Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp1891907pxb; Sun, 18 Apr 2021 10:19:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzBPyFraO0oW7y+1VpO6JWRHlPmFI3eM1FF7CZxjU/o/bXhuIEMDs7Oeq9rGNFGhEWwmWjR X-Received: by 2002:a17:90a:c3:: with SMTP id v3mr21212327pjd.55.1618766393168; Sun, 18 Apr 2021 10:19:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618766393; cv=none; d=google.com; s=arc-20160816; b=jihrZfH3/rkSSD/QPkfz1cysOnvCTdMsi4dFkHd62mfS9FaPGNosO1FanZYjt/A41N lG+y40I7yamgd7ID4mApWzKYqshinl5KLwCtlBw5O7JO83bqXOcV/wQryiFriBNH7KKw 6pfmpgLJONu7srNUOBiWbzaYoAX5PBgfyh4ul4y2CmJ7m+bIONrgrmNpcUqWtc3AIrsy V0pijXaV/VnYYGzkAKIZIhqxyRCwQW/oGk4UOHqKlthRcf7X+TIWe9SnK0ziPmnYzyMN PPxDQVgwQia13hCy256qCSGtsGoNqjQv6psMuDDMP5A0h4PFdDRtEISB9EoVo/+fnQdD TUqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=IfPbDvRpVXNZkCjTosV0fhdI0kbeai9mwZx1gjVjW1U=; b=r4UD/NxsB8qLNoJfBUiySUqjq4edUecwunbMsQEDZo0mahO3CsCtmC8rkrk7MtcYjE yp+SXhn6BiWFplEaIfnEonqVAKJ3KXe7DbM8HuqgJOtjBlzoiekyRCrL73Z8KuLJGj+Q 4Snwk1yFbY8Bexbh+yYlbaodrkNl9QMXaP+w0ciKfPViSfGQbTLnWe37Sszvw+DztBTN /aBlS0V+fSrqpWz4GQijrSLlqMlNHxmGNYc1qhx8xdVARMJufqEp9R7BdRyTyX6BH5zH lCYbbBa8zO0eLFCXIhMFP6uDpW7XjgssSneYNmpSEwXtNn7hT8jOaG93Lmy8FT+kJGp/ X4Fw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tyhicks-com.20150623.gappssmtp.com header.s=20150623 header.b=FKl+BqFp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q13si13719652plk.238.2021.04.18.10.19.41; Sun, 18 Apr 2021 10:19:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@tyhicks-com.20150623.gappssmtp.com header.s=20150623 header.b=FKl+BqFp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229783AbhDRRTe (ORCPT + 99 others); Sun, 18 Apr 2021 13:19:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52706 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229986AbhDRRTd (ORCPT ); Sun, 18 Apr 2021 13:19:33 -0400 Received: from mail-oi1-x230.google.com (mail-oi1-x230.google.com [IPv6:2607:f8b0:4864:20::230]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 63993C061760 for ; Sun, 18 Apr 2021 10:19:05 -0700 (PDT) Received: by mail-oi1-x230.google.com with SMTP id k18so28323295oik.1 for ; Sun, 18 Apr 2021 10:19:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tyhicks-com.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=IfPbDvRpVXNZkCjTosV0fhdI0kbeai9mwZx1gjVjW1U=; b=FKl+BqFpmAqmj7h5CPtRIEvh2HqvT9DYZBGdm2aGQZVNzcSfNMhSjqjSF4HwD6zX+o IPDqOZCtGI4xdNXLy4TojHs5jmy7Pgu0AqEqnefZscWt+xlm+AhCukyFhHo5v9gkIO0T sLz6fPazM+hBh5ECchUYkg4MAQ8nq/NaoBhj2VdaBgfNjNh65ydY4qbF1F1VAvVYeAi+ lf7poejPh73bxMbbdgYj3wwpmTXVbJt0l+FS4KDIhpTG+M8Me5ePgR0TZJCd+Zjq6Sp4 Wi2+9UG49Fpg5CG3hKF4EnkAP6DyRugHPnziOYVfrIJbbYgbz3tPcUgyWYnv5BG2oJ+7 90+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=IfPbDvRpVXNZkCjTosV0fhdI0kbeai9mwZx1gjVjW1U=; b=R0TPfmwXFl5BVOhy1vY4Iha8l2bP39PGbzd3daqKhXMXeDL3q/tZdtUV3Y75l9FrIR qZ5xWTa1SHFlWqLbkAbw2VajkuILCbCy7bt6bUBS5f+WEa7AG0huJJkJcCgG98jk2y7T CRie6V8hzC8gukP2hY3p1NVwJSlnyhBspmav727zo+qMP89NvtTu3hAk8kF5q7E9YTx8 SJJMNV4eRzTWYMiI5EypmdPnjMWbyiHySqn3jiBmfcawXDmYVSJ7YNstoQ0+/ODGVil/ awHQHousPrrhaqhOzcHVlZM+PYRXDF0LdhmmpwM7IyC00jmQNs8EEFtpCWv7OHikOkZG ViwQ== X-Gm-Message-State: AOAM530LVONvXcOn8awEtuz3qma077/OIACBrFaHjcGcm3XN0vSo3R3G FcfzQzFGTqzm+OXNLpcBpnG8JA== X-Received: by 2002:a54:488f:: with SMTP id r15mr10484104oic.132.1618766344270; Sun, 18 Apr 2021 10:19:04 -0700 (PDT) Received: from elm (162-237-133-238.lightspeed.rcsntx.sbcglobal.net. [162.237.133.238]) by smtp.gmail.com with ESMTPSA id b14sm2659729oic.30.2021.04.18.10.19.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 18 Apr 2021 10:19:03 -0700 (PDT) Date: Sun, 18 Apr 2021 12:19:02 -0500 From: Tyler Hicks To: Lee Jones Cc: linux-kernel@vger.kernel.org, Christian Brauner , James Morris , "Michael A. Halcrow" , "Michael C. Thompson" , ecryptfs@vger.kernel.org Subject: Re: [PATCH 26/31] fs: ecryptfs: main: Demote a bunch of non-conformant kernel-doc headers Message-ID: <20210418171902.GB398325@elm> References: <20210330164458.1625478-1-lee.jones@linaro.org> <20210330164458.1625478-27-lee.jones@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210330164458.1625478-27-lee.jones@linaro.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-03-30 17:44:53, Lee Jones wrote: > Fixes the following W=1 kernel build warning(s): > > fs/ecryptfs/main.c:28: warning: Incorrect use of kernel-doc format: * Module parameter that defines the ecryptfs_verbosity level. > fs/ecryptfs/main.c:30: warning: cannot understand function prototype: 'int ecryptfs_verbosity = 0; ' > fs/ecryptfs/main.c:40: warning: cannot understand function prototype: 'unsigned int ecryptfs_message_buf_len = ECRYPTFS_DEFAULT_MSG_CTX_ELEMS; ' > fs/ecryptfs/main.c:52: warning: cannot understand function prototype: 'signed long ecryptfs_message_wait_timeout = ECRYPTFS_MAX_MSG_CTX_TTL / HZ; ' > fs/ecryptfs/main.c:65: warning: cannot understand function prototype: 'unsigned int ecryptfs_number_of_users = ECRYPTFS_DEFAULT_NUM_USERS; ' > fs/ecryptfs/main.c:106: warning: Function parameter or member 'dentry' not described in 'ecryptfs_init_lower_file' > fs/ecryptfs/main.c:106: warning: Function parameter or member 'lower_file' not described in 'ecryptfs_init_lower_file' > fs/ecryptfs/main.c:106: warning: Excess function parameter 'ecryptfs_dentry' description in 'ecryptfs_init_lower_file' > fs/ecryptfs/main.c:244: warning: Function parameter or member 'sbi' not described in 'ecryptfs_parse_options' > fs/ecryptfs/main.c:244: warning: Excess function parameter 'sb' description in 'ecryptfs_parse_options' > fs/ecryptfs/main.c:478: warning: Function parameter or member 'fs_type' not described in 'ecryptfs_mount' > fs/ecryptfs/main.c:478: warning: Function parameter or member 'flags' not described in 'ecryptfs_mount' > fs/ecryptfs/main.c:478: warning: expecting prototype for ecryptfs_get_sb(). Prototype was for ecryptfs_mount() instead > fs/ecryptfs/main.c:645: warning: Function parameter or member 'vptr' not described in 'inode_info_init_once' > > Cc: Tyler Hicks > Cc: Christian Brauner > Cc: James Morris > Cc: "Michael A. Halcrow" > Cc: "Michael C. Thompson" > Cc: ecryptfs@vger.kernel.org > Signed-off-by: Lee Jones > --- > fs/ecryptfs/main.c | 20 +++++++++----------- > 1 file changed, 9 insertions(+), 11 deletions(-) > > diff --git a/fs/ecryptfs/main.c b/fs/ecryptfs/main.c > index cdf40a54a35d8..0a6ef2472f205 100644 > --- a/fs/ecryptfs/main.c > +++ b/fs/ecryptfs/main.c > @@ -1,5 +1,5 @@ > // SPDX-License-Identifier: GPL-2.0-or-later > -/** > +/* > * eCryptfs: Linux filesystem encryption layer > * > * Copyright (C) 1997-2003 Erez Zadok > @@ -24,7 +24,7 @@ > #include > #include "ecryptfs_kernel.h" > > -/** > +/* > * Module parameter that defines the ecryptfs_verbosity level. > */ > int ecryptfs_verbosity = 0; > @@ -34,7 +34,7 @@ MODULE_PARM_DESC(ecryptfs_verbosity, > "Initial verbosity level (0 or 1; defaults to " > "0, which is Quiet)"); > > -/** > +/* > * Module parameter that defines the number of message buffer elements > */ > unsigned int ecryptfs_message_buf_len = ECRYPTFS_DEFAULT_MSG_CTX_ELEMS; > @@ -43,7 +43,7 @@ module_param(ecryptfs_message_buf_len, uint, 0); > MODULE_PARM_DESC(ecryptfs_message_buf_len, > "Number of message buffer elements"); > > -/** > +/* > * Module parameter that defines the maximum guaranteed amount of time to wait > * for a response from ecryptfsd. The actual sleep time will be, more than > * likely, a small amount greater than this specified value, but only less if > @@ -57,7 +57,7 @@ MODULE_PARM_DESC(ecryptfs_message_wait_timeout, > "sleep while waiting for a message response from " > "userspace"); > > -/** > +/* > * Module parameter that is an estimate of the maximum number of users > * that will be concurrently using eCryptfs. Set this to the right > * value to balance performance and memory use. > @@ -80,7 +80,7 @@ void __ecryptfs_printk(const char *fmt, ...) > va_end(args); > } > > -/** > +/* > * ecryptfs_init_lower_file > * @ecryptfs_dentry: Fully initialized eCryptfs dentry object, with > * the lower dentry and the lower mount set > @@ -221,7 +221,7 @@ static void ecryptfs_init_mount_crypt_stat( > > /** > * ecryptfs_parse_options > - * @sb: The ecryptfs super block > + * @sbi: The ecryptfs super block > * @options: The options passed to the kernel > * @check_ruid: set to 1 if device uid should be checked against the ruid > * > @@ -466,10 +466,8 @@ static int ecryptfs_parse_options(struct ecryptfs_sb_info *sbi, char *options, > struct kmem_cache *ecryptfs_sb_info_cache; > static struct file_system_type ecryptfs_fs_type; > > -/** > +/* > * ecryptfs_get_sb > - * @fs_type > - * @flags This wasn't quite the right change. This function documentation block was for ecryptfs_mount(). It was probably ecryptfs_get_sb() in the past and the docs weren't updated. I've adjusted the function doc header and added descriptions for @fs_type and @flags. Tyler > * @dev_name: The path to mount over > * @raw_data: The options passed into the kernel > */ > @@ -635,7 +633,7 @@ static struct file_system_type ecryptfs_fs_type = { > }; > MODULE_ALIAS_FS("ecryptfs"); > > -/** > +/* > * inode_info_init_once > * > * Initializes the ecryptfs_inode_info_cache when it is created > -- > 2.27.0 >