Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2386874pxa; Fri, 7 Aug 2020 09:52:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyzH39+HnYyzXWP4anwjuoShXt+zrDosnND4Lz5/wxUW2K/eWlWntKVHK3o++RNEHCnwWcH X-Received: by 2002:a17:907:204e:: with SMTP id pg14mr10658047ejb.324.1596819146223; Fri, 07 Aug 2020 09:52:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596819146; cv=none; d=google.com; s=arc-20160816; b=TFy69bolkEUFDQNjJM7s8bgRME2YJnFnswW1VolIkr9ePpK9wLh1aVUM48Gl+80CXZ CRpqs6lKW66fUYUIAB+4zHusC10p1dgznjD5w2NiTbKK8jprb8KH742IHO8v2bov0uHj AOP3ALUgBN3kMu9w9boWUtlofD9mvaA/7ruS5pLb3kP2gnxEjjYkX1pKFphauOdh+PLJ MGvk3rjB4tKC5tgiiGMYPToMJ2GmE/NZV5G1hY+C0820B7CIMsXoss4mhCfspxiOmeqi syXOxcX41NfCwMsswjnsO+IQLCrR7eGMussrXfZzc/lTpWoBa+hGmEHwx1Dqlv6l1qwj BNeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=RIJQU5bJaS8+eeCwZwEF7PZkGZvsc2GUo4LIjXOFzL4=; b=jykZ7DVRdz5iE4IyW/WhP5OzKiVA9xzrDJXm6TXo0iUxu4qfgsu44heq5PHfjOcbCW lAhb1XEFbOr7GH4KPf2f+hHNXc4RafykGHwfbwDtWNgaMI6R31onfXjhnJlquDJbF7g0 Va9QNm1BbcuUwm3RVmt/ycc/8wJLJbRXCph2Ow/H6Sx3ys3JQVJ/S26p4X1b39VwNRDc /9QVSVAW6eKMif9ntunkI07t0lZijxF3qoZLxeVbbXb6VD6M8/vr7pTB1oyQxDXzoq9v zO1Z+RckzTNR1y3FKDL8SvSQ9UZVyZajOIehFb1NK5Ar3/aTcnUPsRusE4dsZ1GcdmbP Nusg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=casper.20170209 header.b=ZTriFmLm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n19si5645014ejc.243.2020.08.07.09.52.03; Fri, 07 Aug 2020 09:52:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=casper.20170209 header.b=ZTriFmLm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726096AbgHGQvH (ORCPT + 99 others); Fri, 7 Aug 2020 12:51:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38980 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725893AbgHGQvG (ORCPT ); Fri, 7 Aug 2020 12:51:06 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 109F3C061756; Fri, 7 Aug 2020 09:51:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=Content-Transfer-Encoding:MIME-Version: Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:In-Reply-To:References; bh=RIJQU5bJaS8+eeCwZwEF7PZkGZvsc2GUo4LIjXOFzL4=; b=ZTriFmLmu37Bl8o4aFw4yGjsYf mUMtfra9EPFNHrMz9UdYXkutIVuRepDozrjR7DEAcJTyRQua4JkK+haql12L+CIbSjLtkaX3bTkgF FA89cf/7y4rBYjNc0mXs4V9rkFjl5iVbeTATmE0RPXK907TORFu7AYykPGmuB7Wnr1eYIrnekMscx kZS8dYKwk7Czg87K4/QLDH6k0C7A9fIm9joaFFsAFyy1s1OQFj+2bQqkT3RlsPuU3HFr5Ab66iDb1 EAN8UKI1SVVG1cyGEzFn3XuKF8w7/Rl0N+Ye8CiW91sBbDAowG1SmUFiRlZVbjTTUo3s/bXKGP9NC 5SZkLVHw==; Received: from [2601:1c0:6280:3f0:897c:6038:c71d:ecac] (helo=smtpauth.infradead.org) by casper.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1k45a6-0004EV-RK; Fri, 07 Aug 2020 16:50:59 +0000 From: Randy Dunlap To: linux-kernel@vger.kernel.org Cc: Randy Dunlap , John Johansen , apparmor@lists.ubuntu.com, James Morris , "Serge E. Hallyn" , linux-security-module@vger.kernel.org Subject: [PATCH] security: apparmor: delete repeated words in comments Date: Fri, 7 Aug 2020 09:50:55 -0700 Message-Id: <20200807165055.3756-1-rdunlap@infradead.org> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Drop repeated words in comments. {a, then, to} Signed-off-by: Randy Dunlap Cc: John Johansen Cc: apparmor@lists.ubuntu.com Cc: James Morris Cc: "Serge E. Hallyn" Cc: linux-security-module@vger.kernel.org --- security/apparmor/include/file.h | 2 +- security/apparmor/path.c | 2 +- security/apparmor/policy_unpack.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) --- linux-next-20200731.orig/security/apparmor/include/file.h +++ linux-next-20200731/security/apparmor/include/file.h @@ -167,7 +167,7 @@ int aa_audit_file(struct aa_profile *pro * @perms: permission table indexed by the matched state accept entry of @dfa * @trans: transition table for indexed by named x transitions * - * File permission are determined by matching a path against @dfa and then + * File permission are determined by matching a path against @dfa and * then using the value of the accept entry for the matching state as * an index into @perms. If a named exec transition is required it is * looked up in the transition table. --- linux-next-20200731.orig/security/apparmor/path.c +++ linux-next-20200731/security/apparmor/path.c @@ -83,7 +83,7 @@ static int disconnect(const struct path * * Returns: %0 else error code if path lookup fails * When no error the path name is returned in @name which points to - * to a position in @buf + * a position in @buf */ static int d_namespace_path(const struct path *path, char *buf, char **name, int flags, const char *disconnected) --- linux-next-20200731.orig/security/apparmor/policy_unpack.c +++ linux-next-20200731/security/apparmor/policy_unpack.c @@ -39,7 +39,7 @@ /* * The AppArmor interface treats data as a type byte followed by the - * actual data. The interface has the notion of a a named entry + * actual data. The interface has the notion of a named entry * which has a name (AA_NAME typecode followed by name string) followed by * the entries typecode and data. Named types allow for optional * elements and extensions to be added and tested for without breaking