From 5d492726facae3de955747504a57f561da9c443c Mon Sep 17 00:00:00 2001 From: Al Viro Date: Fri, 17 Jun 2011 19:20:48 -0400 Subject: [PATCH] --- yaml --- r: 253841 b: refs/heads/master c: 6291176bcd71a2766a19a10cbd9bab07d289e1d7 h: refs/heads/master i: 253839: 9c4c6ee8bf8676e0feeee96b0480ed0b38a8ac49 v: v3 --- [refs] | 2 +- trunk/fs/namei.c | 3 --- 2 files changed, 1 insertion(+), 4 deletions(-) diff --git a/[refs] b/[refs] index e7e3498499c8..44b402320957 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: 1aec7036d0c2996c86ce483ca0a28f3b20807b43 +refs/heads/master: 6291176bcd71a2766a19a10cbd9bab07d289e1d7 diff --git a/trunk/fs/namei.c b/trunk/fs/namei.c index 9e425e7e6c8f..975c40620fe9 100644 --- a/trunk/fs/namei.c +++ b/trunk/fs/namei.c @@ -1011,9 +1011,6 @@ static int follow_dotdot_rcu(struct nameidata *nd) * Follow down to the covering mount currently visible to userspace. At each * point, the filesystem owning that dentry may be queried as to whether the * caller is permitted to proceed or not. - * - * Care must be taken as namespace_sem may be held (indicated by mounting_here - * being true). */ int follow_down(struct path *path) {