Files
ubports_kernel_google_msm/arch/x86/kernel
Frederic Weisbecker c2c5d45d46 perf: Stop stack frame walking off kernel addresses boundaries
While processing kernel perf callchains, an bad entry can be
considered as a valid stack pointer but not as a kernel address.

In this case, we hang in an endless loop. This can happen in an
x86-32 kernel after processing the last entry in a kernel
stacktrace.

Just stop the stack frame walking after we encounter an invalid
kernel address.

This fixes a hard lockup in x86-32.

Signed-off-by: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Arnaldo Carvalho de Melo <acme@redhat.com>
Cc: Paul Mackerras <paulus@samba.org>
LKML-Reference: <1262227945-27014-1-git-send-regression-fweisbec@gmail.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2010-01-13 09:32:54 +01:00
..
2009-12-16 07:20:18 -08:00
2009-10-14 17:04:48 +02:00
2009-07-19 18:27:51 +02:00
2009-10-29 22:34:14 +09:00
2009-11-27 20:37:41 +01:00
2009-09-24 09:34:52 +09:30
2009-08-31 11:09:40 +02:00
2009-12-16 07:20:18 -08:00
2009-11-17 07:53:21 +01:00
2009-07-14 16:25:05 +02:00
2009-12-07 13:14:18 +01:00
2009-09-15 15:08:40 -04:00
2009-12-09 16:28:59 -08:00
2009-07-19 18:27:51 +02:00
2009-12-11 06:44:29 -05:00
2009-12-11 06:44:29 -05:00
2009-12-11 06:44:29 -05:00
2009-11-18 12:31:06 +01:00