tree-wide: spelling fixes

https://github.com/vlajos/misspell_fixer

b6fdeb618c
Thanks to Torstein Husebo <torstein@huseboe.net>.
This commit is contained in:
Veres Lajos 2014-12-29 09:45:58 +00:00 committed by Zbigniew Jędrzejewski-Szmek
parent fd51179d5c
commit f131770b14
27 changed files with 28 additions and 28 deletions

2
NEWS
View File

@ -3555,7 +3555,7 @@ CHANGES WITH 190:
keys all the time, even in graphical sessions. If DEs want
to handle these events on their own they should take the new
handle-power-key, handle-sleep-key and handle-lid-switch
inhibitors during their runtime. A simple way to achiveve
inhibitors during their runtime. A simple way to achieve
that is to invoke the DE wrapped in an invocation of:
systemd-inhibit --what=handle-power-key:handle-sleep-key:handle-lid-switch ...

2
TODO
View File

@ -75,7 +75,7 @@ Features:
* systemd-journal-upload (or a new, related tool): allow pushing out
journal messages onto the network in BSD syslog protocol,
continously. Default to some link-local IP mcast group, to make this
continuously. Default to some link-local IP mcast group, to make this
useful as a one-stop debugging tool.
* synchronize console access with BSD locks:

View File

@ -115,7 +115,7 @@ along with systemd; If not, see <http://www.gnu.org/licenses/>.
<para><function>sd_bus_negotiate_creds()</function> controls
whether implicit sender credentials shall be attached
automatically to all incoming messages. Takes a bus object, a
boolean indicating wether to enable or disable the credential
boolean indicating whether to enable or disable the credential
parts encoded in the bit mask value argument. Note that not all
transports support attaching sender credentials to messages, or do
not support all types of sender credential parameters, or might

View File

@ -147,7 +147,7 @@ along with systemd; If not, see <http://www.gnu.org/licenses/>.
<listitem><para>An invalid argument has been passed. This includes
specyfing an empty mask in <parameter>options</parameter> or a mask
which constains values different than a combination of
which contains values different than a combination of
<constant>WEXITED</constant>, <constant>WSTOPPED</constant>, and
<constant>WCONTINUED</constant>.
</para></listitem>

View File

@ -54,7 +54,7 @@
<title>Description</title>
<para><filename>systemd-machine-id-commit.service</filename> is
a service responsible for commiting any transient
a service responsible for committing any transient
<filename>/etc/machine-id</filename> file to a writable file
system. See
<citerefentry><refentrytitle>machine-id</refentrytitle><manvolnum>5</manvolnum></citerefentry>

View File

@ -535,7 +535,7 @@
at the same location. <literal>try-host</literal>
and <literal>try-guest</literal> do the same
but do not fail if the host does not have
persistant journalling enabled.
persistent journalling enabled.
If <literal>auto</literal> (the default),
and the right subdirectory of
<filename>/var/log/journal</filename>

View File

@ -99,7 +99,7 @@
property "INTERFACE". May contain shell style
globs. This can not be used to match on names
that have already been changed from userspace.
Caution is adviced when matching on
Caution is advised when matching on
kernel-assigned names, as they are known to
be unstable between reboots.</para>
</listitem>

View File

@ -262,7 +262,7 @@
<para>Execute a program to determine whether there
is a match; the key is true if the program returns
successfully. The device properties are made available to the
executed program in the environment. The program's standard ouput
executed program in the environment. The program's standard output
is available in the <varname>RESULT</varname> key.</para>
<para>This can only be used for very short-running foreground tasks. For details,
see <varname>RUN</varname>.</para>

View File

@ -1021,7 +1021,7 @@ static int process_policy(sd_bus *from, sd_bus *to, sd_bus_message *m, Policy *p
}
if (granted) {
/* Then check whether us (the recipient) can recieve from the sender's name */
/* Then check whether us (the recipient) can receive from the sender's name */
if (strv_isempty(sender_names)) {
if (policy_check_recv(policy, our_ucred->uid, our_ucred->gid, m->header->type, NULL, m->path, m->interface, m->member))
return 0;

View File

@ -838,7 +838,7 @@ bool policy_check_recv(Policy *p,
verdict = policy_check(p, &filter);
log_full(LOG_AUTH | (verdict != ALLOW ? LOG_WARNING : LOG_DEBUG),
"Recieve permission check for uid=" UID_FMT " gid=" GID_FMT" message=%s name=%s interface=%s path=%s member=%s: %s",
"Receive permission check for uid=" UID_FMT " gid=" GID_FMT" message=%s name=%s interface=%s path=%s member=%s: %s",
uid, gid, bus_message_type_to_string(message_type), strna(name), strna(path), strna(interface), strna(member), strna(verdict_to_string(verdict)));
return verdict == ALLOW;

View File

@ -205,7 +205,7 @@ int machine_id_commit(const char *root) {
r = path_is_mount_point(etc_machine_id, false);
if (r < 0)
return log_error_errno(r, "Failed to determine wether %s is a mount point: %m", etc_machine_id);
return log_error_errno(r, "Failed to determine whether %s is a mount point: %m", etc_machine_id);
if (r == 0) {
log_debug("%s is is not a mount point. Nothing to do.", etc_machine_id);
return 0;

View File

@ -1112,7 +1112,7 @@ static void test_usr(void) {
static int initialize_join_controllers(void) {
/* By default, mount "cpu" + "cpuacct" together, and "net_cls"
* + "net_prio". We'd like to add "cpuset" to the mix, but
* "cpuset" does't really work for groups with no initialized
* "cpuset" doesn't really work for groups with no initialized
* attributes. */
arg_join_controllers = new(char**, 3);

View File

@ -144,7 +144,7 @@ static int switch_root_initramfs(void) {
if (mount(NULL, "/run/initramfs", NULL, MS_PRIVATE, NULL) < 0)
return log_error_errno(errno, "Failed to make /run/initramfs private mount: %m");
/* switch_root with MS_BIND, because there might still be processes lurking around, which have open file desriptors.
/* switch_root with MS_BIND, because there might still be processes lurking around, which have open file descriptors.
* /run/initramfs/shutdown will take care of these.
* Also do not detach the old root, because /run/initramfs/shutdown needs to access it.
*/

View File

@ -609,7 +609,7 @@ static int reserve_dependencies(Unit *u, Unit *other, UnitDependency d) {
/*
* If u does not have this dependency set allocated, there is no need
* to reserve anything. In that case other's set will be transfered
* to reserve anything. In that case other's set will be transferred
* as a whole to u by complete_move().
*/
if (!u->dependencies[d])

View File

@ -1691,7 +1691,7 @@ static int flush_to_var(void) {
break;
if (errno != ENOENT)
return log_error_errno(errno, "Failed to check for existance of /run/systemd/journal/flushed: %m");
return log_error_errno(errno, "Failed to check for existence of /run/systemd/journal/flushed: %m");
r = fd_wait_for_event(watch_fd, POLLIN, USEC_INFINITY);
if (r < 0)

View File

@ -206,7 +206,7 @@ static int map_generic_field(const char *prefix, const char **p, struct iovec **
return r;
}
/* Kernel fields are those occuring in the audit string before
/* Kernel fields are those occurring in the audit string before
* msg='. All of these fields are trusted, hence carry the "_" prefix.
* We try to translate the fields we know into our native names. The
* other's are generically mapped to _AUDIT_FIELD_XYZ= */
@ -240,7 +240,7 @@ static const MapField map_fields_kernel[] = {
{}
};
/* Userspace fields are thos occuring in the audit string after
/* Userspace fields are those occurring in the audit string after
* msg='. All of these fields are untrusted, hence carry no "_"
* prefix. We map the fields we don't know to AUDIT_FIELD_XYZ= */
static const MapField map_fields_userspace[] = {

View File

@ -500,7 +500,7 @@ static int client_message_init(sd_dhcp_client *client, DHCPPacket **ret,
Note (from ConnMan): Some DHCP servers will send bigger DHCP packets
than the defined default size unless the Maximum Messge Size option
is explicitely set
is explicitly set
RFC3442 "Requirements to Avoid Sizing Constraints":
Because a full routing table can be quite large, the standard 576

View File

@ -139,8 +139,8 @@ static int test_pppoe_server(sd_event *e) {
"-I", "pppoe-server",
"-C", "Test-AC",
"-S", "Service-Default",
"-S", "Service-First-Auxillary",
"-S", "Service-Second-Auxillary",
"-S", "Service-First-Auxiliary",
"-S", "Service-Second-Auxiliary",
NULL);
assert_not_reached("failed to execute pppoe-server. not installed?");
}

View File

@ -2060,7 +2060,7 @@ static void grdrm_card_configure(grdrm_card *card) {
* headache to configure on dynamic demands. Therefore, we only
* support it if configured statically beforehand.
*
* * CRTCs are not created equal. Some might be much more poweful
* * CRTCs are not created equal. Some might be much more powerful
* than others, including more advanced plane support. So far, our
* CRTC selection is random. You need to supply static
* configuration if you want special setups. So far, there is no

View File

@ -708,7 +708,7 @@ void grdev_pipe_ready(grdev_pipe *pipe, bool running) {
/* grdev_pipe_ready() is used by backends to notify about pipe state
* changed. If a pipe is ready, it can be fully used by us (available,
* enabled and accessable). Backends can disable pipes at any time
* enabled and accessible). Backends can disable pipes at any time
* (like for async revocation), but can only enable them from parent
* context. Otherwise, we might call user-callbacks recursively. */

View File

@ -94,7 +94,7 @@ typedef struct unifont_glyph_header unifont_glyph_header;
* +-----------------------------------+
*
* * The first byte specifies the width of the glyph. If it is 0, the glyph
* must be treated as non-existant.
* must be treated as non-existent.
* All glyphs are "8*n" pixels wide and "16" pixels high. The width-field
* specifies the width multiplier "n".
* * After the width field padding might be added. This depends on the global

View File

@ -43,7 +43,7 @@ static int message_new_empty(sd_rtnl *rtnl, sd_rtnl_message **ret) {
assert_return(ret, -EINVAL);
/* Note that 'rtnl' is curretly unused, if we start using it internally
/* Note that 'rtnl' is currently unused, if we start using it internally
we must take care to avoid problems due to mutual references between
busses and their queued messages. See sd-bus.
*/

View File

@ -934,7 +934,7 @@ int dns_packet_read_name(DnsPacket *p, char **_ret,
if (after_rindex == 0)
after_rindex = p->rindex;
/* Jumps are limited to a "prior occurence" (RFC-1035 4.1.4) */
/* Jumps are limited to a "prior occurrence" (RFC-1035 4.1.4) */
jump_barrier = ptr;
p->rindex = ptr;
} else {

View File

@ -1066,7 +1066,7 @@ static int hashmap_base_put_boldly(HashmapBase *h, unsigned idx,
/*
* Returns 0 if resize is not needed.
* 1 if succesfully resized.
* 1 if successfully resized.
* -ENOMEM on allocation failure.
*/
static int resize_buckets(HashmapBase *h, unsigned entries_add) {

View File

@ -60,7 +60,7 @@ int sd_id128_get_boot(sd_id128_t *ret);
/* Note that SD_ID128_FORMAT_VAL will evaluate the passed argument 16
* times. It is hence not a good idea to call this macro with an
* expensive function as paramater or an expression with side
* expensive function as parameter or an expression with side
* effects */
#define SD_ID128_FORMAT_STR "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x"

View File

@ -81,7 +81,7 @@ static void check_stop_unlink(Manager *m, Unit *unit, const char *test_path, con
service = SERVICE(service_unit);
ts = now(CLOCK_MONOTONIC);
/* We proces events until the service related to the path has been successfully started */
/* We process events until the service related to the path has been successfully started */
while(service->result != SERVICE_SUCCESS || service->state != SERVICE_START) {
usec_t n;
int r;