Skip to content

Commit ad337e5

Browse files
mbieblyuwata
authored andcommitted
tree-wide: fix duplicated words
the the in in not not we we
1 parent 3c45ad2 commit ad337e5

File tree

9 files changed

+10
-10
lines changed

9 files changed

+10
-10
lines changed

NEWS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ CHANGES WITH 251:
3838
image" environments, where the machine ID shall be initialized on
3939
first boot (as opposed to at installation time before first boot) the
4040
machine ID is not be available at build time to name the entry
41-
after. In this case the the --entry-token= switch to bootctl (or the
41+
after. In this case the --entry-token= switch to bootctl (or the
4242
/etc/kernel/entry-token file) may be used to override the "token" to
4343
identify the entry by, and use another ID, for example the IMAGE_ID=
4444
or ID= fields from /etc/os-release. This will make the OS images

src/boot/efi/measure.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
/* This TPM PCR is where we extend the kernel command line and any passed credentials here. */
77
#define TPM_PCR_INDEX_KERNEL_PARAMETERS 12U
88

9-
/* We used to write the the kernel command line/credentials into PCR 8, in systemd <= 250. Let's provide for
9+
/* We used to write the kernel command line/credentials into PCR 8, in systemd <= 250. Let's provide for
1010
* some compatibility. (Remove in 2023!) */
1111
#if EFI_TPM_PCR_COMPAT
1212
#define TPM_PCR_INDEX_KERNEL_PARAMETERS_COMPAT 8U

src/cryptsetup/cryptsetup.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1186,7 +1186,7 @@ static int attach_luks_or_plain_or_bitlk_by_pkcs11(
11861186
/* Before using this key as passphrase we base64 encode it. Why? For compatibility
11871187
* with homed's PKCS#11 hookup: there we want to use the key we acquired through
11881188
* PKCS#11 for other authentication/decryption mechanisms too, and some of them do
1189-
* not not take arbitrary binary blobs, but require NUL-terminated strings — most
1189+
* not take arbitrary binary blobs, but require NUL-terminated strings — most
11901190
* importantly UNIX password hashes. Hence, for compatibility we want to use a string
11911191
* without embedded NUL here too, and that's easiest to generate from a binary blob
11921192
* via base64 encoding. */

src/home/homed-home.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1452,7 +1452,7 @@ static int home_deactivate_internal(Home *h, bool force, sd_bus_error *error) {
14521452
}
14531453

14541454
/* Let's start a timer to retry deactivation in 15. We'll stop the timer once we manage to deactivate
1455-
* the home directory again, or we we start any other operation. */
1455+
* the home directory again, or we start any other operation. */
14561456
home_start_retry_deactivate(h);
14571457

14581458
return r;

src/nspawn/nspawn-cgroup.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ int create_subcgroup(pid_t pid, bool keep_unit, CGroupUnified unified_requested)
154154
* the unified hierarchy and the container does the same, and we did not create a scope unit for the container
155155
* move us and the container into two separate subcgroups.
156156
*
157-
* Moreover, container payloads such as systemd try to manage the cgroup they run in in full (i.e. including
157+
* Moreover, container payloads such as systemd try to manage the cgroup they run in full (i.e. including
158158
* its attributes), while the host systemd will only delegate cgroups for children of the cgroup created for a
159159
* delegation unit, instead of the cgroup itself. This means, if we'd pass on the cgroup allocated from the
160160
* host systemd directly to the payload, the host and payload systemd might fight for the cgroup

src/nspawn/nspawn-oci.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2006,7 +2006,7 @@ static int oci_masked_paths(const char *name, JsonVariant *v, JsonDispatchFlags
20062006

20072007
if (!path_is_absolute(p))
20082008
return json_log(v, flags, SYNTHETIC_ERRNO(EINVAL),
2009-
"Path is not not absolute, refusing: %s", p);
2009+
"Path is not absolute, refusing: %s", p);
20102010

20112011
if (oci_exclude_mount(p))
20122012
continue;
@@ -2048,7 +2048,7 @@ static int oci_readonly_paths(const char *name, JsonVariant *v, JsonDispatchFlag
20482048

20492049
if (!path_is_absolute(p))
20502050
return json_log(v, flags, SYNTHETIC_ERRNO(EINVAL),
2051-
"Path is not not absolute, refusing: %s", p);
2051+
"Path is not absolute, refusing: %s", p);
20522052

20532053
if (oci_exclude_mount(p))
20542054
continue;

src/shared/netif-naming-scheme.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ static const NamingScheme naming_schemes[] = {
2929
};
3030

3131
const NamingScheme* naming_scheme_from_name(const char *name) {
32-
/* "latest" may either be defined explicitly by the extra map, in which case we we will find it in
32+
/* "latest" may either be defined explicitly by the extra map, in which case we will find it in
3333
* the table like any other name. After iterating through the table, we check for "latest" again,
3434
* which means that if not mapped explicitly, it maps to the last defined entry, whatever that is. */
3535

src/udev/udevd.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -497,7 +497,7 @@ static int worker_process_device(Manager *manager, sd_device *dev) {
497497
* supposed to be enabled via an option set via udev rules (OPTIONS+="watch"). If we skip the
498498
* udev rules here however (as we just said we do), we would thus never see that specific
499499
* udev rule, and thus never turn on inotify watching. But in order to catch up eventually
500-
* and run them we we need the inotify watching: hence a classic chicken and egg problem.
500+
* and run them we need the inotify watching: hence a classic chicken and egg problem.
501501
*
502502
* Our way out here: if we see the block device locked, unconditionally watch the device via
503503
* inotify, regardless of any explicit request via OPTIONS+="watch". Thus, a device that is

test/networkd-test.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ def write_network_dropin(self, unit_name, dropin_name, contents):
138138

139139
def read_attr(self, link, attribute):
140140
"""Read a link attributed from the sysfs."""
141-
# Note we we don't want to check if interface `link' is managed, we
141+
# Note we don't want to check if interface `link' is managed, we
142142
# want to evaluate link variable and pass the value of the link to
143143
# assert_link_states e.g. eth0=managed.
144144
self.assert_link_states(**{link:'managed'})

0 commit comments

Comments
 (0)