Question: how could stack pointer overflow to high address?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi list,

An application segmentation faults, as below.
The stack pointer($29) at: 0x7ffcbd60
The stack memory is:
7f86b000-7f880000 rwxp 00000000 00:00 0          [stack]

I can understand stack overflow to low address, for example, due to
very deep recursive call.

But in this case, 0x7ffcbd60 > 0x7f880000
The stack overflow to high address. How could it be possible?

=====

ssk/340: potentially unexpected fatal signal 11.

Cpu 1
$ 0   : 00000000 10008d00 00000001 00000001
$ 4   : 00000001 ffffffff 00000000 7ffcbd84
$ 8   : 00000007 00000002 00000020 fffffffc
$12   : 00000807 00000800 00000400 00000008
$16   : 2ace3466 7ffcbf10 0000000a 0000000a
$20   : 004040b0 7ffcbda0 7ffcc7c8 7ffcbd84
$24   : 00000000 2b070200
$28   : 2b0b2560 7ffcbd60 7ffcbe20 2b069438
Hi    : 00000000
Lo    : 00000000
epc   : 2b07023c 0x2b07023c
    Tainted: P
ra    : 2b069438 0x2b069438
Status: 00008d13    USER EXL IE
Cause : 80000008
BadVA : 00000001
PrId  : 0002a080 (Broadcom4350)

Thanks,
Lin Ming


[Index of Archives]     [Linux MIPS Home]     [LKML Archive]     [Linux ARM Kernel]     [Linux ARM]     [Linux]     [Git]     [Yosemite News]     [Linux SCSI]     [Linux Hams]

  Powered by Linux