Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 88989C433EF for ; Fri, 14 Jan 2022 02:05:09 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238779AbiANCFH (ORCPT ); Thu, 13 Jan 2022 21:05:07 -0500 Received: from relay031.a.hostedemail.com ([64.99.140.31]:41416 "EHLO relay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S238752AbiANCFG (ORCPT ); Thu, 13 Jan 2022 21:05:06 -0500 Received: from omf05.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay12.hostedemail.com (Postfix) with ESMTP id C389012153F; Fri, 14 Jan 2022 02:05:04 +0000 (UTC) Received: from [HIDDEN] (Authenticated sender: joe@perches.com) by omf05.hostedemail.com (Postfix) with ESMTPA id BF61F20018; Fri, 14 Jan 2022 02:04:42 +0000 (UTC) Message-ID: Subject: Re: [PATCH] ima: Fix trivial typos in the comments From: Joe Perches To: Mimi Zohar , Austin Kim , Austin Kim Cc: dmitry.kasatkin@gmail.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel Date: Thu, 13 Jan 2022 18:05:02 -0800 In-Reply-To: References: <20211124214418.GA1094@raspberrypi> Content-Type: text/plain; charset="ISO-8859-1" User-Agent: Evolution 3.40.4-1ubuntu2 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Stat-Signature: 1ka4usra3boszhqifi6t18qjx54qrequ X-Rspamd-Server: rspamout04 X-Rspamd-Queue-Id: BF61F20018 X-Session-Marker: 6A6F6540706572636865732E636F6D X-Session-ID: U2FsdGVkX18qWtYOF/yky0uCpE6wZO8pf7wOz2bvaw4= X-HE-Tag: 1642125882-296102 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2022-01-13 at 20:51 -0500, Mimi Zohar wrote: > On Wed, 2022-01-12 at 17:46 +0900, Austin Kim wrote: > > > There are a few minor typos in the comments. Fix these. > It would be really nice if checkpatch.pl would catch spelling mistakes > before the patch was upstreamed. Try ./scripts/checkpatch.pl --strict