Re: Question: how could stack pointer overflow to high address?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Aug 29, 2013 at 12:59 PM, Lin Ming <minggr@xxxxxxxxx> wrote:
> Hi list,
>
> An application segmentation faults, as below.
> The stack pointer($29) at: 0x7ffcbd60
> The stack memory is:
> 7f86b000-7f880000 rwxp 00000000 00:00 0          [stack]
>
> I can understand stack overflow to low address, for example, due to
> very deep recursive call.
>
> But in this case, 0x7ffcbd60 > 0x7f880000
> The stack overflow to high address. How could it be possible?

Hi Ralf,

Any help on this question?

Thanks,
Lin Ming

>
> =====
>
> ssk/340: potentially unexpected fatal signal 11.
>
> Cpu 1
> $ 0   : 00000000 10008d00 00000001 00000001
> $ 4   : 00000001 ffffffff 00000000 7ffcbd84
> $ 8   : 00000007 00000002 00000020 fffffffc
> $12   : 00000807 00000800 00000400 00000008
> $16   : 2ace3466 7ffcbf10 0000000a 0000000a
> $20   : 004040b0 7ffcbda0 7ffcc7c8 7ffcbd84
> $24   : 00000000 2b070200
> $28   : 2b0b2560 7ffcbd60 7ffcbe20 2b069438
> Hi    : 00000000
> Lo    : 00000000
> epc   : 2b07023c 0x2b07023c
>     Tainted: P
> ra    : 2b069438 0x2b069438
> Status: 00008d13    USER EXL IE
> Cause : 80000008
> BadVA : 00000001
> PrId  : 0002a080 (Broadcom4350)
>
> Thanks,
> Lin Ming


[Index of Archives]     [Linux MIPS Home]     [LKML Archive]     [Linux ARM Kernel]     [Linux ARM]     [Linux]     [Git]     [Yosemite News]     [Linux SCSI]     [Linux Hams]

  Powered by Linux