From: Yu Watanabe Date: Tue, 4 May 2021 11:16:12 +0000 (+0900) Subject: tree-wide: fix typo X-Git-Tag: v249-rc1~305 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=296c13dec4019c86dbb9197617e447e40781e79d;p=thirdparty%2Fsystemd.git tree-wide: fix typo --- diff --git a/docs/CONTAINER_INTERFACE.md b/docs/CONTAINER_INTERFACE.md index 16e9224b73d..ff458bd770a 100644 --- a/docs/CONTAINER_INTERFACE.md +++ b/docs/CONTAINER_INTERFACE.md @@ -336,7 +336,7 @@ care should be taken to avoid naming conflicts. `systemd` (and in particular actual attempt to make use of the audit subsystem will fail. Note that systemd's audit support is partially conditioned on these capabilities, thus by dropping them you ensure that you get an entirely clean boot, as systemd - will make no attempt to use it. If you pass the capabilites to the payload + will make no attempt to use it. If you pass the capabilities to the payload systemd will assume that audit is available and works, and some components will subsequently fail in various ways. Note that once the kernel learnt native support for container-virtualized audit, adding the capability to the diff --git a/src/core/bpf/socket_bind/socket-bind-api.bpf.h b/src/core/bpf/socket_bind/socket-bind-api.bpf.h index 2f084087475..418889955bb 100644 --- a/src/core/bpf/socket_bind/socket-bind-api.bpf.h +++ b/src/core/bpf/socket_bind/socket-bind-api.bpf.h @@ -18,7 +18,7 @@ * are matched by ports. * nr_ports and port_min fields specify a set of ports to match a user port * with. - * If nr_ports is 0, maching by port is bypassed, making that rule applicable + * If nr_ports is 0, matching by port is bypassed, making that rule applicable * for all possible ports, e.g. [1, 65535] range. Thus a rule with * address_family and nr_ports equal to AF_UNSPEC and 0 correspondingly forms * 'allow any' or 'deny any' cases.