Searched refs:recursion (Results 1 – 3 of 3) sorted by relevance
440 int recursion; in context_tracking_recursion_enter() local442 recursion = __this_cpu_inc_return(context_tracking.recursion); in context_tracking_recursion_enter()443 if (recursion == 1) in context_tracking_recursion_enter()446 WARN_ONCE((recursion < 1), "Invalid context tracking recursion value %d\n", recursion); in context_tracking_recursion_enter()447 __this_cpu_dec(context_tracking.recursion); in context_tracking_recursion_enter()454 __this_cpu_dec(context_tracking.recursion); in context_tracking_recursion_exit()
213 static inline int get_recursion_context(u8 *recursion) in DEFINE_OUTPUT_COPY()217 if (recursion[rctx]) in DEFINE_OUTPUT_COPY()220 recursion[rctx]++; in DEFINE_OUTPUT_COPY()226 static inline void put_recursion_context(u8 *recursion, unsigned char rctx) in put_recursion_context() argument229 recursion[rctx]--; in put_recursion_context()
724 recursion or any unexpected execution path which leads to a kernel957 of protection against recursion. Even though the protection exists,960 that triggered a recursion.962 This will add more overhead to cases that have recursion.973 the functions that caused a recursion to happen.983 protection against recursion. This option is only to verify that996 The ring buffer has its own internal recursion. Although when997 recursion happens it won't cause harm because of the protection,999 place where recursion was detected into the ftrace "recursed_functions"1002 This will add more overhead to cases that have recursion.