mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-09-12 13:55:32 +00:00
41a2901e7d
The sparse-based checking for non-RCU accesses to RCU-protected pointers has been around for a very long time, and it is now the only type of sparse-based checking that is optional. This commit therefore makes it unconditional. Reported-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com> Cc: Fengguang Wu <fengguang.wu@intel.com> |
||
---|---|---|
.. | ||
Design | ||
00-INDEX | ||
arrayRCU.txt | ||
checklist.txt | ||
listRCU.txt | ||
lockdep-splat.txt | ||
lockdep.txt | ||
NMI-RCU.txt | ||
rcu.txt | ||
rcu_dereference.txt | ||
rcubarrier.txt | ||
rculist_nulls.txt | ||
rcuref.txt | ||
RTFP.txt | ||
stallwarn.txt | ||
torture.txt | ||
trace.txt | ||
UP.txt | ||
whatisRCU.txt |