On Fri, 14 Nov 2014 08:44:12 -0500, kan liang wrote:
> +             /* LBR only affects the user callchain */
> +             if (i != chain_nr) {
> +                     struct branch_stack *lbr_stack = sample->branch_stack;
> +                     int lbr_nr = lbr_stack->nr;
> +                     /*
> +                      * LBR callstack can only get user call chain.
> +                      * The mix_chain_nr is kernel call chain
> +                      * number plus LBR user call chain number.
> +                      * i is kernel call chain number,
> +                      * 1 is PERF_CONTEXT_USER,
> +                      * lbr_nr + 1 is the user call chain number.
> +                      * For details, please refer to the comments
> +                      * in callchain__printf
> +                      */
> +                     int mix_chain_nr = i + 1 + lbr_nr + 1;
> +
> +                     if (mix_chain_nr > PERF_MAX_STACK_DEPTH) {
> +                             pr_warning("corrupted callchain. 
> skipping...\n");
> +                             return 0;
> +                     }

I'm not sure whether this is really a corrupted callchain.  If a single
chain is greater than the max it should be corrupted, but we're now
summing up with other values..

What about checking callchain_nr and lbr_nr separately or mix_nr with
2*max?

Thanks,
Namhyung
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to