From d09df6b94e0c4924ea7064c79ab0441f5aff469b Mon Sep 17 00:00:00 2001 From: Yu Watanabe Date: Fri, 20 Jan 2023 15:32:16 +0900 Subject: [PATCH] tree-wide: fix typo --- NEWS | 4 ++-- TODO | 2 +- man/systemd-analyze.xml | 4 ++-- man/systemd-boot-random-seed.service.xml | 2 +- man/systemd.mount.xml | 2 +- man/systemd.service.xml | 2 +- src/boot/bootctl-status.c | 2 +- src/boot/efi/boot.c | 2 +- src/core/execute.c | 2 +- src/core/service.c | 2 +- src/cryptsetup/cryptsetup.c | 2 +- src/gpt-auto-generator/gpt-auto-generator.c | 2 +- src/libsystemd-network/sd-dhcp6-client.c | 2 +- 13 files changed, 15 insertions(+), 15 deletions(-) diff --git a/NEWS b/NEWS index 67bb7a9b8d2..4b70cce9cda 100644 --- a/NEWS +++ b/NEWS @@ -115,14 +115,14 @@ CHANGES WITH 253 in spe: * The [DHCPv4] section in .network file gained new SocketPriority= setting that assigns the Linux socket priority used by the DHCPv4 - raw socket. Can be used in conjuntion with the EgressQOSMaps=setting + raw socket. Can be used in conjunction with the EgressQOSMaps=setting in [VLAN] section of .netdev file to send the desired ethernet 802.1Q frame priority for DHCPv4 initial packets. This cannot be achieved with netfilter mangle tables because of the raw socket bypass. * The [DHCPv4] and [IPv6AcceptRA] sections in .network file gained new QuickAck= boolean setting that enables the TCP quick ACK mode for the - routes configured by the aquired DHCPv4 lease or received router + routes configured by the acquired DHCPv4 lease or received router advertisements (RAs). * The RouteMetric= option (for DHCPv4, DHCPv6, and IPv6 advertised diff --git a/TODO b/TODO index e78cfa15962..8de57904221 100644 --- a/TODO +++ b/TODO @@ -131,7 +131,7 @@ Features: the executor then gets replaced by the real binary sooner or later. Reason: currently the intermediary "stub" process is a CoW trap that doubles memory usage of PID 1 on each service start. Also, strictly speaking we are not - allowd to do NSS from the stub process yet we do anyway. Next steps would + allowed to do NSS from the stub process yet we do anyway. Next steps would then be maybe use CLONE_INTO_CGROUP for the executor, given that we don't need glibc anymore in the stub process then. Then, switch nspawn to just be a frontend for this too, so that we have to ways into the executor: via unit diff --git a/man/systemd-analyze.xml b/man/systemd-analyze.xml index d5f1e5ae890..f81dcc324ae 100644 --- a/man/systemd-analyze.xml +++ b/man/systemd-analyze.xml @@ -1213,13 +1213,13 @@ $ systemd-analyze verify /tmp/source:alias.service which is the default, and which respectively output a prettified or shorted JSON version of the security table. - With the plot command, genereate a JSON formatted output of the raw time data. + With the plot command, generate a JSON formatted output of the raw time data. The format is a JSON array with objects containing the following fields: name which is the unit name, activated which is the time after startup the service was activated, activating which is how long after startup the service was initially started, time which is how long the service took to activate from when it was initially started, deactivated which is the time after startup - that the service was deactivated, deactivating whcih is the time after startup + that the service was deactivated, deactivating which is the time after startup that the service was initially told to deactivate. diff --git a/man/systemd-boot-random-seed.service.xml b/man/systemd-boot-random-seed.service.xml index 86ce639828a..8685bae1f9c 100644 --- a/man/systemd-boot-random-seed.service.xml +++ b/man/systemd-boot-random-seed.service.xml @@ -32,7 +32,7 @@ refreshes the boot loader random seed stored in the EFI System Partition (ESP), from the Linux kernel entropy pool. The boot loader random seed is primarily consumed and updated by systemd-boot7 from the - UEFI environemnt (or + UEFI environment (or systemd-stub7 if the former is not used, but the latter is), and passed as initial RNG seed to the OS. It is an effective way to ensure the OS comes up with a random pool that is fully initialized. diff --git a/man/systemd.mount.xml b/man/systemd.mount.xml index 890128646d9..550f006601e 100644 --- a/man/systemd.mount.xml +++ b/man/systemd.mount.xml @@ -376,7 +376,7 @@ Note that this option can only be used in /etc/fstab, and will be ignored when part of the Options= setting in a unit file. It is also implied for the root - and /usr/ partitions dicovered by + and /usr/ partitions discovered by systemd-gpt-auto-generator8. diff --git a/man/systemd.service.xml b/man/systemd.service.xml index 641d6ac4790..d44c48c7b1c 100644 --- a/man/systemd.service.xml +++ b/man/systemd.service.xml @@ -519,7 +519,7 @@ ExecReload=kill -HUP $MAINPID - Note however that reloading a daemon by enqueing a signal (as with the example line above) is + Note however that reloading a daemon by enqueuing a signal (as with the example line above) is usually not a good choice, because this is an asynchronous operation and hence not suitable when ordering reloads of multiple services against each other. It is thus strongly recommended to either use Type= in place of diff --git a/src/boot/bootctl-status.c b/src/boot/bootctl-status.c index 8077a8a0055..ffdf7e7d700 100644 --- a/src/boot/bootctl-status.c +++ b/src/boot/bootctl-status.c @@ -576,7 +576,7 @@ static void deref_unlink_file(Hashmap *known_files, const char *fn, const char * if (path_extract_directory(fn, &d) >= 0 && !path_equal(d, "/")) { r = chase_symlinks_and_unlink(d, root, CHASE_PREFIX_ROOT|CHASE_PROHIBIT_SYMLINKS, AT_REMOVEDIR, NULL); if (r < 0 && !IN_SET(r, -ENOTEMPTY, -ENOENT)) - log_warning_errno(r, "Failed to remove directoy \"%s\", ignoring: %m", d); + log_warning_errno(r, "Failed to remove directory \"%s\", ignoring: %m", d); } } diff --git a/src/boot/efi/boot.c b/src/boot/efi/boot.c index af05859a7e7..8d6e689b37b 100644 --- a/src/boot/efi/boot.c +++ b/src/boot/efi/boot.c @@ -28,7 +28,7 @@ #ifndef GNU_EFI_USE_MS_ABI /* We do not use uefi_call_wrapper() in systemd-boot. As such, we rely on the * compiler to do the calling convention conversion for us. This is check is - * to make sure the -DGNU_EFI_USE_MS_ABI was passed to the comiler. */ + * to make sure the -DGNU_EFI_USE_MS_ABI was passed to the compiler. */ #error systemd-boot requires compilation with GNU_EFI_USE_MS_ABI defined. #endif diff --git a/src/core/execute.c b/src/core/execute.c index 221da310659..f5d57a63b55 100644 --- a/src/core/execute.c +++ b/src/core/execute.c @@ -4908,7 +4908,7 @@ static int exec_child( /* If the user namespace was not set up above, try to do it now. * It's preferred to set up the user namespace later (after all other namespaces) so as not to be - * restricted by rules pertaining to combining user namspaces with other namespaces (e.g. in the + * restricted by rules pertaining to combining user namespaces with other namespaces (e.g. in the * case of mount namespaces being less privileged when the mount point list is copied from a * different user namespace). */ diff --git a/src/core/service.c b/src/core/service.c index a376b70f427..9c2fb2ee1c8 100644 --- a/src/core/service.c +++ b/src/core/service.c @@ -3832,7 +3832,7 @@ static void service_sigchld_event(Unit *u, pid_t pid, int code, int status) { s->reload_result = f; - /* If the last notification we received from the service process indiciates + /* If the last notification we received from the service process indicates * we are still reloading, then don't leave reloading state just yet, just * transition into SERVICE_RELOAD_NOTIFY, to wait for the READY=1 coming, * too. */ diff --git a/src/cryptsetup/cryptsetup.c b/src/cryptsetup/cryptsetup.c index d40fe7bfad3..38ee7f89353 100644 --- a/src/cryptsetup/cryptsetup.c +++ b/src/cryptsetup/cryptsetup.c @@ -92,7 +92,7 @@ static bool arg_fido2_device_auto = false; static void *arg_fido2_cid = NULL; static size_t arg_fido2_cid_size = 0; static char *arg_fido2_rp_id = NULL; -static char *arg_tpm2_device = NULL; /* These and the following fields are about locking an encypted volume to the local TPM */ +static char *arg_tpm2_device = NULL; /* These and the following fields are about locking an encrypted volume to the local TPM */ static bool arg_tpm2_device_auto = false; static uint32_t arg_tpm2_pcr_mask = UINT32_MAX; static char *arg_tpm2_signature = NULL; diff --git a/src/gpt-auto-generator/gpt-auto-generator.c b/src/gpt-auto-generator/gpt-auto-generator.c index 9b113180171..dcf95a3ee1e 100644 --- a/src/gpt-auto-generator/gpt-auto-generator.c +++ b/src/gpt-auto-generator/gpt-auto-generator.c @@ -455,7 +455,7 @@ static int add_automount( static const char *esp_or_xbootldr_options(const DissectedPartition *p) { assert(p); - /* Discoveried ESP and XBOOTLDR partition are always hardened with "noexec,nosuid,nodev". + /* Discovered ESP and XBOOTLDR partition are always hardened with "noexec,nosuid,nodev". * If we probed vfat or have no idea about the file system then assume these file systems are vfat * and thus understand "umask=0077". */ diff --git a/src/libsystemd-network/sd-dhcp6-client.c b/src/libsystemd-network/sd-dhcp6-client.c index 40edfd39081..57dd91f81f3 100644 --- a/src/libsystemd-network/sd-dhcp6-client.c +++ b/src/libsystemd-network/sd-dhcp6-client.c @@ -1383,7 +1383,7 @@ int sd_dhcp6_client_stop(sd_dhcp6_client *client) { return 0; /* Intentionally ignoring failure to send DHCP6 release. The DHCPv6 client - engine is about to release its UDP socket inconditionally. */ + * engine is about to release its UDP socket unconditionally. */ r = client_send_release(client); if (r < 0) log_dhcp6_client_errno(client, r, -- 2.39.2