From: Yu Watanabe Date: Sun, 27 Apr 2025 01:35:52 +0000 (+0900) Subject: tree-wide: fix typo X-Git-Tag: v258-rc1~732 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=4db8663b81dc3d6a8a9c3c627b34d62fdfc4aa90;p=thirdparty%2Fsystemd.git tree-wide: fix typo --- diff --git a/NEWS b/NEWS index 147e5511a21..8f6f77c70d0 100644 --- a/NEWS +++ b/NEWS @@ -7017,7 +7017,7 @@ CHANGES WITH 248: * When resolving host names and other records resolvectl will now report where the data was acquired from (i.e. the local cache, the network, locally synthesized, …) and whether the network traffic it - effected was encrypted or not. Moreover the tool acquired a number of + affected was encrypted or not. Moreover the tool acquired a number of new options --cache=, --synthesize=, --network=, --zone=, --trust-anchor=, --validate= that take booleans and may be used to tweak a lookup, i.e. whether it may be answered from cached @@ -7151,7 +7151,7 @@ CHANGES WITH 248: set-property". Once a marker is set, "systemctl reload-or-restart --marked" may be invoked to execute the operation the units are marked for. This is useful for package managers that want to mark - units for restart/reload while updating, but effect the actual + units for restart/reload while updating, but affect the actual operations at a later step at once. * The sd_bus_message_read_strv() API call of sd-bus may now also be diff --git a/docs/OSC-CONTEXT.md b/docs/OSC-CONTEXT.md index 52ccb032844..db06458f10d 100644 --- a/docs/OSC-CONTEXT.md +++ b/docs/OSC-CONTEXT.md @@ -198,7 +198,7 @@ contexts be discarded, not the opposite). Overly long fields should be discarded (or potentially truncated, depending on the field type). This specification does not recommend any specific stack or string limits for now. -The usual terminal reset sequences should *not* effect the stack of contexts +The usual terminal reset sequences should *not* affect the stack of contexts (this is a safety feature: a program down the stack should not be able to affect the stack further up, possibly hiding relevant information). A temporary TTY hangup (`vhangup()`) should result in a full reset of the stack. diff --git a/man/nss-systemd.xml b/man/nss-systemd.xml index fc887cacacd..ff4416c2582 100644 --- a/man/nss-systemd.xml +++ b/man/nss-systemd.xml @@ -100,7 +100,7 @@ lrwxrwxrwx. 1 root root 19 May 10 4711.user-privileged -> foobar.user-privileg username:groupname.membership should be created, i.e. the textual UNIX user name, followed by a colon, followed by the textual UNIX group name, suffixed by .membership. The contents of these files are currently not - read, and the files should be created empty. The mere existence of these files is enough to effect a + read, and the files should be created empty. The mere existence of these files is enough to affect a user/group membership. If a program provides user and/or group record files in the searched directories, it should always also create such files, both for primary and auxiliary group memberships. diff --git a/man/systemd-cgtop.xml b/man/systemd-cgtop.xml index 5b5ab5b7360..9ed60e2edc6 100644 --- a/man/systemd-cgtop.xml +++ b/man/systemd-cgtop.xml @@ -189,7 +189,7 @@ pressing the r key. Note that this setting only applies to process counting, i.e. when the or options are - used. It has not effect if all tasks are counted, in which + used. It has no effect if all tasks are counted, in which case the counting is always recursive. diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index ce76fb793b2..c57fd2e5d3b 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -2131,7 +2131,7 @@ BindReadOnlyPaths=/var/lib/systemd services need to write to these at runtime; it is hence recommended to turn this on for most services. For this setting the same restrictions regarding mount propagation and privileges apply as for ReadOnlyPaths= and related calls, see above. Defaults to off. - Note that this option does not prevent indirect changes to kernel tunables effected by IPC calls to + Note that this option does not prevent indirect changes to kernel tunables affected by IPC calls to other processes. However, InaccessiblePaths= may be used to make relevant IPC file system objects inaccessible. If ProtectKernelTunables= is set, MountAPIVFS=yes is implied. diff --git a/src/core/main.c b/src/core/main.c index 2d7f574fec9..affffb667fe 100644 --- a/src/core/main.c +++ b/src/core/main.c @@ -880,7 +880,7 @@ static void set_manager_settings(Manager *m) { assert(m); /* Propagates the various manager settings into the manager object, i.e. properties that - * effect the manager itself (as opposed to just being inherited into newly allocated + * affect the manager itself (as opposed to just being inherited into newly allocated * units, see set_manager_defaults() above). */ m->confirm_spawn = arg_confirm_spawn; diff --git a/src/core/unit.h b/src/core/unit.h index d1a0e20a435..4102abd0918 100644 --- a/src/core/unit.h +++ b/src/core/unit.h @@ -99,7 +99,7 @@ typedef enum UnitDependencyMask { * type) */ UNIT_DEPENDENCY_IMPLICIT = 1 << 1, - /* A dependency effected by DefaultDependencies=yes. Note that dependencies marked this way are conceptually + /* A dependency affected by DefaultDependencies=yes. Note that dependencies marked this way are conceptually * just a subset of UNIT_DEPENDENCY_FILE, as DefaultDependencies= is itself a unit file setting that can only * be set in unit files. We make this two separate bits only to help debugging how dependencies came to be. */ UNIT_DEPENDENCY_DEFAULT = 1 << 2,