The sparse-based checking for non-RCU accesses to RCU-protected pointers has been around for a very long time, and it is now the only type of sparse-based checking that is optional. This commit therefore makes it unconditional. Reported-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com> Cc: Fengguang Wu <fengguang.wu@intel.com> |
||
|---|---|---|
| .. | ||
| coccinelle.rst | ||
| conf.py | ||
| gcov.rst | ||
| gdb-kernel-debugging.rst | ||
| index.rst | ||
| kasan.rst | ||
| kcov.rst | ||
| kmemcheck.rst | ||
| kmemleak.rst | ||
| sparse.rst | ||
| ubsan.rst | ||