diff options
author | Randy Dunlap <randy.dunlap@oracle.com> | 2008-08-17 21:44:22 -0700 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-08-20 20:16:32 +1000 |
commit | 3f23d815c5049c9d7022226cec2242e384dd0b43 (patch) | |
tree | 7917329366ccac8e9a21d5572b9df948409cee36 /security/security.c | |
parent | dbc74c65b3fd841985935f676388c82d6b85c485 (diff) | |
download | talos-obmc-linux-3f23d815c5049c9d7022226cec2242e384dd0b43.tar.gz talos-obmc-linux-3f23d815c5049c9d7022226cec2242e384dd0b43.zip |
security: add/fix security kernel-doc
Add security/inode.c functions to the kernel-api docbook.
Use '%' on constants in kernel-doc notation.
Fix several typos/spellos in security function descriptions.
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/security.c')
-rw-r--r-- | security/security.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/security.c b/security/security.c index ff7068727757..d953d251fdca 100644 --- a/security/security.c +++ b/security/security.c @@ -82,8 +82,8 @@ __setup("security=", choose_lsm); * * Return true if: * -The passed LSM is the one chosen by user at boot time, - * -or user didsn't specify a specific LSM and we're the first to ask - * for registeration permissoin, + * -or user didn't specify a specific LSM and we're the first to ask + * for registration permission, * -or the passed LSM is currently loaded. * Otherwise, return false. */ @@ -101,13 +101,13 @@ int __init security_module_enable(struct security_operations *ops) * register_security - registers a security framework with the kernel * @ops: a pointer to the struct security_options that is to be registered * - * This function is to allow a security module to register itself with the + * This function allows a security module to register itself with the * kernel security subsystem. Some rudimentary checking is done on the @ops * value passed to this function. You'll need to check first if your LSM * is allowed to register its @ops by calling security_module_enable(@ops). * * If there is already a security module registered with the kernel, - * an error will be returned. Otherwise 0 is returned on success. + * an error will be returned. Otherwise %0 is returned on success. */ int register_security(struct security_operations *ops) { |