mirror of
https://github.com/systemd/systemd.git
synced 2025-03-24 14:50:17 +03:00
tree-wide: code spelling fixes
As reported by Fossies.
This commit is contained in:
parent
ff707dd1b1
commit
94d82b5980
6
TODO
6
TODO
@ -134,7 +134,7 @@ Features:
|
||||
allow the host to read it, while making everything read-only.
|
||||
|
||||
* fix our various hwdb lookup keys to end with ":" again. The original idea was
|
||||
that hwdb patters can match arbitrary fields with expressions like
|
||||
that hwdb patterns can match arbitrary fields with expressions like
|
||||
"*:foobar:*", to wildcard match both the start and the end of the string.
|
||||
This only works safely for later extensions of the string if the strings
|
||||
always end in a colon. This requires updating our udev rules, as well as
|
||||
@ -142,7 +142,7 @@ Features:
|
||||
|
||||
* mount /tmp/ and /var/tmp with a uidmap applied that blocks out "nobody" user
|
||||
among other things such as dynamic uid ranges for containers and so on. That
|
||||
way noone can create files there with these uids and we enforce they are only
|
||||
way no one can create files there with these uids and we enforce they are only
|
||||
used transiently, never persistently.
|
||||
|
||||
* rework loopback support in fstab: when "loop" option is used, then
|
||||
@ -188,7 +188,7 @@ Features:
|
||||
|
||||
* journald: also collect CLOCK_BOOTTIME timestamps per log entry. Then, derive
|
||||
"corrected" CLOCK_REALTIME information on display from that and the timestamp
|
||||
info of the newest entry of the specificy boot (as identified by the boot
|
||||
info of the newest entry of the specific boot (as identified by the boot
|
||||
ID). This way, if a system comes up without a valid clock but acquires a
|
||||
better clock later, we can "fix" older entry timestamps on display, by
|
||||
calculating backwards. We cannot use CLOCK_MONOTONIC for this, since it does
|
||||
|
@ -70,7 +70,7 @@ management and sandboxing.
|
||||
|
||||
The `systemd-coredump` handler will extract a backtrace and [ELF packaging
|
||||
metadata](https://systemd.io/ELF_PACKAGE_METADATA) from any coredumps it
|
||||
receieves and log both. The information about coredumps stored in the journal
|
||||
receives and log both. The information about coredumps stored in the journal
|
||||
can be enumerated and queried with the
|
||||
[`coredumpctl`](https://www.freedesktop.org/software/systemd/man/coredumpctl.html)
|
||||
tool, for example for directly invoking a debugger such as `gdb` on a collected
|
||||
|
@ -29,7 +29,7 @@ userspace process can detect mounting memory pressure early and release memory
|
||||
back to the kernel as it happens, relieving the memory pressure before it
|
||||
becomes too critical.
|
||||
|
||||
The effects of memory pressure during runtime generaly are growing latencies
|
||||
The effects of memory pressure during runtime generally are growing latencies
|
||||
during operation: when a program requires memory but the system is busy writing
|
||||
out memory to (relatively slow) disks in order make some available, this
|
||||
generally surfaces in scheduling latencies, and applications and services will
|
||||
@ -146,8 +146,8 @@ is specifically useful for services that consist of multiple processes, and
|
||||
where each of them shall be able to release resources on memory pressure.
|
||||
|
||||
The `POLLPRI`/`POLLIN` conditions will be triggered every time memory pressure
|
||||
is detected, but not continously. It is thus safe to keep `poll()`-ing on the
|
||||
same file descriptor continously, and executing resource release operations
|
||||
is detected, but not continuously. It is thus safe to keep `poll()`-ing on the
|
||||
same file descriptor continuously, and executing resource release operations
|
||||
whenever the file descriptor triggers without having to expect overloading the
|
||||
process.
|
||||
|
||||
|
@ -538,7 +538,7 @@ Jan 12 10:46:45 example.com bluetoothd[8900]: gatt-time-server: Input/output err
|
||||
<varname>StateDirectory=</varname>, <varname>CacheDirectory=</varname>,
|
||||
<varname>LogsDirectory=</varname> and <varname>RuntimeDirectory=</varname>, see
|
||||
<citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>
|
||||
for details. It may also be used to clear the file decriptor store as enabled via
|
||||
for details. It may also be used to clear the file descriptor store as enabled via
|
||||
<varname>FileDescriptorStoreMax=</varname>, see
|
||||
<citerefentry><refentrytitle>systemd.service</refentrytitle><manvolnum>5</manvolnum></citerefentry>
|
||||
for details. For timer units this may be used to clear out the persistent timestamp data if
|
||||
|
@ -187,7 +187,7 @@
|
||||
<row>
|
||||
<entry>15</entry>
|
||||
<entry>system-identity</entry>
|
||||
<entry><citerefentry><refentrytitle>systemd-cryptsetup</refentrytitle><manvolnum>8</manvolnum></citerefentry> optionally measures the volume key of activated LUKS volumes into this PCR. <citerefentry><refentrytitle>systemd-pcrmachine.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures the <citerefentry><refentrytitle>machine-id</refentrytitle><manvolnum>5</manvolnum></citerefentry> into this PCR. <citerefentry><refentrytitle>systemd-pcrfs@.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures mount points, file system UUIDs, labels, partion UUIDs of the root and <filename>/var/</filename> filesystems into this PCR.</entry>
|
||||
<entry><citerefentry><refentrytitle>systemd-cryptsetup</refentrytitle><manvolnum>8</manvolnum></citerefentry> optionally measures the volume key of activated LUKS volumes into this PCR. <citerefentry><refentrytitle>systemd-pcrmachine.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures the <citerefentry><refentrytitle>machine-id</refentrytitle><manvolnum>5</manvolnum></citerefentry> into this PCR. <citerefentry><refentrytitle>systemd-pcrfs@.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> measures mount points, file system UUIDs, labels, partition UUIDs of the root and <filename>/var/</filename> filesystems into this PCR.</entry>
|
||||
</row>
|
||||
|
||||
<row>
|
||||
|
@ -38,7 +38,7 @@
|
||||
<option>usr-verity</option>, <option>usr-verity-sig</option>, <option>tmp</option>,
|
||||
<option>var</option>. These identifiers match the relevant partition types in the Discoverable Partitions
|
||||
Specification, but are agnostic to CPU architectures. If the partition identifier is left empty it
|
||||
defines the <emphasis>default</emphasis> policy for partitions defined in the Discoverable Parition
|
||||
defines the <emphasis>default</emphasis> policy for partitions defined in the Discoverable Partitions
|
||||
Specification for which no policy flags are explicitly listed in the policy string.</para>
|
||||
|
||||
<para>The following partition policy flags are defined that dictate the existence/absence, the use, and
|
||||
|
@ -1143,7 +1143,7 @@ Name=dmz0</programlisting>
|
||||
<example>
|
||||
<title>(Re-)applying a .link file to an interface</title>
|
||||
|
||||
<para>After a new .link file has been created, or an exisiting .link file modified, the new settings
|
||||
<para>After a new .link file has been created, or an existing .link file modified, the new settings
|
||||
may be applied to the matching interface with the following commands:</para>
|
||||
|
||||
<programlisting>$ sudo udevadm control --reload
|
||||
|
@ -829,7 +829,7 @@
|
||||
<varlistentry>
|
||||
<term><varname>InheritInnerProtocol=</varname></term>
|
||||
<listitem>
|
||||
<para>Takes a boolean. When true, inner Layer 3 protcol is set as Protocol Type in the GENEVE
|
||||
<para>Takes a boolean. When true, inner Layer 3 protocol is set as Protocol Type in the GENEVE
|
||||
header instead of Ethernet. Defaults to false.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
@ -112,7 +112,7 @@ CPUWeight=20 DisableControllers=cpu / \
|
||||
configuration for <filename>system.slice</filename> and <filename>user.slice</filename>, CPU
|
||||
resources will be split equally between them. Similarly, resources are allocated equally between
|
||||
children of <filename>user.slice</filename> and between the child slices beneath
|
||||
<filename>user@1000.service</filename>. Assuming that there is no futher configuration of resources
|
||||
<filename>user@1000.service</filename>. Assuming that there is no further configuration of resources
|
||||
or delegation below slices <filename>app.slice</filename> or <filename>session.slice</filename>, the
|
||||
<option>cpu</option> controller would not be enabled for units in those slices and CPU resources
|
||||
would be further allocated using other mechanisms, e.g. based on nice levels. The manager for user
|
||||
|
@ -38,7 +38,7 @@ KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{wwid}=="?*", ENV{ID_WWN
|
||||
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{model}=="?*", ENV{ID_MODEL}="$attr{model}"
|
||||
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{firmware_rev}=="?*", ENV{ID_REVISION}="$attr{firmware_rev}"
|
||||
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{nsid}=="?*", ENV{ID_NSID}="$attr{nsid}"
|
||||
# obsolete symlink with non-escaped characters, kept for backward compatiblity
|
||||
# obsolete symlink with non-escaped characters, kept for backward compatibility
|
||||
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ENV{ID_MODEL}=="?*", ENV{ID_SERIAL_SHORT}=="?*", \
|
||||
ENV{ID_MODEL}!="*/*", ENV{ID_SERIAL_SHORT}!="*/*", \
|
||||
ENV{ID_SERIAL}="$env{ID_MODEL}_$env{ID_SERIAL_SHORT}", SYMLINK+="disk/by-id/nvme-$env{ID_SERIAL}"
|
||||
@ -52,7 +52,7 @@ KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{serial}=="?
|
||||
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{model}=="?*", ENV{ID_MODEL}="$attr{model}"
|
||||
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{firmware_rev}=="?*", ENV{ID_REVISION}="$attr{firmware_rev}"
|
||||
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ATTRS{nsid}=="?*", ENV{ID_NSID}="$attr{nsid}"
|
||||
# obsolete symlink with non-escaped characters, kept for backward compatiblity
|
||||
# obsolete symlink with non-escaped characters, kept for backward compatibility
|
||||
KERNEL=="nvme*[0-9]n*[0-9]p*[0-9]", ENV{DEVTYPE}=="partition", ENV{ID_MODEL}=="?*", ENV{ID_SERIAL_SHORT}=="?*", \
|
||||
ENV{ID_MODEL}!="*/*", ENV{ID_SERIAL_SHORT}!="*/*", \
|
||||
ENV{ID_SERIAL}="$env{ID_MODEL}_$env{ID_SERIAL_SHORT}", SYMLINK+="disk/by-id/nvme-$env{ID_SERIAL}-part%n"
|
||||
|
@ -431,7 +431,7 @@ assert_cc(sizeof(dummy_t) == 0);
|
||||
})
|
||||
|
||||
/* Iterate through each variadic arg. All must be the same type as 'entry' or must be implicitly
|
||||
* convertable. The iteration variable 'entry' must already be defined. */
|
||||
* convertible. The iteration variable 'entry' must already be defined. */
|
||||
#define VA_ARGS_FOREACH(entry, ...) \
|
||||
_VA_ARGS_FOREACH(entry, UNIQ_T(_entries_, UNIQ), UNIQ_T(_current_, UNIQ), ##__VA_ARGS__)
|
||||
#define _VA_ARGS_FOREACH(entry, _entries_, _current_, ...) \
|
||||
|
@ -95,7 +95,7 @@ int name_to_handle_at_loop(
|
||||
/* The buffer was too small. Size the new buffer by what name_to_handle_at() returned. */
|
||||
n = h->handle_bytes;
|
||||
|
||||
/* paranoia: check for overlow (note that .handle_bytes is unsigned only) */
|
||||
/* paranoia: check for overflow (note that .handle_bytes is unsigned only) */
|
||||
if (n > UINT_MAX - offsetof(struct file_handle, f_handle))
|
||||
return -EOVERFLOW;
|
||||
}
|
||||
@ -722,7 +722,7 @@ int mount_option_supported(const char *fstype, const char *key, const char *valu
|
||||
_cleanup_close_ int fd = -EBADF;
|
||||
int r;
|
||||
|
||||
/* Checks if the specified file system supports a mount option. Returns > 0 if it suppors it, == 0 if
|
||||
/* Checks if the specified file system supports a mount option. Returns > 0 if it supports it, == 0 if
|
||||
* it does not. Return -EAGAIN if we can't determine it. And any other error otherwise. */
|
||||
|
||||
assert(fstype);
|
||||
|
@ -1089,7 +1089,7 @@ static const char *pick_color_for_uid_gid(uid_t uid) {
|
||||
if (uid_is_system(uid))
|
||||
return ansi_normal(); /* files in disk images are typically owned by root and other system users, no issue there */
|
||||
if (uid_is_dynamic(uid))
|
||||
return ansi_highlight_red(); /* files should never be owned persistently by dynamic users, and there are just no execuses */
|
||||
return ansi_highlight_red(); /* files should never be owned persistently by dynamic users, and there are just no excuses */
|
||||
if (uid_is_container(uid))
|
||||
return ansi_highlight_cyan();
|
||||
|
||||
|
@ -705,7 +705,7 @@ const ImagePolicy image_policy_sysext_strict = {
|
||||
};
|
||||
|
||||
const ImagePolicy image_policy_confext = {
|
||||
/* For configuraiton extensions, honour root file system, and ignore everything else. After all, we
|
||||
/* For configuration extensions, honour root file system, and ignore everything else. After all, we
|
||||
* are only interested in the /etc/ tree anyway, and that's really the only place it can be. */
|
||||
.n_policies = 1,
|
||||
.policies = {
|
||||
|
@ -146,7 +146,7 @@ struct Varlink {
|
||||
/* Further messages to output not yet formatted into text, and thus not included in output_buffer
|
||||
* yet. We keep them separate from output_buffer, to not violate fd message boundaries: we want that
|
||||
* each fd that is sent is associated with its fds, and that fds cannot be accidentally associated
|
||||
* with preceeding or following messages. */
|
||||
* with preceding or following messages. */
|
||||
LIST_HEAD(VarlinkJsonQueueItem, output_queue);
|
||||
VarlinkJsonQueueItem *output_queue_tail;
|
||||
|
||||
@ -1502,7 +1502,7 @@ static int varlink_enqueue_json(Varlink *v, JsonVariant *m) {
|
||||
assert(v);
|
||||
assert(m);
|
||||
|
||||
/* If ther are no file descriptors to be queued and no queue entries yet we can shortcut things and
|
||||
/* If there are no file descriptors to be queued and no queue entries yet we can shortcut things and
|
||||
* append this entry directly to the output buffer */
|
||||
if (v->n_pushed_fds == 0 && !v->output_queue)
|
||||
return varlink_format_json(v, m);
|
||||
@ -2351,7 +2351,7 @@ int varlink_reset_fds(Varlink *v) {
|
||||
int varlink_peek_fd(Varlink *v, size_t i) {
|
||||
assert_return(v, -EINVAL);
|
||||
|
||||
/* Returns one of the file descriptors that were received along witht the current message. This does
|
||||
/* Returns one of the file descriptors that were received along with the current message. This does
|
||||
* not duplicate the fd nor invalidate it, it hence remains in our possession. */
|
||||
|
||||
if (!v->allow_fd_passing_input)
|
||||
|
@ -1526,7 +1526,7 @@ check_coverage_reports() {
|
||||
#
|
||||
# Also, a note: some tests, like TEST-46, overmount /home with tmpfs, which
|
||||
# means if your build dir is under /home/your-user (which is usually the
|
||||
# case) you might get bogus erorrs and missing coverage.
|
||||
# case) you might get bogus errors and missing coverage.
|
||||
if ! get_bool "${IGNORE_MISSING_COVERAGE:=}" && \
|
||||
"${JOURNALCTL:?}" -q --no-pager -D "${root:?}/var/log/journal" --grep "profiling:.+?gcda:[Cc]annot open"; then
|
||||
derror "Detected possibly missing coverage, check the journal"
|
||||
|
@ -651,7 +651,7 @@ EOF
|
||||
: >/failed
|
||||
|
||||
# Make sure the content of kbd-model-map is the one that the tests expect
|
||||
# regardless of the version intalled on the distro where the testsuite is
|
||||
# regardless of the version installed on the distro where the testsuite is
|
||||
# running on.
|
||||
export SYSTEMD_KBD_MODEL_MAP=/usr/lib/systemd/tests/testdata/test-keymap-util/kbd-model-map
|
||||
|
||||
|
@ -30,7 +30,7 @@ run_and_list "$GENERATOR_BIN" "$OUT_DIR"
|
||||
link_endswith "$OUT_DIR/early/default.target" "/lib/systemd/system/system-update.target"
|
||||
|
||||
: "system-update-generator: kernel cmdline warnings"
|
||||
# We should warn if the default target is overriden on the kernel cmdline
|
||||
# We should warn if the default target is overridden on the kernel cmdline
|
||||
# by a runlevel or systemd.unit=, but still generate the symlink
|
||||
SYSTEMD_PROC_CMDLINE="systemd.unit=foo.bar 3" run_and_list "$GENERATOR_BIN" "$OUT_DIR" |& tee /tmp/system-update-generator.log
|
||||
link_endswith "$OUT_DIR/early/default.target" "/lib/systemd/system/system-update.target"
|
||||
|
Loading…
x
Reference in New Issue
Block a user