Re: Oopses and invalid addresses under Hatari

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Apr 13 2019, Michael Schmitz <schmitzmic@xxxxxxxxx> wrote:

I'm not convinced the call trace shown on 060 makes much sense at all:

[5071106.760000] systemd-udevd   S    0   175      1 0x00000000
[5071106.770000] Stack from 0749dfcc:
                         0000000a ef915664 00000009 ffffffff ffffffff
c02a0d00
                         000000fb 000000fb 00000000 0018c00f ca980080
[5071106.780000] Call Trace: [<0018c00f>] falcon_decode_var+0x46b/0x912

That's on Amiga. Should not run any code from atafb.c at all.

That's just a random user-space pointer that happens to match a code
address in the kernel space (an insn address can never be odd).

Andreas.

-- 
Andreas Schwab, schwab@xxxxxxxxxxxxxx
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



[Index of Archives]     [Video for Linux]     [Yosemite News]     [Linux S/390]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux