diff options
author | Paul E. McKenney <paulmck@linux.vnet.ibm.com> | 2017-10-09 18:17:49 +0200 |
---|---|---|
committer | Paul E. McKenney <paulmck@linux.vnet.ibm.com> | 2017-12-04 19:52:52 +0100 |
commit | a4bd78ed215873a68869e41fd59543be8ca38e7f (patch) | |
tree | 9689b1715c8d03a51a718081235ad60385a5fdcd /security/inode.c | |
parent | doc: READ_ONCE() now implies smp_barrier_depends() (diff) | |
download | linux-a4bd78ed215873a68869e41fd59543be8ca38e7f.tar.xz linux-a4bd78ed215873a68869e41fd59543be8ca38e7f.zip |
mn10300: READ_ONCE() now implies smp_read_barrier_depends()
Given that READ_ONCE() now implies smp_read_barrier_depends(),
there is no need for the open-coded smp_read_barrier_depends() in
mn10300_serial_receive_interrupt() and mn10300_serial_poll_get_char().
This commit therefore removes them, but replaces them with comments
calling out that carrying dependencies through non-pointers is quite
dangerous. Compilers simply know too much about integers.
Signed-off-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Cc: David Howells <dhowells@redhat.com>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: <linux-am33-list@redhat.com>
Diffstat (limited to 'security/inode.c')
0 files changed, 0 insertions, 0 deletions