]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
tree-wide: fix typo
authorYu Watanabe <watanabe.yu+github@gmail.com>
Wed, 18 Oct 2023 03:40:25 +0000 (12:40 +0900)
committerYu Watanabe <watanabe.yu+github@gmail.com>
Wed, 18 Oct 2023 03:40:25 +0000 (12:40 +0900)
NEWS
src/boot/bootctl-set-efivar.c
src/core/execute-serialize.c

diff --git a/NEWS b/NEWS
index b265a645e25d9c88c6f5397dfbf60438a396164b..9767421f59e298994c6527d78e92340a629f0630 100644 (file)
--- a/NEWS
+++ b/NEWS
@@ -68,7 +68,7 @@ CHANGES WITH 255 in spe:
           scheme.
 
         * The 'prefixstable' ipv6 address generation mode now considers the
-          SSID when genrating stable addresses, so that a different stable
+          SSID when generating stable addresses, so that a different stable
           address is used when roaming between wireless networks. If you
           already use 'prefixstable' addresses with wireless networks, the
           stable address chosen will be changed by the update.
index 2fe3c442211218adc0af082d2ad81d1bff82ec43..cb2ed0dca4c2e91c690d2b11077b3711b9ea78b4 100644 (file)
@@ -24,7 +24,7 @@ static int parse_timeout(const char *arg1, char16_t **ret_timeout, size_t *ret_t
 
         assert_cc(STRLEN("menu-disabled") < ELEMENTSOF(utf8));
 
-        /* Note: Since there is no way to query if the booloader supports the string tokens, we explicitly
+        /* Note: Since there is no way to query if the bootloader supports the string tokens, we explicitly
          * set their numerical value(s) instead. This means that some of the sd-boot internal ABI has leaked
          * although the ship has sailed and the side-effects are self-contained.
          */
index dd010660d6a68f875bba0d28885ce22b4e4bc52b..147bbd60edd118446e816fd1e33ac454a5324a9f 100644 (file)
@@ -1086,7 +1086,7 @@ static int exec_cgroup_context_deserialize(CGroupContext *c, FILE *f) {
                                 return r;
                         c->restrict_network_interfaces_is_allow_list = r;
                 } else
-                        log_warning("Failed to parse serialized line, ignorning: %s", l);
+                        log_warning("Failed to parse serialized line, ignoring: %s", l);
         }
 
         return 0;
@@ -1310,7 +1310,7 @@ static int exec_runtime_deserialize(ExecRuntime *rt, FILE *f, FDSet *fds) {
                                 }
                         }
                 } else
-                        log_warning("Failed to parse serialized line, ignorning: %s", l);
+                        log_warning("Failed to parse serialized line, ignoring: %s", l);
         }
 
         return 0;
@@ -1855,7 +1855,7 @@ static int exec_parameters_deserialize(ExecParameters *p, FILE *f, FDSet *fds) {
 
                         sd_id128_to_string(p->invocation_id, p->invocation_id_string);
                 } else
-                        log_warning("Failed to parse serialized line, ignorning: %s", l);
+                        log_warning("Failed to parse serialized line, ignoring: %s", l);
         }
 
         /* Bail out if we got exec-parameters-n-{socket/storage}-fds= but no corresponding
@@ -4004,7 +4004,7 @@ static int exec_command_deserialize(ExecCommand *c, FILE *f) {
                         if (r < 0)
                                 return r;
                 } else
-                        log_warning("Failed to parse serialized line, ignorning: %s", l);
+                        log_warning("Failed to parse serialized line, ignoring: %s", l);
 
         }