Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755322Ab3JIV3c (ORCPT ); Wed, 9 Oct 2013 17:29:32 -0400 Received: from e38.co.us.ibm.com ([32.97.110.159]:45551 "EHLO e38.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753951Ab3JIV3a (ORCPT ); Wed, 9 Oct 2013 17:29:30 -0400 Date: Wed, 9 Oct 2013 14:29:20 -0700 From: "Paul E. McKenney" To: linux-kernel@vger.kernel.org Cc: mingo@kernel.org, laijs@cn.fujitsu.com, dipankar@in.ibm.com, akpm@linux-foundation.org, mathieu.desnoyers@efficios.com, josh@joshtriplett.org, niv@us.ibm.com, tglx@linutronix.de, peterz@infradead.org, rostedt@goodmis.org, dhowells@redhat.com, edumazet@google.com, darren@dvhart.com, fweisbec@gmail.com, sbw@mit.edu, fengguang.wu@intel.com, stephen@networkplumber.org, davem@davemloft.net, bridge@lists.linux-foundation.org, netdev@vger.kernel.org, tgraf@suug.ch, gaofeng@cn.fujitsu.com, linux-decnet-user@lists.sourceforge.net, kuznet@ms2.inr.ac.ru, jmorris@namei.org, yoshfuji@linux-ipv6.org, kaber@trash.net, linville@tuxdriver.com, johannes@sipsolutions.net Subject: [PATCH v2 tip/core/rcu 0/13] Sparse-related updates for 3.13 Message-ID: <20131009212920.GA15413@linux.vnet.ibm.com> Reply-To: paulmck@linux.vnet.ibm.com MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-MML: No X-Content-Scanned: Fidelis XPS MAILER x-cbid: 13100921-1344-0000-0000-0000024E8130 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1598 Lines: 42 Hello! This series features updates to allow sparse to do a better job of statically analyzing RCU usage: 1. Apply ACCESS_ONCE() to rcu_assign_pointer()'s target to prevent comiler mischief. Also require that the source pointer be from the kernel address space. Sometimes it can be from the RCU address space, which necessitates the remaining patches in this series. Which, it must be admitted, apply to a very small fraction of the rcu_assign_pointer() invocations in the kernel. This commit courtesy of Josh Triplett. 2-13. Apply rcu_access_pointer() to avoid a number of false positives. Changes from v1: o Fix grammar nit in commit logs. Thanx, Paul b/drivers/net/bonding/bond_alb.c | 3 ++- b/drivers/net/bonding/bond_main.c | 8 +++++--- b/include/linux/rcupdate.h | 12 +++++++++++- b/kernel/notifier.c | 2 +- b/net/bridge/br_mdb.c | 2 +- b/net/bridge/br_multicast.c | 4 ++-- b/net/decnet/dn_route.c | 5 +++-- b/net/ipv4/ip_sockglue.c | 2 +- b/net/ipv6/ip6_gre.c | 2 +- b/net/ipv6/ip6_tunnel.c | 2 +- b/net/ipv6/sit.c | 2 +- b/net/mac80211/sta_info.c | 4 ++-- b/net/wireless/scan.c | 14 +++++++------- 13 files changed, 38 insertions(+), 24 deletions(-) -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/