From nobody Fri Apr 17 03:06:31 2026 Received: from mail-wr1-f53.google.com (mail-wr1-f53.google.com [209.85.221.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 64ED0303A35 for ; Tue, 24 Feb 2026 06:53:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.53 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771915989; cv=none; b=Gd1i1QY3ZJZAylkKxnOVYT7ryzbCCp8TmB9F/a0An+kFknPr56xHaixJqmlASLzbIKSt9fB+kX20hYrG7w/8cGHnpwx4/klOLFd8CP2uiKr7nADDW9W9RZAsf1SwGvN0xpYz5LIeUmqukjBu+DfUnnh9bJ4+Q2751Z+Y+q1S8A8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771915989; c=relaxed/simple; bh=Q6pUjI0RLoqFpaTePFMSPCib2kDkUwktCKJi72ESlY0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=eC3tOwsWlaZFgQ7QqJhdjsx9v2u2SujjePBn9Hsi5bPP/FESWgpbI3bWkaTRNlOvOY+M5hfWDBXn0HXGnnnUtksAWLKKayTHG6V02FHuHfgxecb2QCp8usmwwaWWovVSaF0nqkOeOJhFx3WNJSYaZULMLwLKUgvqMxvnZMtq7tI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=fT860j2t; arc=none smtp.client-ip=209.85.221.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="fT860j2t" Received: by mail-wr1-f53.google.com with SMTP id ffacd0b85a97d-4359a316d89so4667492f8f.0 for ; Mon, 23 Feb 2026 22:53:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1771915985; x=1772520785; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=qQVpfXtyFGdivv9D9qL1lZIFEzO3kt1eLPHHoCbWwhk=; b=fT860j2tLSX2Pei/KHylbUDV65+CJVbZ3ncXgi7DBXfykBpRe1ZzYPfHleY695Jgcm p9LaKQuqoEeXDobiHnHyFk2VzHQbUWCm4ivCucoppWu4xD5MzEqe/rcrX+dE1k1dvzj5 JlY5tiuhHv9NcAI3p6ABor/iz0lIurIelUe42Nn005auZX51mJe0GISe9VqPgs0QJhLq 1WiPEcenEzJTTrlM3fJiX722nWuhb9fJTW1Xg+EyWS67o9osAYdJHN933PvfsN/9tbQE lO+hGvAT/hO8gxEQgVgJj7c1q2vqzRtxmq2qCkJyO/D6uxW+UBg/0zl5wZIeHMXN8edD EolQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771915985; x=1772520785; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=qQVpfXtyFGdivv9D9qL1lZIFEzO3kt1eLPHHoCbWwhk=; b=UCP6l8K/yEjztM9X++UPC5axDtMsiaEDG4Q6zlyxDLVwMBZTSDa2uz530ak9R97Vnv T/lesyS9OOtmvlVkQWMl+luzffkI0KnQyEuPaeIWSm8vqG9ZXWj6i9p2e2Dy8/WRAc0r jRe0t6SI+hWEvpN5aNYownl1zTL7EWqBUosU82wSQ3HZt1iNZSAkZ/tt3g3GOOgKFhxl R4vhkpm2T+RPF2WtBeJx63RFrcLpA/eFzGinv75EwCn3xxATlZRY4X962rohUyBp/3AB AjaWwjiHCo/u52eSwD6YKkU6Qt2XY2irS/uic4qucaZQwqj0QvqIX48ZKKlV47IumG58 BX9Q== X-Gm-Message-State: AOJu0Yw3FTMhs3FsONnVuh6yvucHoUx/MFn9jMp5NoIJXAARojT9ac/b XgTaNz7nwXrnbWi8L0+LG12j8yeDe9B1YBVYjOcSqQRXmfQMPc2Y31LNCTYpT8hI X-Gm-Gg: ATEYQzwtS17mZYyoFVBnFOcVxlG0zHk/OYS4NCew5gfJcR297yh3u5h5BjAU3Gd2DeD cOBjkpR2Kd2lBjVyE3UHzfzmKnnmHXH1ciXrKVFfU4Zz2Yckj6Nv0EAiT6A4ndz7mtC4bnzkU99 cTsLUHu2k1MT+t8Vy4abR/LsP+9vkLL84mwuPlaA522dmiVFrpZ0YZzrnDA+WAOarqhVwP5mKtz Q4693nZeDTX67QzQo6JFJoJNulB3HLaXouEb+BlnSDXGwJNgGzBT5fnRt7b/rmKlOGCgBrHDXd7 TjnZmXRfMKuIyAa01xrXRhENnLC9hW6D2WRsYLuRiZxYJU0+8bYVQA+6Nj9DkuJNg78+KwHjmxq wEU/E0eo9GCWRGVx5WhjgRPjPIqb6xeSCPRGGIxYw6b/TJ9uXD9t4iR51WxEplDXOMGK3P8beVs Vi7liDf/GPB0cyVlDNVbSD0DcS83w= X-Received: by 2002:a5d:588b:0:b0:437:6839:d5e with SMTP id ffacd0b85a97d-4396f153aacmr18288101f8f.13.1771915984464; Mon, 23 Feb 2026 22:53:04 -0800 (PST) Received: from x-factory.. ([105.74.5.105]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43970d4c977sm25403023f8f.32.2026.02.23.22.53.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Feb 2026 22:53:04 -0800 (PST) From: Yousef El Bouzidi To: linux-kernel@vger.kernel.org Cc: gregkh@linuxfoundation.org, rafael@kernel.org, dakr@kernel.org, tglx@kernel.org, herbert@gondor.apana.org.au, davem@davemloft.net, lee@kernel.org, hansg@kernel.org, ilpo.jarvinen@linux.intel.com, ansuelsmth@gmail.com, atenart@kernel.org, wens@kernel.org, hauke@hauke-m.de, andrew+netdev@lunn.ch, kuba@kernel.org, david.e.box@linux.intel.com, akrowiak@linux.ibm.com, pasic@linux.ibm.com, jjherne@linux.ibm.com, hca@linux.ibm.com, driver-core@lists.linux.dev, linux-crypto@vger.kernel.org, netdev@vger.kernel.org, platform-driver-x86@vger.kernel.org, linux-s390@vger.kernel.org, Yousef El Bouzidi Subject: [PATCH] treewide: fix duplicated word "the" in comments Date: Tue, 24 Feb 2026 06:52:45 +0000 Message-ID: <20260224065300.454633-1-elbouzidyyousef@gmail.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Remove duplicated word "the" from comments across various subsystems. All instances are clear typos where "the" appeared twice in succession, often merged with the following word (e.g. "the they", "the there", "the these", "the them"). Files fixed: - drivers/base/platform.c - drivers/crypto/inside-secure/eip93/eip93-hash.c - drivers/mfd/axp20x.c - drivers/net/ethernet/lantiq_xrx200.c - drivers/platform/x86/intel/chtwc_int33fe.c - drivers/platform/x86/intel/pmt/class.c - drivers/s390/crypto/vfio_ap_ops.c - kernel/irq/migration.c Signed-off-by: Yousef El Bouzidi Acked-by: Chen-Yu Tsai # axp20x Acked-by: Ilpo J=C3=A4rvinen # For pdx86 Acked-by: Lee Jones Reviewed-by: Anthony Krowiak Reviewed-by: Randy Dunlap --- drivers/base/platform.c | 2 +- drivers/crypto/inside-secure/eip93/eip93-hash.c | 2 +- drivers/mfd/axp20x.c | 2 +- drivers/net/ethernet/lantiq_xrx200.c | 2 +- drivers/platform/x86/intel/chtwc_int33fe.c | 2 +- drivers/platform/x86/intel/pmt/class.c | 2 +- drivers/s390/crypto/vfio_ap_ops.c | 2 +- kernel/irq/migration.c | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/drivers/base/platform.c b/drivers/base/platform.c index b45d41b018ca..3e3b6fcfa194 100644 --- a/drivers/base/platform.c +++ b/drivers/base/platform.c @@ -565,7 +565,7 @@ struct platform_object { }; =20 /* - * Set up default DMA mask for platform devices if the they weren't + * Set up default DMA mask for platform devices if they weren't * previously set by the architecture / DT. */ static void setup_pdev_dma_masks(struct platform_device *pdev) diff --git a/drivers/crypto/inside-secure/eip93/eip93-hash.c b/drivers/cryp= to/inside-secure/eip93/eip93-hash.c index 2705855475b2..d91a1ac152f0 100644 --- a/drivers/crypto/inside-secure/eip93/eip93-hash.c +++ b/drivers/crypto/inside-secure/eip93/eip93-hash.c @@ -432,7 +432,7 @@ static int eip93_hash_update(struct ahash_request *req) =20 /* * With map_data true, we map the sa_record and sa_state. This is needed - * for finup() as the they are mapped before calling update() + * for finup() as they are mapped before calling update() */ static int __eip93_hash_final(struct ahash_request *req, bool map_dma) { diff --git a/drivers/mfd/axp20x.c b/drivers/mfd/axp20x.c index 679364189ea5..0c6e93eb3955 100644 --- a/drivers/mfd/axp20x.c +++ b/drivers/mfd/axp20x.c @@ -1417,7 +1417,7 @@ int axp20x_device_probe(struct axp20x_dev *axp20x) * 1 bit customizable at the factory, and 1 bit depending on the * state of an external pin. The latter is writable. The device * will only respond to operations to its other registers when - * the these device addressing bits (in the upper 4 bits of the + * these device addressing bits (in the upper 4 bits of the * registers) match. * * By default we support an AXP806 chained to an AXP809 in slave diff --git a/drivers/net/ethernet/lantiq_xrx200.c b/drivers/net/ethernet/la= ntiq_xrx200.c index b8766fb7a844..dde651d901c8 100644 --- a/drivers/net/ethernet/lantiq_xrx200.c +++ b/drivers/net/ethernet/lantiq_xrx200.c @@ -157,7 +157,7 @@ static int xrx200_open(struct net_device *net_dev) /* The boot loader does not always deactivate the receiving of frames * on the ports and then some packets queue up in the PPE buffers. * They already passed the PMAC so they do not have the tags - * configured here. Read the these packets here and drop them. + * configured here. Read these packets here and drop them. * The HW should have written them into memory after 10us */ usleep_range(20, 40); diff --git a/drivers/platform/x86/intel/chtwc_int33fe.c b/drivers/platform/= x86/intel/chtwc_int33fe.c index d183aa53c318..1fca9fdd8f5b 100644 --- a/drivers/platform/x86/intel/chtwc_int33fe.c +++ b/drivers/platform/x86/intel/chtwc_int33fe.c @@ -14,7 +14,7 @@ * * So this driver is a stub / pseudo driver whose only purpose is to * instantiate I=C2=B2C clients for chips 2 - 4, so that standard I=C2=B2C= drivers - * for these chips can bind to the them. + * for these chips can bind to them. */ =20 #include diff --git a/drivers/platform/x86/intel/pmt/class.c b/drivers/platform/x86/= intel/pmt/class.c index be3c8d9e4fff..99bf7e0afdf1 100644 --- a/drivers/platform/x86/intel/pmt/class.c +++ b/drivers/platform/x86/intel/pmt/class.c @@ -239,7 +239,7 @@ static int intel_pmt_populate_entry(struct intel_pmt_en= try *entry, =20 /* * Some hardware use a different calculation for the base address - * when access_type =3D=3D ACCESS_LOCAL. On the these systems + * when access_type =3D=3D ACCESS_LOCAL. On these systems * ACCESS_LOCAL refers to an address in the same BAR as the * header but at a fixed offset. But as the header address was * supplied to the driver, we don't know which BAR it was in. diff --git a/drivers/s390/crypto/vfio_ap_ops.c b/drivers/s390/crypto/vfio_a= p_ops.c index 44b3a1dcc1b3..334aaa2d97b2 100644 --- a/drivers/s390/crypto/vfio_ap_ops.c +++ b/drivers/s390/crypto/vfio_ap_ops.c @@ -610,7 +610,7 @@ static int handle_pqap(struct kvm_vcpu *vcpu) matrix_mdev =3D container_of(vcpu->kvm->arch.crypto.pqap_hook, struct ap_matrix_mdev, pqap_hook); =20 - /* If the there is no guest using the mdev, there is nothing to do */ + /* If there is no guest using the mdev, there is nothing to do */ if (!matrix_mdev->kvm) { vfio_ap_le_guid_to_be_uuid(&matrix_mdev->mdev->uuid, uuid); VFIO_AP_DBF_WARN("%s: mdev %08lx-%04lx-%04lx-%04lx-%04lx%08lx not in use= : apqn=3D0x%04x\n", diff --git a/kernel/irq/migration.c b/kernel/irq/migration.c index f2b2929986ff..b29d13baee55 100644 --- a/kernel/irq/migration.c +++ b/kernel/irq/migration.c @@ -89,7 +89,7 @@ void irq_move_masked_irq(struct irq_data *idata) =20 ret =3D irq_do_set_affinity(data, desc->pending_mask, false); /* - * If the there is a cleanup pending in the underlying + * If there is a cleanup pending in the underlying * vector management, reschedule the move for the next * interrupt. Leave desc->pending_mask intact. */ --=20 2.43.0