linux-mips
[Top] [All Lists]

Question: how could stack pointer overflow to high address?

To: linux-mips@linux-mips.org
Subject: Question: how could stack pointer overflow to high address?
From: Lin Ming <minggr@gmail.com>
Date: Thu, 29 Aug 2013 12:59:23 +0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=zSc4YBLD1YRx5XNrh1s0Cd/tjL7ecsx8lURs8pt3JDc=; b=X07AwCD93yXLxjLDCd1hbuYsGALDhkvwbenxbQVQdfhnpbd0n7g8d0dZGoDzJkTiw9 ZV+XCMOxdBulaJbLjwzJuimTju2d8AyA10RvbnMEOuxDoCmKX3Z5kpUMTKKW1FLQtyVN 2Jb8cXZ1CpRLNe4Ai82flVxZ11zLi6aXqawbaP9sjoSTpLD2jPyoZKOn5iRVCywA6+u7 qVqbJMZG+yt7wxKp39IqOAsFbKHkRXbwmAKgIodUIWLDofAQJY6/9JqDnXKmDn/qKOCP gZK3iY2W2ANlwwaoAYr23zg+navivoww3dztpV+ZASn+xoWdFoSldgf8CS2He0+1chXY oDFg==
List-archive: <http://www.linux-mips.org/archives/linux-mips/>
List-help: <mailto:ecartis@linux-mips.org?Subject=help>
List-id: linux-mips <linux-mips.eddie.linux-mips.org>
List-owner: <mailto:ralf@linux-mips.org>
List-post: <mailto:linux-mips@linux-mips.org>
List-software: Ecartis version 1.0.0
List-subscribe: <mailto:ecartis@linux-mips.org?subject=subscribe%20linux-mips>
List-unsubscribe: <mailto:ecartis@linux-mips.org?subject=unsubscribe%20linux-mips>
Original-recipient: rfc822;linux-mips@linux-mips.org
Sender: linux-mips-bounce@linux-mips.org
Hi list,

An application segmentation faults, as below.
The stack pointer($29) at: 0x7ffcbd60
The stack memory is:
7f86b000-7f880000 rwxp 00000000 00:00 0          [stack]

I can understand stack overflow to low address, for example, due to
very deep recursive call.

But in this case, 0x7ffcbd60 > 0x7f880000
The stack overflow to high address. How could it be possible?

=====

ssk/340: potentially unexpected fatal signal 11.

Cpu 1
$ 0   : 00000000 10008d00 00000001 00000001
$ 4   : 00000001 ffffffff 00000000 7ffcbd84
$ 8   : 00000007 00000002 00000020 fffffffc
$12   : 00000807 00000800 00000400 00000008
$16   : 2ace3466 7ffcbf10 0000000a 0000000a
$20   : 004040b0 7ffcbda0 7ffcc7c8 7ffcbd84
$24   : 00000000 2b070200
$28   : 2b0b2560 7ffcbd60 7ffcbe20 2b069438
Hi    : 00000000
Lo    : 00000000
epc   : 2b07023c 0x2b07023c
    Tainted: P
ra    : 2b069438 0x2b069438
Status: 00008d13    USER EXL IE
Cause : 80000008
BadVA : 00000001
PrId  : 0002a080 (Broadcom4350)

Thanks,
Lin Ming

<Prev in Thread] Current Thread [Next in Thread>
  • Question: how could stack pointer overflow to high address?, Lin Ming <=