Message ID | 20200807165055.3756-1-rdunlap@infradead.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | security: apparmor: delete repeated words in comments | expand |
On Fri, Aug 07, 2020 at 09:50:55AM -0700, Randy Dunlap wrote: > Drop repeated words in comments. > {a, then, to} > > Signed-off-by: Randy Dunlap <rdunlap@infradead.org> > Cc: John Johansen <john.johansen@canonical.com> > Cc: apparmor@lists.ubuntu.com > Cc: James Morris <jmorris@namei.org> > Cc: "Serge E. Hallyn" <serge@hallyn.com> > Cc: linux-security-module@vger.kernel.org Reviewed-By: Seth Arnold <seth.arnold@canonical.com> Thanks > --- > security/apparmor/include/file.h | 2 +- > security/apparmor/path.c | 2 +- > security/apparmor/policy_unpack.c | 2 +- > 3 files changed, 3 insertions(+), 3 deletions(-) > > --- linux-next-20200731.orig/security/apparmor/include/file.h > +++ linux-next-20200731/security/apparmor/include/file.h > @@ -167,7 +167,7 @@ int aa_audit_file(struct aa_profile *pro > * @perms: permission table indexed by the matched state accept entry of @dfa > * @trans: transition table for indexed by named x transitions > * > - * File permission are determined by matching a path against @dfa and then > + * File permission are determined by matching a path against @dfa and > * then using the value of the accept entry for the matching state as > * an index into @perms. If a named exec transition is required it is > * looked up in the transition table. > --- linux-next-20200731.orig/security/apparmor/path.c > +++ linux-next-20200731/security/apparmor/path.c > @@ -83,7 +83,7 @@ static int disconnect(const struct path > * > * Returns: %0 else error code if path lookup fails > * When no error the path name is returned in @name which points to > - * to a position in @buf > + * a position in @buf > */ > static int d_namespace_path(const struct path *path, char *buf, char **name, > int flags, const char *disconnected) > --- linux-next-20200731.orig/security/apparmor/policy_unpack.c > +++ linux-next-20200731/security/apparmor/policy_unpack.c > @@ -39,7 +39,7 @@ > > /* > * The AppArmor interface treats data as a type byte followed by the > - * actual data. The interface has the notion of a a named entry > + * actual data. The interface has the notion of a named entry > * which has a name (AA_NAME typecode followed by name string) followed by > * the entries typecode and data. Named types allow for optional > * elements and extensions to be added and tested for without breaking > > -- > AppArmor mailing list > AppArmor@lists.ubuntu.com > Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor
--- linux-next-20200731.orig/security/apparmor/include/file.h +++ linux-next-20200731/security/apparmor/include/file.h @@ -167,7 +167,7 @@ int aa_audit_file(struct aa_profile *pro * @perms: permission table indexed by the matched state accept entry of @dfa * @trans: transition table for indexed by named x transitions * - * File permission are determined by matching a path against @dfa and then + * File permission are determined by matching a path against @dfa and * then using the value of the accept entry for the matching state as * an index into @perms. If a named exec transition is required it is * looked up in the transition table. --- linux-next-20200731.orig/security/apparmor/path.c +++ linux-next-20200731/security/apparmor/path.c @@ -83,7 +83,7 @@ static int disconnect(const struct path * * Returns: %0 else error code if path lookup fails * When no error the path name is returned in @name which points to - * to a position in @buf + * a position in @buf */ static int d_namespace_path(const struct path *path, char *buf, char **name, int flags, const char *disconnected) --- linux-next-20200731.orig/security/apparmor/policy_unpack.c +++ linux-next-20200731/security/apparmor/policy_unpack.c @@ -39,7 +39,7 @@ /* * The AppArmor interface treats data as a type byte followed by the - * actual data. The interface has the notion of a a named entry + * actual data. The interface has the notion of a named entry * which has a name (AA_NAME typecode followed by name string) followed by * the entries typecode and data. Named types allow for optional * elements and extensions to be added and tested for without breaking
Drop repeated words in comments. {a, then, to} Signed-off-by: Randy Dunlap <rdunlap@infradead.org> Cc: John Johansen <john.johansen@canonical.com> Cc: apparmor@lists.ubuntu.com Cc: James Morris <jmorris@namei.org> Cc: "Serge E. Hallyn" <serge@hallyn.com> Cc: linux-security-module@vger.kernel.org --- security/apparmor/include/file.h | 2 +- security/apparmor/path.c | 2 +- security/apparmor/policy_unpack.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-)