On Thu, Aug 29, 2013 at 12:59 PM, Lin Ming <minggr@xxxxxxxxx> wrote: > Hi list, > > An application segmentation faults, as below. > The stack pointer($29) at: 0x7ffcbd60 > The stack memory is: > 7f86b000-7f880000 rwxp 00000000 00:00 0 [stack] > > I can understand stack overflow to low address, for example, due to > very deep recursive call. > > But in this case, 0x7ffcbd60 > 0x7f880000 > The stack overflow to high address. How could it be possible? Hi Ralf, Any help on this question? Thanks, Lin Ming > > ===== > > ssk/340: potentially unexpected fatal signal 11. > > Cpu 1 > $ 0 : 00000000 10008d00 00000001 00000001 > $ 4 : 00000001 ffffffff 00000000 7ffcbd84 > $ 8 : 00000007 00000002 00000020 fffffffc > $12 : 00000807 00000800 00000400 00000008 > $16 : 2ace3466 7ffcbf10 0000000a 0000000a > $20 : 004040b0 7ffcbda0 7ffcc7c8 7ffcbd84 > $24 : 00000000 2b070200 > $28 : 2b0b2560 7ffcbd60 7ffcbe20 2b069438 > Hi : 00000000 > Lo : 00000000 > epc : 2b07023c 0x2b07023c > Tainted: P > ra : 2b069438 0x2b069438 > Status: 00008d13 USER EXL IE > Cause : 80000008 > BadVA : 00000001 > PrId : 0002a080 (Broadcom4350) > > Thanks, > Lin Ming