diff options
| author | Joel Granados <joel.granados@kernel.org> | 2025-11-29 00:47:54 +0300 |
|---|---|---|
| committer | Joel Granados <joel.granados@kernel.org> | 2026-01-05 16:10:32 +0300 |
| commit | ac3d6a4b60ef1b26b29517d35ca28966142fc65e (patch) | |
| tree | 6c26a5e737c7d6c3a6638cc338fabd44219091cb | |
| parent | 11400f86c28eaeb8d0cc22fef3f16fdd87d46214 (diff) | |
| download | linux-ac3d6a4b60ef1b26b29517d35ca28966142fc65e.tar.xz | |
sysctl: clarify proc_douintvec_minmax doc
Specify that the range check is only when assigning kernel variable
Signed-off-by: Joel Granados <joel.granados@kernel.org>
| -rw-r--r-- | kernel/sysctl.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/kernel/sysctl.c b/kernel/sysctl.c index e9bc1161ecfb..4ea56c71c7ef 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -692,10 +692,10 @@ int proc_dointvec_minmax(const struct ctl_table *table, int dir, * values from/to the user buffer, treated as an ASCII string. Negative * strings are not allowed. * - * This routine will ensure the values are within the range specified by - * table->extra1 (min) and table->extra2 (max). There is a final sanity - * check for UINT_MAX to avoid having to support wrap around uses from - * userspace. + * When changing the kernel variable, this routine will ensure the values + * are within the range specified by table->extra1 (min) and table->extra2 + * (max). And Check that the values are less than UINT_MAX to avoid having to + * support wrap around uses from userspace. * * Returns 0 on success or -ERANGE when range check failes and * SYSCTL_USER_TO_KERN(dir) == true |
