From 363828146f1179f248aacacdb1da9e05cd2116e6 Mon Sep 17 00:00:00 2001 From: Javier Martinez Canillas Date: Wed, 15 Feb 2012 11:58:54 +0100 Subject: [PATCH] --- yaml --- r: 291762 b: refs/heads/master c: fbe74e361c6586cdd996bc2805033999dd469e99 h: refs/heads/master v: v3 --- [refs] | 2 +- trunk/include/linux/security.h | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/[refs] b/[refs] index 4898ee9aa065..662c892264c0 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: 4ff162f0795ae962d90f7b0931db03221fa0ac18 +refs/heads/master: fbe74e361c6586cdd996bc2805033999dd469e99 diff --git a/trunk/include/linux/security.h b/trunk/include/linux/security.h index 83c18e8c846d..c8949385e56e 100644 --- a/trunk/include/linux/security.h +++ b/trunk/include/linux/security.h @@ -812,7 +812,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) * Check permissions before connecting or sending datagrams from @sock to * @other. * @sock contains the socket structure. - * @sock contains the peer socket structure. + * @other contains the peer socket structure. * Return 0 if permission is granted. * * The @unix_stream_connect and @unix_may_send hooks were necessary because