/linux/kernel/ |
A D | context_tracking.c | 36 int recursion; in context_tracking_recursion_enter() local 38 recursion = __this_cpu_inc_return(context_tracking.recursion); in context_tracking_recursion_enter() 39 if (recursion == 1) in context_tracking_recursion_enter() 42 WARN_ONCE((recursion < 1), "Invalid context tracking recursion value %d\n", recursion); in context_tracking_recursion_enter() 43 __this_cpu_dec(context_tracking.recursion); in context_tracking_recursion_enter() 50 __this_cpu_dec(context_tracking.recursion); in context_tracking_recursion_exit()
|
A D | gen_kheaders.sh | 88 --owner=0 --group=0 --numeric-owner --no-recursion \
|
/linux/kernel/events/ |
A D | internal.h | 206 static inline int get_recursion_context(int *recursion) in DEFINE_OUTPUT_COPY() 210 if (recursion[rctx]) in DEFINE_OUTPUT_COPY() 213 recursion[rctx]++; in DEFINE_OUTPUT_COPY() 219 static inline void put_recursion_context(int *recursion, int rctx) in put_recursion_context() argument 222 recursion[rctx]--; in put_recursion_context()
|
/linux/Documentation/kbuild/ |
A D | issues.rst | 8 .. literalinclude:: Kconfig.recursion-issue-01 14 .. literalinclude:: Kconfig.recursion-issue-02
|
A D | Kconfig.recursion-issue-01 | 6 # make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-01 allnoconfig 36 # Reading the Documentation/kbuild/Kconfig.recursion-issue-01 file it may be
|
A D | Kconfig.recursion-issue-02 | 6 # make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-02 allnoconfig 23 # The example provided in Documentation/kbuild/Kconfig.recursion-issue-02
|
A D | kconfig-language.rst | 596 Read: Documentation/kbuild/Kconfig.recursion-issue-01 600 make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-01 allnoconfig 605 Read: Documentation/kbuild/Kconfig.recursion-issue-02 609 make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-02 allnoconfig 626 Documentation/kbuild/Kconfig.recursion-issue-01 through the removal 632 Documentation/kbuild/Kconfig.recursion-issue-02.
|
/linux/crypto/ |
A D | algboss.c | 106 int recursion = 0; in cryptomgr_schedule_probe() local 112 recursion++; in cryptomgr_schedule_probe() 113 else if (*p == ')' && !recursion--) in cryptomgr_schedule_probe()
|
/linux/Documentation/trace/ |
A D | ftrace-uses.rst | 33 There are helper functions to help against recursion, and making sure 116 recursion protection must be used. There are two helper functions that 138 ftrace_test_recursion_trylock() to record where the recursion happened 143 for recursion for the callback and no recursion test needs to be done. 184 By default, it is expected that the callback can handle recursion. 186 setting this bit will add the recursion protection around the 187 callback by calling a helper function that will do the recursion 190 Note, if this flag is not set, and recursion does occur, it could
|
/linux/tools/testing/selftests/exec/ |
A D | .gitignore | 11 /recursion-depth
|
A D | Makefile | 12 TEST_GEN_PROGS += recursion-depth
|
/linux/include/linux/ |
A D | context_tracking_state.h | 16 int recursion; member
|
A D | netdevice.h | 3350 u16 recursion; member 3390 return this_cpu_read(softnet_data.xmit.recursion); in dev_recursion_level() 3396 return unlikely(__this_cpu_read(softnet_data.xmit.recursion) > in dev_xmit_recursion() 3402 __this_cpu_inc(softnet_data.xmit.recursion); in dev_xmit_recursion_inc() 3407 __this_cpu_dec(softnet_data.xmit.recursion); in dev_xmit_recursion_dec()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
A D | recursion.c | 10 struct recursion *skel; in test_recursion()
|
/linux/kernel/trace/ |
A D | Kconfig | 620 recursion or any unexpected execution path which leads to a kernel 837 of protection against recursion. Even though the protection exists, 840 that triggered a recursion. 842 This will add more overhead to cases that have recursion. 853 the functions that caused a recursion to happen. 863 The ring buffer has its own internal recursion. Although when 864 recursion happens it wont cause harm because of the protection, 866 place where recursion was detected into the ftrace "recursed_functions" 869 This will add more overhead to cases that have recursion.
|
/linux/security/tomoyo/ |
A D | util.c | 437 u8 recursion = 20; in tomoyo_correct_word2() local 474 if (!recursion--) in tomoyo_correct_word2()
|
/linux/Documentation/core-api/ |
A D | gfp_mask-from-fs-io.rst | 14 allocating memory to prevent recursion deadlocks caused by direct
|
A D | memory-allocation.rst | 74 prevent recursion deadlocks caused by direct memory reclaim calling
|
/linux/Documentation/locking/ |
A D | lockdep-design.rst | 132 referred to as lock recursion deadlock. 141 to lock recursion deadlocks. 316 recursion must not be higher than 20.
|
/linux/Documentation/crypto/ |
A D | async-tx-api.rst | 144 results in recursion in the synchronous case and spin_locks being
|
/linux/lib/ |
A D | Kconfig.kcsan | 63 deadlocks or recursion. If in doubt, say N.
|
/linux/tools/objtool/ |
A D | check.c | 156 int recursion) in __dead_end_function() argument 226 if (recursion == 5) { in __dead_end_function() 235 return __dead_end_function(file, dest->func, recursion+1); in __dead_end_function()
|
/linux/Documentation/filesystems/ |
A D | locking.rst | 615 ops FS recursion Held locks when called 624 FS recursion means calling ->quota_read() and ->quota_write() from superblock
|
/linux/arch/um/drivers/ |
A D | Kconfig | 363 # in theory, just VIRTIO is enough, but that causes recursion
|
/linux/Documentation/kernel-hacking/ |
A D | hacking.rst | 146 Avoid deep recursion and huge local arrays on the stack (allocate
|