[Bug 434] Shark on ARM SIGSEGV from null pointer in $r2 instead of %stack_pointer_addr
bugzilla-daemon at icedtea.classpath.org
bugzilla-daemon at icedtea.classpath.org
Fri Jan 22 08:23:57 PST 2010
http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=434
------- Comment #4 from xerxes at zafena.se 2010-01-22 16:23 -------
smells like stack corrupton:
0x40d2216c: stack_word[1] = 0x00000000
0x40d22170: stack_word[0] = 0x40df5140
0x40d22174: oop_tmp = 0x00023f38 <---- this are the
stack pointer addr
0x40d22178: method = MethodAtom.arithmeticSeries(I)I
0x40d2217c: unextended_sp = 0x40d22164
0x40d22180: pc = 0x40e458d4 (bci 11)
0x40d22184: frame_type = SHARK_FRAME
0x40d22188: next_frame = 0x40d221ac
as can be seen in the gdb single instruction step before crash log the code
pops the stack before entering the frame where the crash happened. so this next
fame are wher the crash happened
0x40d2218c: local[2] = 0x00000001
0x40d22190: local[1] = 0x455f9290
0x40d22194: local[0] = 0x40d221f0
0x40d22198: oop_tmp = 0x000001e0 <--- aha! this is
0x0+#480
0x40d2219c: method = MethodAtom.arithmeticSeries(I)I
0x40d221a0: unextended_sp = 0x40d22188
0x40d221a4: pc = 0x40e458d4 (bci 11)
0x40d221a8: frame_type = SHARK_FRAME
0x40d221ac: next_frame = 0x40d221d0
0x40d221b0: local[2] = 0x00000002
0x40d221b4: local[1] = 0x455f9290
0x40d221b8: local[0] = 0x630465c0
0x40d221bc: oop_tmp = 0x40d22214
0x40d221c0: method = MethodAtom.arithmeticSeries(I)I
0x40d221c4: unextended_sp = 0x40d221ac
0x40d221c8: pc = 0x40e458d4 (bci 11)
0x40d221cc: frame_type = SHARK_FRAME
0x40d221d0: next_frame = 0x40d221f4
--
Configure bugmail: http://icedtea.classpath.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the distro-pkg-dev
mailing list