/Linux-v5.4/kernel/ |
D | context_tracking.c | 36 int recursion; in context_tracking_recursion_enter() local 38 recursion = __this_cpu_inc_return(context_tracking.recursion); in context_tracking_recursion_enter() 39 if (recursion == 1) in context_tracking_recursion_enter() 42 WARN_ONCE((recursion < 1), "Invalid context tracking recursion value %d\n", recursion); in context_tracking_recursion_enter() 43 __this_cpu_dec(context_tracking.recursion); in context_tracking_recursion_enter() 50 __this_cpu_dec(context_tracking.recursion); in context_tracking_recursion_exit()
|
D | gen_kheaders.sh | 79 --owner=0 --group=0 --numeric-owner --no-recursion \
|
/Linux-v5.4/kernel/events/ |
D | internal.h | 205 static inline int get_recursion_context(int *recursion) in DEFINE_OUTPUT_COPY() 218 if (recursion[rctx]) in DEFINE_OUTPUT_COPY() 221 recursion[rctx]++; in DEFINE_OUTPUT_COPY() 227 static inline void put_recursion_context(int *recursion, int rctx) in put_recursion_context() argument 230 recursion[rctx]--; in put_recursion_context()
|
D | core.c | 8217 int recursion[PERF_NR_CONTEXTS]; member 8419 return get_recursion_context(swhash->recursion); in perf_swevent_get_recursion_context() 8427 put_recursion_context(swhash->recursion, rctx); in perf_swevent_put_recursion_context()
|
/Linux-v5.4/Documentation/kbuild/ |
D | issues.rst | 8 .. literalinclude:: Kconfig.recursion-issue-01 14 .. literalinclude:: Kconfig.recursion-issue-02
|
D | Kconfig.recursion-issue-01 | 6 # make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-01 allnoconfig 36 # Reading the Documentation/kbuild/Kconfig.recursion-issue-01 file it may be
|
D | Kconfig.recursion-issue-02 | 6 # make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-02 allnoconfig 23 # The example provided in Documentation/kbuild/Kconfig.recursion-issue-02
|
D | kconfig-language.rst | 558 Read: Documentation/kbuild/Kconfig.recursion-issue-01 562 make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-01 allnoconfig 567 Read: Documentation/kbuild/Kconfig.recursion-issue-02 571 make KBUILD_KCONFIG=Documentation/kbuild/Kconfig.recursion-issue-02 allnoconfig 588 Documentation/kbuild/Kconfig.recursion-issue-01 through the removal 594 Documentation/kbuild/Kconfig.recursion-issue-02.
|
/Linux-v5.4/crypto/ |
D | algboss.c | 125 int recursion = 0; in cryptomgr_schedule_probe() local 131 recursion++; in cryptomgr_schedule_probe() 132 else if (*p == ')' && !recursion--) in cryptomgr_schedule_probe()
|
/Linux-v5.4/tools/testing/selftests/exec/ |
D | .gitignore | 9 /recursion-depth
|
D | Makefile | 11 TEST_GEN_PROGS += recursion-depth
|
/Linux-v5.4/include/linux/ |
D | context_tracking_state.h | 16 int recursion; member
|
D | netdevice.h | 2996 u16 recursion; member 3036 return this_cpu_read(softnet_data.xmit.recursion); in dev_recursion_level() 3042 return unlikely(__this_cpu_read(softnet_data.xmit.recursion) > in dev_xmit_recursion() 3048 __this_cpu_inc(softnet_data.xmit.recursion); in dev_xmit_recursion_inc() 3053 __this_cpu_dec(softnet_data.xmit.recursion); in dev_xmit_recursion_dec()
|
/Linux-v5.4/Documentation/trace/ |
D | ftrace-uses.rst | 133 make sure that recursion of the function does not occur. That is, 137 safe from recursion, it can set this flag to disable the ftrace 140 Note, if this flag is set, and recursion does occur, it could cause 144 callback that is marked recursion safe. Recursion safe callbacks
|
/Linux-v5.4/Documentation/core-api/ |
D | gfp_mask-from-fs-io.rst | 14 allocating memory to prevent recursion deadlocks caused by direct
|
D | memory-allocation.rst | 74 prevent recursion deadlocks caused by direct memory reclaim calling
|
/Linux-v5.4/Documentation/locking/ |
D | lockdep-design.rst | 129 referred to as lock recursion deadlock. 138 to lock recursion deadlocks. 313 recursion must not be higher than 20.
|
/Linux-v5.4/tools/objtool/ |
D | check.c | 124 int recursion) in __dead_end_function() argument 191 if (recursion == 5) { in __dead_end_function() 200 return __dead_end_function(file, dest->func, recursion+1); in __dead_end_function()
|
/Linux-v5.4/Documentation/crypto/ |
D | async-tx-api.txt | 118 results in recursion in the synchronous case and spin_locks being
|
/Linux-v5.4/Documentation/filesystems/ |
D | locking.rst | 585 ops FS recursion Held locks when called 594 FS recursion means calling ->quota_read() and ->quota_write() from superblock
|
D | path-lookup.rst | 981 further limit of eight on the maximum depth of recursion, but that was 1117 complex in part because of the desire to handle tail recursion. When
|
/Linux-v5.4/kernel/trace/ |
D | Kconfig | 490 recursion or any unexpected execution path which leads to a kernel
|
/Linux-v5.4/Documentation/kernel-hacking/ |
D | hacking.rst | 146 Avoid deep recursion and huge local arrays on the stack (allocate
|
/Linux-v5.4/Documentation/security/keys/ |
D | core.rst | 625 checked for keys before recursion into its children occurs.
|
/Linux-v5.4/init/ |
D | Kconfig | 693 be NMI messages, another one - printk recursion. The messages are
|