On Apr 13 2019, Michael Schmitz <[email protected]> wrote:

> I'm not convinced the call trace shown on 060 makes much sense at all:
>
> [5071106.760000] systemd-udevd   S    0   175      1 0x00000000
> [5071106.770000] Stack from 0749dfcc:
>                          0000000a ef915664 00000009 ffffffff ffffffff
> c02a0d00
>                          000000fb 000000fb 00000000 0018c00f ca980080
> [5071106.780000] Call Trace: [<0018c00f>] falcon_decode_var+0x46b/0x912
>
> That's on Amiga. Should not run any code from atafb.c at all.

That's just a random user-space pointer that happens to match a code
address in the kernel space (an insn address can never be odd).

Andreas.

-- 
Andreas Schwab, [email protected]
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."

Reply via email to