41a2901e7d
The sparse-based checking for non-RCU accesses to RCU-protected pointers has been around for a very long time, and it is now the only type of sparse-based checking that is optional. This commit therefore makes it unconditional. Reported-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com> Cc: Fengguang Wu <fengguang.wu@intel.com> |
||
---|---|---|
.. | ||
coccinelle.rst | ||
conf.py | ||
gcov.rst | ||
gdb-kernel-debugging.rst | ||
index.rst | ||
kasan.rst | ||
kcov.rst | ||
kmemcheck.rst | ||
kmemleak.rst | ||
sparse.rst | ||
ubsan.rst |