diff --git a/TODO b/TODO index 2f7bbbfa28..fb29a975f7 100644 --- a/TODO +++ b/TODO @@ -20,7 +20,7 @@ Janitorial Clean-ups: Features: -* teach LoadCredential= the ability to load all files from a specfied dir as +* teach LoadCredential= the ability to load all files from a specified dir as individual creds * systemd-analyze netif that explains predictable interface (or networkctl) @@ -49,7 +49,7 @@ Features: that the kernel does what we otherwise do. * homed: keep an fd to the homedir open at all times, to keep the fs pinned - (autofs and such) while user is loged in. + (autofs and such) while user is logged in. * nss-systemd: also synthesize shadow records for users/groups diff --git a/docs/BOOT_LOADER_SPECIFICATION.md b/docs/BOOT_LOADER_SPECIFICATION.md index 715b14e0e4..290977142c 100644 --- a/docs/BOOT_LOADER_SPECIFICATION.md +++ b/docs/BOOT_LOADER_SPECIFICATION.md @@ -127,7 +127,7 @@ identifier (The ID field of `/etc/os-release`). Example: In order to maximize compatibility with file system implementations and restricted boot loader environments, and to minimize conflicting character use -with other progams, file names shall be chosen from a restricted character set: +with other programs, file names shall be chosen from a restricted character set: ASCII upper and lower case characters, digits, "+", "-", "_" and ".". Also, the file names should have a length of at least one and at most 255 characters (including file name suffix). diff --git a/man/less-variables.xml b/man/less-variables.xml index 049e9f75d7..702ca06c76 100644 --- a/man/less-variables.xml +++ b/man/less-variables.xml @@ -87,7 +87,7 @@ pager may be enabled automatically as describe above. Setting SYSTEMD_PAGERSECURE=0 or not removing it from the inherited environment allows the user to invoke arbitrary commands. Note that if the $SYSTEMD_PAGER or $PAGER variables are to be - honoured, $SYSTEMD_PAGERSECURE must be set too. It might be reasonable to completly + honoured, $SYSTEMD_PAGERSECURE must be set too. It might be reasonable to completely disable the pager using instead. diff --git a/man/machine-id.xml b/man/machine-id.xml index 7e889ca47a..45607d5264 100644 --- a/man/machine-id.xml +++ b/man/machine-id.xml @@ -124,7 +124,7 @@ If /etc/machine-id does not exist, this is a first boot. During - early boot, systemd will write unitialized\n to this file and overmount + early boot, systemd will write uninitialized\n to this file and overmount a temporary file which contains the actual machine ID. Later (after first-boot-complete.target has been reached), the real machine ID will be written to disk. diff --git a/man/systemd-cryptsetup-generator.xml b/man/systemd-cryptsetup-generator.xml index cb18db246b..a479b23406 100644 --- a/man/systemd-cryptsetup-generator.xml +++ b/man/systemd-cryptsetup-generator.xml @@ -125,7 +125,7 @@ luks.uuid=, the data device will be set to the one specified by rd.luks.data= or luks.data= of the corresponding UUID. - LUKS data device parameter is usefull for specifying encrypted data devices with detached headers specified in + LUKS data device parameter is useful for specifying encrypted data devices with detached headers specified in luks.options entry containing header= argument. For example, rd.luks.uuid=b40f1abf-2a53-400a-889a-2eccc27eaa40 rd.luks.options=b40f1abf-2a53-400a-889a-2eccc27eaa40=header=/path/to/luks.hdr diff --git a/man/systemd-resolved.service.xml b/man/systemd-resolved.service.xml index 8f3494e36b..8bd3ade9e2 100644 --- a/man/systemd-resolved.service.xml +++ b/man/systemd-resolved.service.xml @@ -184,7 +184,7 @@ In case of single-label names, when search domains are defined, the same logic applies, except that the name is first suffixed by each of the search domains in turn. Note that this search logic - doesn't apply to any names with at least one dot. Also see the discussion about compatiblity with + doesn't apply to any names with at least one dot. Also see the discussion about compatibility with the traditional glibc resolver below. If a query does not match any configured routing domain (either per-link or global), it @@ -232,7 +232,7 @@ /etc/hosts. Single-label names are not resolved for A and AAAA records using unicast DNS (unless - overriden with ResolveUnicastSingleLabel=, see + overridden with ResolveUnicastSingleLabel=, see resolved.conf5). This is similar to the option being set in resolv.conf5. diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index 454dd66199..5c18fffbc8 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -885,7 +885,7 @@ CapabilityBoundingSet=~CAP_B CAP_C umask2 for details. Defaults to 0022 for system units. For user units the default value is inherited from the per-user service manager (whose default is in turn inherited from the system service manager, and - thus typically also is 0022 — unless overriden by a PAM module). In order to change the per-user mask + thus typically also is 0022 — unless overridden by a PAM module). In order to change the per-user mask for all user services, consider setting the UMask= setting of the user's user@.service system service instance. The per-user umask may also be set via the umask field of a user's JSON User diff --git a/man/systemd.net-naming-scheme.xml b/man/systemd.net-naming-scheme.xml index e894db7cd6..6efb5be2fb 100644 --- a/man/systemd.net-naming-scheme.xml +++ b/man/systemd.net-naming-scheme.xml @@ -362,7 +362,7 @@ v247 - If the PCI slot is assocated with PCI bridge and that has multiple child network + If the PCI slot is associated with PCI bridge and that has multiple child network controllers then all of them might derive the same value of ID_NET_NAME_SLOT property. That could cause naming conflict if the property is selected as a device name. Now, we detect the situation, slot - bridge relation, and we don't produce the ID_NET_NAME_SLOT property to diff --git a/src/shared/loop-util.c b/src/shared/loop-util.c index 1c92fdbf5f..740dccb935 100644 --- a/src/shared/loop-util.c +++ b/src/shared/loop-util.c @@ -270,7 +270,7 @@ static int attach_empty_file(int loop, int nr) { * partitions results in immediatey IO errors. There's no pretty way to get rid of them * again. Neither LOOP_CLR_FD nor LOOP_CTL_REMOVE suffice (see above). What does work is to * reassociate them with a new fd however. This is what we do here hence: we associate the devices - * with an empty file (i.e. an image that definitely has no partitons). We then immediately clear it + * with an empty file (i.e. an image that definitely has no partitions). We then immediately clear it * again. This suffices to make the partitions go away. Ugly but appears to work. */ log_debug("Found unattached loopback block device /dev/loop%i with partitions. Attaching empty file to remove them.", nr);