diff mbox series

net: netfilter: delete repeated words

Message ID 20200823010727.4786-1-rdunlap@infradead.org
State New
Headers show
Series net: netfilter: delete repeated words | expand

Commit Message

Randy Dunlap Aug. 23, 2020, 1:07 a.m. UTC
Drop duplicated words in net/netfilter/ and net/ipv4/netfilter/.

Signed-off-by: Randy Dunlap <rdunlap@infradead.org>
Cc: Pablo Neira Ayuso <pablo@netfilter.org>
Cc: Jozsef Kadlecsik <kadlec@netfilter.org>
Cc: Florian Westphal <fw@strlen.de>
Cc: netfilter-devel@vger.kernel.org
Cc: coreteam@netfilter.org
---
 net/ipv4/netfilter/nf_nat_pptp.c       |    2 +-
 net/netfilter/nf_conntrack_pptp.c      |    2 +-
 net/netfilter/nf_conntrack_proto_tcp.c |    2 +-
 net/netfilter/xt_recent.c              |    2 +-
 4 files changed, 4 insertions(+), 4 deletions(-)
diff mbox series

Patch

--- linux-next-20200821.orig/net/ipv4/netfilter/nf_nat_pptp.c
+++ linux-next-20200821/net/ipv4/netfilter/nf_nat_pptp.c
@@ -3,7 +3,7 @@ 
  * nf_nat_pptp.c
  *
  * NAT support for PPTP (Point to Point Tunneling Protocol).
- * PPTP is a a protocol for creating virtual private networks.
+ * PPTP is a protocol for creating virtual private networks.
  * It is a specification defined by Microsoft and some vendors
  * working with Microsoft.  PPTP is built on top of a modified
  * version of the Internet Generic Routing Encapsulation Protocol.
--- linux-next-20200821.orig/net/netfilter/nf_conntrack_pptp.c
+++ linux-next-20200821/net/netfilter/nf_conntrack_pptp.c
@@ -1,7 +1,7 @@ 
 // SPDX-License-Identifier: GPL-2.0-only
 /*
  * Connection tracking support for PPTP (Point to Point Tunneling Protocol).
- * PPTP is a a protocol for creating virtual private networks.
+ * PPTP is a protocol for creating virtual private networks.
  * It is a specification defined by Microsoft and some vendors
  * working with Microsoft.  PPTP is built on top of a modified
  * version of the Internet Generic Routing Encapsulation Protocol.
--- linux-next-20200821.orig/net/netfilter/nf_conntrack_proto_tcp.c
+++ linux-next-20200821/net/netfilter/nf_conntrack_proto_tcp.c
@@ -1152,7 +1152,7 @@  int nf_conntrack_tcp_packet(struct nf_co
 		   && (old_state == TCP_CONNTRACK_SYN_RECV
 		       || old_state == TCP_CONNTRACK_ESTABLISHED)
 		   && new_state == TCP_CONNTRACK_ESTABLISHED) {
-		/* Set ASSURED if we see see valid ack in ESTABLISHED
+		/* Set ASSURED if we see valid ack in ESTABLISHED
 		   after SYN_RECV or a valid answer for a picked up
 		   connection. */
 		set_bit(IPS_ASSURED_BIT, &ct->status);
--- linux-next-20200821.orig/net/netfilter/xt_recent.c
+++ linux-next-20200821/net/netfilter/xt_recent.c
@@ -640,7 +640,7 @@  static void __net_exit recent_proc_net_e
 	struct recent_table *t;
 
 	/* recent_net_exit() is called before recent_mt_destroy(). Make sure
-	 * that the parent xt_recent proc entry is is empty before trying to
+	 * that the parent xt_recent proc entry is empty before trying to
 	 * remove it.
 	 */
 	spin_lock_bh(&recent_lock);