diff options
author | Matthew Wilcox (Oracle) <willy@infradead.org> | 2023-08-18 22:08:24 +0200 |
---|---|---|
committer | Christian Brauner <brauner@kernel.org> | 2023-08-19 12:12:12 +0200 |
commit | 35931eb3945b8d38c31f8e956aee3cf31c52121b (patch) | |
tree | b63a6f1a4750f4542363699ba9d3e71ce22bc9f7 /fs/namei.c | |
parent | devpts: Fix kernel-doc warnings (diff) | |
download | linux-35931eb3945b8d38c31f8e956aee3cf31c52121b.tar.xz linux-35931eb3945b8d38c31f8e956aee3cf31c52121b.zip |
fs: Fix kernel-doc warnings
These have a variety of causes and a corresponding variety of solutions.
Signed-off-by: "Matthew Wilcox (Oracle)" <willy@infradead.org>
Message-Id: <20230818200824.2720007-1-willy@infradead.org>
Signed-off-by: Christian Brauner <brauner@kernel.org>
Diffstat (limited to 'fs/namei.c')
-rw-r--r-- | fs/namei.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/fs/namei.c b/fs/namei.c index 2bae29ea52ff..567ee547492b 100644 --- a/fs/namei.c +++ b/fs/namei.c @@ -643,6 +643,8 @@ static bool nd_alloc_stack(struct nameidata *nd) /** * path_connected - Verify that a dentry is below mnt.mnt_root + * @mnt: The mountpoint to check. + * @dentry: The dentry to check. * * Rename can sometimes move a file or directory outside of a bind * mount, path_connected allows those cases to be detected. @@ -1083,6 +1085,7 @@ fs_initcall(init_fs_namei_sysctls); /** * may_follow_link - Check symlink following for unsafe situations * @nd: nameidata pathwalk data + * @inode: Used for idmapping. * * In the case of the sysctl_protected_symlinks sysctl being enabled, * CAP_DAC_OVERRIDE needs to be specifically ignored if the symlink is |