 > > That's on Amiga. Should not run any code from atafb.c at all.
That's just a random user-space pointer that happens to match a code address in the kernel space (an insn address can never be odd). Andreas. -- Andreas Schwab, [email protected] GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510 2552 DF73 E780 A9DA AEC1 "And now for something completely different."
