Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp89858ybh; Fri, 17 Jul 2020 20:00:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxlet3zzrFik318tpZF85Sme5ry+HdArvmev+dxShK6RGQQslyVLwk2Tpcf20BZbEMCUs46 X-Received: by 2002:a17:907:72c7:: with SMTP id du7mr11035602ejc.248.1595041225372; Fri, 17 Jul 2020 20:00:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595041225; cv=none; d=google.com; s=arc-20160816; b=Di8kYnKLPdlcJeqcg4lTf0ZDGBaEkSdquiis8KXTWpI0PrXfVSOdbT2VAfpluetU14 5I3IiQTUWXWCI2AYxJmM5AJ2DZKl1b3I22Vtcs8w5j7a+z195V+EhiSNvjQGJv73S/V5 FK1kVl7R2I3j+db2kRjJwCXG4BDGRXP2IsKoMrRyjzIyz2YKouKA82DIPLZ7Nf6xVaWk tKq9OgAvFgkB2h5E1TOGfSsXR4N2KVF+jSHtce2JqNDoqCtm5teZarYQTCxbmAXdUJ/C KngTWN4NrUaktjlY7uxEp/jzAdHp09d/x+BEZwE/rywV/5FjyPrE+mEDWJZ/N/f89Qvq DS8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=xNa9pb/iYGmV0gcI3efI5fVhghyJQyBju6aXiwUIdMk=; b=1HGZDd22XBVsIKZ+Be1nM1Al4a2tdYyPascOqcQAIM9NtoO8f1qlw8scNu3l9f1TIu Z+8brrESaepOoE4taFcMKsfT4nZ2rpRrq+LApdi/3IrWUcZ505wp058nrrwWT+1D5rdv zUcWYIGaU4oWZIZ0fwkAXLafpJnJFpWT2SGy9Ss9BaMcl2fzLLgnWMptDOKTJtCBHqRp Uqv83S8fyOSBesbwZq/LGNQPGcVWC3ZuGOGXdANGJHDL9j5Ls7XHyrpVTNiH6l+MQC8f 4yv7ZZ/60Z2zJkKtDNn6AoYmd8BABq4M6QmslA0vQD3ncADjT1zTln6J5oX6fHxhUekX PX0g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ce19si6151775ejc.304.2020.07.17.20.00.03; Fri, 17 Jul 2020 20:00:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728692AbgGRC7o (ORCPT + 99 others); Fri, 17 Jul 2020 22:59:44 -0400 Received: from mail.hallyn.com ([178.63.66.53]:35298 "EHLO mail.hallyn.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726262AbgGRC7o (ORCPT ); Fri, 17 Jul 2020 22:59:44 -0400 Received: by mail.hallyn.com (Postfix, from userid 1001) id CC52AC13; Fri, 17 Jul 2020 21:59:42 -0500 (CDT) Date: Fri, 17 Jul 2020 21:59:42 -0500 From: "Serge E. Hallyn" To: Randy Dunlap Cc: LKML , James Morris , "Serge E. Hallyn" , linux-security-module Subject: Re: [PATCH] LSM: drop duplicated words in header file comments Message-ID: <20200718025942.GB11982@mail.hallyn.com> References: <9299abf4-75e3-6d73-a8b8-c2617208a990@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9299abf4-75e3-6d73-a8b8-c2617208a990@infradead.org> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 17, 2020 at 04:36:40PM -0700, Randy Dunlap wrote: > From: Randy Dunlap > > Drop the doubled words "the" and "and" in comments. > > Signed-off-by: Randy Dunlap > Cc: James Morris > Cc: "Serge E. Hallyn" Acked-by: Serge Hallyn > Cc: linux-security-module@vger.kernel.org > --- > include/linux/lsm_hook_defs.h | 2 +- > include/linux/lsm_hooks.h | 2 +- > 2 files changed, 2 insertions(+), 2 deletions(-) > > --- linux-next-20200714.orig/include/linux/lsm_hook_defs.h > +++ linux-next-20200714/include/linux/lsm_hook_defs.h > @@ -15,7 +15,7 @@ > */ > > /* > - * The macro LSM_HOOK is used to define the data structures required by the > + * The macro LSM_HOOK is used to define the data structures required by > * the LSM framework using the pattern: > * > * LSM_HOOK(, , , args...) > --- linux-next-20200714.orig/include/linux/lsm_hooks.h > +++ linux-next-20200714/include/linux/lsm_hooks.h > @@ -822,7 +822,7 @@ > * structure. Note that the security field was not added directly to the > * socket structure, but rather, the socket security information is stored > * in the associated inode. Typically, the inode alloc_security hook will > - * allocate and and attach security information to > + * allocate and attach security information to > * SOCK_INODE(sock)->i_security. This hook may be used to update the > * SOCK_INODE(sock)->i_security field with additional information that > * wasn't available when the inode was allocated. >