summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFrantisek Sumsal <frantisek@sumsal.cz>2023-04-20 21:54:59 +0200
committerFrantisek Sumsal <frantisek@sumsal.cz>2023-04-20 21:54:59 +0200
commit94d82b59807488343bd206ba8f111d24ff17d9c1 (patch)
tree7df4d9d1e1f45ad8d82bbcee498a4e415dd06761
parentff707dd1b1a6bd49e7f693564ec204f23ad23a7d (diff)
downloadsystemd-94d82b59807488343bd206ba8f111d24ff17d9c1.tar.gz
tree-wide: code spelling fixes
As reported by Fossies.
-rw-r--r--TODO6
-rw-r--r--docs/COREDUMP.md2
-rw-r--r--docs/MEMORY_PRESSURE.md6
-rw-r--r--man/systemctl.xml2
-rw-r--r--man/systemd-cryptenroll.xml2
-rw-r--r--man/systemd.image-policy.xml2
-rw-r--r--man/systemd.link.xml2
-rw-r--r--man/systemd.netdev.xml2
-rw-r--r--man/systemd.resource-control.xml2
-rw-r--r--rules.d/60-persistent-storage.rules.in4
-rw-r--r--src/basic/macro.h2
-rw-r--r--src/basic/mountpoint-util.c4
-rw-r--r--src/dissect/dissect.c2
-rw-r--r--src/shared/image-policy.c2
-rw-r--r--src/shared/varlink.c6
-rw-r--r--test/test-functions2
-rwxr-xr-xtest/units/testsuite-73.sh2
-rwxr-xr-xtest/units/testsuite-81.system-update-generator.sh2
18 files changed, 26 insertions, 26 deletions
diff --git a/TODO b/TODO
index 19a2535e1b..ea35f3b7db 100644
--- a/TODO
+++ b/TODO
@@ -134,7 +134,7 @@ Features:
allow the host to read it, while making everything read-only.
* fix our various hwdb lookup keys to end with ":" again. The original idea was
- that hwdb patters can match arbitrary fields with expressions like
+ that hwdb patterns can match arbitrary fields with expressions like
"*:foobar:*", to wildcard match both the start and the end of the string.
This only works safely for later extensions of the string if the strings
always end in a colon. This requires updating our udev rules, as well as
@@ -142,7 +142,7 @@ Features:
* mount /tmp/ and /var/tmp with a uidmap applied that blocks out "nobody" user
among other things such as dynamic uid ranges for containers and so on. That
- way noone can create files there with these uids and we enforce they are only
+ way no one can create files there with these uids and we enforce they are only
used transiently, never persistently.
* rework loopback support in fstab: when "loop" option is used, then
@@ -188,7 +188,7 @@ Features:
* journald: also collect CLOCK_BOOTTIME timestamps per log entry. Then, derive
"corrected" CLOCK_REALTIME information on display from that and the timestamp
- info of the newest entry of the specificy boot (as identified by the boot
+ info of the newest entry of the specific boot (as identified by the boot
ID). This way, if a system comes up without a valid clock but acquires a
better clock later, we can "fix" older entry timestamps on display, by
calculating backwards. We cannot use CLOCK_MONOTONIC for this, since it does
diff --git a/docs/COREDUMP.md b/docs/COREDUMP.md
index 7d17d3069e..c64579e2fd 100644
--- a/docs/COREDUMP.md
+++ b/docs/COREDUMP.md
@@ -70,7 +70,7 @@ management and sandboxing.
The `systemd-coredump` handler will extract a backtrace and [ELF packaging
metadata](https://systemd.io/ELF_PACKAGE_METADATA) from any coredumps it
-receieves and log both. The information about coredumps stored in the journal
+receives and log both. The information about coredumps stored in the journal
can be enumerated and queried with the
[`coredumpctl`](https://www.freedesktop.org/software/systemd/man/coredumpctl.html)
tool, for example for directly invoking a debugger such as `gdb` on a collected
diff --git a/docs/MEMORY_PRESSURE.md b/docs/MEMORY_PRESSURE.md
index 6a14d74f44..aed25cb49a 100644
--- a/docs/MEMORY_PRESSURE.md
+++ b/docs/MEMORY_PRESSURE.md
@@ -29,7 +29,7 @@ userspace process can detect mounting memory pressure early and release memory
back to the kernel as it happens, relieving the memory pressure before it
becomes too critical.
-The effects of memory pressure during runtime generaly are growing latencies
+The effects of memory pressure during runtime generally are growing latencies
during operation: when a program requires memory but the system is busy writing
out memory to (relatively slow) disks in order make some available, this
generally surfaces in scheduling latencies, and applications and services will
@@ -146,8 +146,8 @@ is specifically useful for services that consist of multiple processes, and
where each of them shall be able to release resources on memory pressure.
The `POLLPRI`/`POLLIN` conditions will be triggered every time memory pressure
-is detected, but not continously. It is thus safe to keep `poll()`-ing on the
-same file descriptor continously, and executing resource release operations
+is detected, but not continuously. It is thus safe to keep `poll()`-ing on the
+same file descriptor continuously, and executing resource release operations
whenever the file descriptor triggers without having to expect overloading the
process.
diff --git a/man/systemctl.xml b/man/systemctl.xml
index 705ed3e238..639c888110 100644
--- a/man/systemctl.xml
+++ b/man/systemctl.xml
@@ -538,7 +538,7 @@ Jan 12 10:46:45 example.com bluetoothd[8900]: gatt-time-server: Input/output err
<varname>StateDirectory=</varname>, <varname>CacheDirectory=</varname>,
<varname>LogsDirectory=</varname> and <varname>RuntimeDirectory=</varname>, see
<citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>
- for details. It may also be used to clear the file decriptor store as enabled via
+ for details. It may also be used to clear the file descriptor store as enabled via
<varname>FileDescriptorStoreMax=</varname>, see
<citerefentry><refentrytitle>systemd.service</refentrytitle><manvolnum>5</manvolnum></citerefentry>
for details. For timer units this may be used to clear out the persistent timestamp data if
diff --git a/man/systemd-cryptenroll.xml b/man/systemd-cryptenroll.xml
index dc3c999321..6ca850e0ef 100644
--- a/man/systemd-cryptenroll.xml
+++ b/man/systemd-cryptenroll.xml
@@ -187,7 +187,7 @@
<row>
<entry>15</entry>
<entry>system-identity</entry>
- <entry><citerefentry><refentrytitle>systemd-cryptsetup</refentrytitle><manvolnum>8</manvolnum></citerefentry> optionally measures the volume key of activated LUKS volumes into this PCR. <citerefentry><refentrytitle>systemd-pcrmachine.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures the <citerefentry><refentrytitle>machine-id</refentrytitle><manvolnum>5</manvolnum></citerefentry> into this PCR. <citerefentry><refentrytitle>systemd-pcrfs@.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures mount points, file system UUIDs, labels, partion UUIDs of the root and <filename>/var/</filename> filesystems into this PCR.</entry>
+ <entry><citerefentry><refentrytitle>systemd-cryptsetup</refentrytitle><manvolnum>8</manvolnum></citerefentry> optionally measures the volume key of activated LUKS volumes into this PCR. <citerefentry><refentrytitle>systemd-pcrmachine.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures the <citerefentry><refentrytitle>machine-id</refentrytitle><manvolnum>5</manvolnum></citerefentry> into this PCR. <citerefentry><refentrytitle>systemd-pcrfs@.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures mount points, file system UUIDs, labels, partition UUIDs of the root and <filename>/var/</filename> filesystems into this PCR.</entry>
</row>
<row>
diff --git a/man/systemd.image-policy.xml b/man/systemd.image-policy.xml
index 4f7b0986b6..5ea9e46ec2 100644
--- a/man/systemd.image-policy.xml
+++ b/man/systemd.image-policy.xml
@@ -38,7 +38,7 @@
<option>usr-verity</option>, <option>usr-verity-sig</option>, <option>tmp</option>,
<option>var</option>. These identifiers match the relevant partition types in the Discoverable Partitions
Specification, but are agnostic to CPU architectures. If the partition identifier is left empty it
- defines the <emphasis>default</emphasis> policy for partitions defined in the Discoverable Parition
+ defines the <emphasis>default</emphasis> policy for partitions defined in the Discoverable Partitions
Specification for which no policy flags are explicitly listed in the policy string.</para>
<para>The following partition policy flags are defined that dictate the existence/absence, the use, and
diff --git a/man/systemd.link.xml b/man/systemd.link.xml
index 546a6a006b..cc851d31f9 100644
--- a/man/systemd.link.xml
+++ b/man/systemd.link.xml
@@ -1143,7 +1143,7 @@ Name=dmz0</programlisting>
<example>
<title>(Re-)applying a .link file to an interface</title>
- <para>After a new .link file has been created, or an exisiting .link file modified, the new settings
+ <para>After a new .link file has been created, or an existing .link file modified, the new settings
may be applied to the matching interface with the following commands:</para>
<programlisting>$ sudo udevadm control --reload
diff --git a/man/systemd.netdev.xml b/man/systemd.netdev.xml
index ca0eefdc07..7e6a52c711 100644
--- a/man/systemd.netdev.xml
+++ b/man/systemd.netdev.xml
@@ -829,7 +829,7 @@
<varlistentry>
<term><varname>InheritInnerProtocol=</varname></term>
<listitem>
- <para>Takes a boolean. When true, inner Layer 3 protcol is set as Protocol Type in the GENEVE
+ <para>Takes a boolean. When true, inner Layer 3 protocol is set as Protocol Type in the GENEVE
header instead of Ethernet. Defaults to false.</para>
</listitem>
</varlistentry>
diff --git a/man/systemd.resource-control.xml b/man/systemd.resource-control.xml
index f24822e605..f4e4a492a0 100644
--- a/man/systemd.resource-control.xml
+++ b/man/systemd.resource-control.xml
@@ -112,7 +112,7 @@ CPUWeight=20 DisableControllers=cpu / \
configuration for <filename>system.slice</filename> and <filename>user.slice</filename>, CPU
resources will be split equally between them. Similarly, resources are allocated equally between
children of <filename>user.slice</filename> and between the child slices beneath
- <filename>user@1000.service</filename>. Assuming that there is no futher configuration of resources
+ <filename>user@1000.service</filename>. Assuming that there is no further configuration of resources
or delegation below slices <filename>app.slice</filename> or <filename>session.slice</filename>, the
<option>cpu</option> controller would not be enabled for units in those slices and CPU resources
would be further allocated using other mechanisms, e.g. based on nice levels. The manager for user
diff --git a/rules.d/60-persistent-storage.rules.in b/rules.d/60-persistent-storage.rules.in
index 89c064fb66..88f88a83ed 100644
--- a/rules.d/60-persistent-storage.rules.in
+++ b/rules.d/60-persistent-storage.rules.in
@@ -38,7 +38,7 @@ KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{wwid}=="?*", ENV{ID_WWN
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{model}=="?*", ENV{ID_MODEL}="$attr{model}"
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{firmware_rev}=="?*", ENV{ID_REVISION}="$attr{firmware_rev}"
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{nsid}=="?*", ENV{ID_NSID}="$attr{nsid}"
-# obsolete symlink with non-escaped characters, kept for backward compatiblity
+# obsolete symlink with non-escaped characters, kept for backward compatibility
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ENV{ID_MODEL}=="?*", ENV{ID_SERIAL_SHORT}=="?*", \
ENV{ID_MODEL}!="*/*", ENV{ID_SERIAL_SHORT}!="*/*", \
ENV{ID_SERIAL}="$env{ID_MODEL}_$env{ID_SERIAL_SHORT}", SYMLINK+="disk/by-id/nvme-$env{ID_SERIAL}"
@@ -52,7 +52,7 @@ KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{serial}=="?
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{model}=="?*", ENV{ID_MODEL}="$attr{model}"
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{firmware_rev}=="?*", ENV{ID_REVISION}="$attr{firmware_rev}"
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{nsid}=="?*", ENV{ID_NSID}="$attr{nsid}"
-# obsolete symlink with non-escaped characters, kept for backward compatiblity
+# obsolete symlink with non-escaped characters, kept for backward compatibility
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ENV{ID_MODEL}=="?*", ENV{ID_SERIAL_SHORT}=="?*", \
ENV{ID_MODEL}!="*/*", ENV{ID_SERIAL_SHORT}!="*/*", \
ENV{ID_SERIAL}="$env{ID_MODEL}_$env{ID_SERIAL_SHORT}", SYMLINK+="disk/by-id/nvme-$env{ID_SERIAL}-part%n"
diff --git a/src/basic/macro.h b/src/basic/macro.h
index 2770d01aa9..99262e9206 100644
--- a/src/basic/macro.h
+++ b/src/basic/macro.h
@@ -431,7 +431,7 @@ assert_cc(sizeof(dummy_t) == 0);
})
/* Iterate through each variadic arg. All must be the same type as 'entry' or must be implicitly
- * convertable. The iteration variable 'entry' must already be defined. */
+ * convertible. The iteration variable 'entry' must already be defined. */
#define VA_ARGS_FOREACH(entry, ...) \
_VA_ARGS_FOREACH(entry, UNIQ_T(_entries_, UNIQ), UNIQ_T(_current_, UNIQ), ##__VA_ARGS__)
#define _VA_ARGS_FOREACH(entry, _entries_, _current_, ...) \
diff --git a/src/basic/mountpoint-util.c b/src/basic/mountpoint-util.c
index db36b2f2f6..698ea65d48 100644
--- a/src/basic/mountpoint-util.c
+++ b/src/basic/mountpoint-util.c
@@ -95,7 +95,7 @@ int name_to_handle_at_loop(
/* The buffer was too small. Size the new buffer by what name_to_handle_at() returned. */
n = h->handle_bytes;
- /* paranoia: check for overlow (note that .handle_bytes is unsigned only) */
+ /* paranoia: check for overflow (note that .handle_bytes is unsigned only) */
if (n > UINT_MAX - offsetof(struct file_handle, f_handle))
return -EOVERFLOW;
}
@@ -722,7 +722,7 @@ int mount_option_supported(const char *fstype, const char *key, const char *valu
_cleanup_close_ int fd = -EBADF;
int r;
- /* Checks if the specified file system supports a mount option. Returns > 0 if it suppors it, == 0 if
+ /* Checks if the specified file system supports a mount option. Returns > 0 if it supports it, == 0 if
* it does not. Return -EAGAIN if we can't determine it. And any other error otherwise. */
assert(fstype);
diff --git a/src/dissect/dissect.c b/src/dissect/dissect.c
index ab9d796cf4..2d33a967ca 100644
--- a/src/dissect/dissect.c
+++ b/src/dissect/dissect.c
@@ -1089,7 +1089,7 @@ static const char *pick_color_for_uid_gid(uid_t uid) {
if (uid_is_system(uid))
return ansi_normal(); /* files in disk images are typically owned by root and other system users, no issue there */
if (uid_is_dynamic(uid))
- return ansi_highlight_red(); /* files should never be owned persistently by dynamic users, and there are just no execuses */
+ return ansi_highlight_red(); /* files should never be owned persistently by dynamic users, and there are just no excuses */
if (uid_is_container(uid))
return ansi_highlight_cyan();
diff --git a/src/shared/image-policy.c b/src/shared/image-policy.c
index 3c1f924a87..bccd55406e 100644
--- a/src/shared/image-policy.c
+++ b/src/shared/image-policy.c
@@ -705,7 +705,7 @@ const ImagePolicy image_policy_sysext_strict = {
};
const ImagePolicy image_policy_confext = {
- /* For configuraiton extensions, honour root file system, and ignore everything else. After all, we
+ /* For configuration extensions, honour root file system, and ignore everything else. After all, we
* are only interested in the /etc/ tree anyway, and that's really the only place it can be. */
.n_policies = 1,
.policies = {
diff --git a/src/shared/varlink.c b/src/shared/varlink.c
index d15f50dbb2..6b985a4c9b 100644
--- a/src/shared/varlink.c
+++ b/src/shared/varlink.c
@@ -146,7 +146,7 @@ struct Varlink {
/* Further messages to output not yet formatted into text, and thus not included in output_buffer
* yet. We keep them separate from output_buffer, to not violate fd message boundaries: we want that
* each fd that is sent is associated with its fds, and that fds cannot be accidentally associated
- * with preceeding or following messages. */
+ * with preceding or following messages. */
LIST_HEAD(VarlinkJsonQueueItem, output_queue);
VarlinkJsonQueueItem *output_queue_tail;
@@ -1502,7 +1502,7 @@ static int varlink_enqueue_json(Varlink *v, JsonVariant *m) {
assert(v);
assert(m);
- /* If ther are no file descriptors to be queued and no queue entries yet we can shortcut things and
+ /* If there are no file descriptors to be queued and no queue entries yet we can shortcut things and
* append this entry directly to the output buffer */
if (v->n_pushed_fds == 0 && !v->output_queue)
return varlink_format_json(v, m);
@@ -2351,7 +2351,7 @@ int varlink_reset_fds(Varlink *v) {
int varlink_peek_fd(Varlink *v, size_t i) {
assert_return(v, -EINVAL);
- /* Returns one of the file descriptors that were received along witht the current message. This does
+ /* Returns one of the file descriptors that were received along with the current message. This does
* not duplicate the fd nor invalidate it, it hence remains in our possession. */
if (!v->allow_fd_passing_input)
diff --git a/test/test-functions b/test/test-functions
index f6f2bd6322..cef2a780d4 100644
--- a/test/test-functions
+++ b/test/test-functions
@@ -1526,7 +1526,7 @@ check_coverage_reports() {
#
# Also, a note: some tests, like TEST-46, overmount /home with tmpfs, which
# means if your build dir is under /home/your-user (which is usually the
- # case) you might get bogus erorrs and missing coverage.
+ # case) you might get bogus errors and missing coverage.
if ! get_bool "${IGNORE_MISSING_COVERAGE:=}" && \
"${JOURNALCTL:?}" -q --no-pager -D "${root:?}/var/log/journal" --grep "profiling:.+?gcda:[Cc]annot open"; then
derror "Detected possibly missing coverage, check the journal"
diff --git a/test/units/testsuite-73.sh b/test/units/testsuite-73.sh
index 191e3f77a6..e5ac09c2e3 100755
--- a/test/units/testsuite-73.sh
+++ b/test/units/testsuite-73.sh
@@ -651,7 +651,7 @@ EOF
: >/failed
# Make sure the content of kbd-model-map is the one that the tests expect
-# regardless of the version intalled on the distro where the testsuite is
+# regardless of the version installed on the distro where the testsuite is
# running on.
export SYSTEMD_KBD_MODEL_MAP=/usr/lib/systemd/tests/testdata/test-keymap-util/kbd-model-map
diff --git a/test/units/testsuite-81.system-update-generator.sh b/test/units/testsuite-81.system-update-generator.sh
index 6dfee0d898..8ee1feec1c 100755
--- a/test/units/testsuite-81.system-update-generator.sh
+++ b/test/units/testsuite-81.system-update-generator.sh
@@ -30,7 +30,7 @@ run_and_list "$GENERATOR_BIN" "$OUT_DIR"
link_endswith "$OUT_DIR/early/default.target" "/lib/systemd/system/system-update.target"
: "system-update-generator: kernel cmdline warnings"
-# We should warn if the default target is overriden on the kernel cmdline
+# We should warn if the default target is overridden on the kernel cmdline
# by a runlevel or systemd.unit=, but still generate the symlink
SYSTEMD_PROC_CMDLINE="systemd.unit=foo.bar 3" run_and_list "$GENERATOR_BIN" "$OUT_DIR" |& tee /tmp/system-update-generator.log
link_endswith "$OUT_DIR/early/default.target" "/lib/systemd/system/system-update.target"