diff options
author | wosch <wosch@FreeBSD.org> | 1996-10-05 22:27:30 +0000 |
---|---|---|
committer | wosch <wosch@FreeBSD.org> | 1996-10-05 22:27:30 +0000 |
commit | 000fb64288e6720527f55bf8c37e36c07a308d49 (patch) | |
tree | e09db4b1b56461dbe8a4d233c39a90678607f597 /sbin | |
parent | e5ff1bbc6e5b0efe790ab98ee1d41555abd74268 (diff) | |
download | FreeBSD-src-000fb64288e6720527f55bf8c37e36c07a308d49.zip FreeBSD-src-000fb64288e6720527f55bf8c37e36c07a308d49.tar.gz |
delete doubled words, e.g.: "the the" -> "the"
Diffstat (limited to 'sbin')
-rw-r--r-- | sbin/mount_null/mount_null.8 | 4 | ||||
-rw-r--r-- | sbin/mount_nullfs/mount_nullfs.8 | 4 | ||||
-rw-r--r-- | sbin/ping/ping.8 | 3 |
3 files changed, 6 insertions, 5 deletions
diff --git a/sbin/mount_null/mount_null.8 b/sbin/mount_null/mount_null.8 index fbdddb7..1a47b27 100644 --- a/sbin/mount_null/mount_null.8 +++ b/sbin/mount_null/mount_null.8 @@ -35,7 +35,7 @@ .\" SUCH DAMAGE. .\" .\" @(#)mount_null.8 8.4 (Berkeley) 4/19/94 -.\" +.\" $Id$ .\" .Dd April 19, 1994 .Dt MOUNT_NULL 8 @@ -195,7 +195,7 @@ by mapping an vnode arguments to the lower layer. The first approach is to call the aliasing layer's bypass routine. This method is most suitable when you wish to invoke the operation currently being handled on the lower layer. It has the advantage -the the bypass routine already must do argument mapping. +the bypass routine already must do argument mapping. An example of this is .Em null_getattrs in the null layer. diff --git a/sbin/mount_nullfs/mount_nullfs.8 b/sbin/mount_nullfs/mount_nullfs.8 index fbdddb7..1a47b27 100644 --- a/sbin/mount_nullfs/mount_nullfs.8 +++ b/sbin/mount_nullfs/mount_nullfs.8 @@ -35,7 +35,7 @@ .\" SUCH DAMAGE. .\" .\" @(#)mount_null.8 8.4 (Berkeley) 4/19/94 -.\" +.\" $Id$ .\" .Dd April 19, 1994 .Dt MOUNT_NULL 8 @@ -195,7 +195,7 @@ by mapping an vnode arguments to the lower layer. The first approach is to call the aliasing layer's bypass routine. This method is most suitable when you wish to invoke the operation currently being handled on the lower layer. It has the advantage -the the bypass routine already must do argument mapping. +the bypass routine already must do argument mapping. An example of this is .Em null_getattrs in the null layer. diff --git a/sbin/ping/ping.8 b/sbin/ping/ping.8 index b2a6bf7..8ec5bc1 100644 --- a/sbin/ping/ping.8 +++ b/sbin/ping/ping.8 @@ -30,6 +30,7 @@ .\" SUCH DAMAGE. .\" .\" @(#)ping.8 8.2 (Berkeley) 12/11/93 +.\" $Id$ .\" .Dd December 11, 1993 .Dt PING 8 @@ -326,7 +327,7 @@ The maximum IP header length is too small for options like .Tn RECORD_ROUTE to be completely useful. -There's not much that that can be done about this, however. +There's not much that can be done about this, however. .Pp Flood pinging is not recommended in general, and flood pinging the broadcast address should only be done under very controlled conditions. |