X Tutup
Skip to content

Commit 2dd6781

Browse files
committed
man: typo fixes
A mix of fixes for typos and UK english
1 parent 6612379 commit 2dd6781

13 files changed

+19
-19
lines changed

man/logind.conf.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@
261261
<listitem><para>Controls whether actions that <command>systemd-logind</command>
262262
takes when the power and sleep keys and the lid switch are triggered are subject
263263
to high-level inhibitor locks ("shutdown", "sleep", "idle"). Low level inhibitor
264-
locks ("handle-*-key"), are always honoured, irrespective of this setting.</para>
264+
locks ("handle-*-key"), are always honored, irrespective of this setting.</para>
265265

266266
<para>These settings take boolean arguments. If <literal>no</literal>, the
267267
inhibitor locks taken by applications are respected. If <literal>yes</literal>,

man/sd-event.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@
9797
iteration a single event source is dispatched. Each time an event
9898
source is dispatched the kernel is polled for new events, before
9999
the next event source is dispatched. The event loop is designed to
100-
honour priorities and provide fairness within each priority. It is
100+
honor priorities and provide fairness within each priority. It is
101101
not designed to provide optimal throughput, as this contradicts
102102
these goals due the limitations of the underlying <citerefentry
103103
project='man-pages'><refentrytitle>epoll</refentrytitle><manvolnum>7</manvolnum></citerefentry>

man/sd_event_source_set_priority.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@
115115
reliable. However, it is guaranteed that if events are seen on
116116
multiple same-priority event sources at the same time, each one is
117117
not dispatched again until all others have been dispatched
118-
once. This behaviour guarantees that within each priority
118+
once. This behavior guarantees that within each priority
119119
particular event sources do not starve or dominate the event
120120
loop.</para>
121121

man/systemctl.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -306,7 +306,7 @@
306306
<para><literal>ignore-requirements</literal> is similar to
307307
<literal>ignore-dependencies</literal>, but only causes the
308308
requirement dependencies to be ignored, the ordering
309-
dependencies will still be honoured.</para>
309+
dependencies will still be honored.</para>
310310
</listitem>
311311

312312
</varlistentry>
@@ -1006,7 +1006,7 @@ kobject-uevent 1 systemd-udevd-kernel.socket systemd-udevd.service
10061006
desired, combine this command with the <option>--now</option> switch, or invoke <command>start</command>
10071007
with appropriate arguments later. Note that in case of unit instance enablement (i.e. enablement of units of
10081008
the form <filename>foo@bar.service</filename>), symlinks named the same as instances are created in the
1009-
unit configuration diectory, however they point to the single template unit file they are instantiated
1009+
unit configuration directory, however they point to the single template unit file they are instantiated
10101010
from.</para>
10111011

10121012
<para>This command expects either valid unit names (in which case various unit file directories are

man/systemd-coredump.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@
107107
<citerefentry><refentrytitle>systemd-sysctl</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
108108
</para>
109109

110-
<para>The behaviour of <command>systemd-coredump</command> itself is configured through the configuration file
110+
<para>The behavior of <command>systemd-coredump</command> itself is configured through the configuration file
111111
<filename>/etc/systemd/coredump.conf</filename> and corresponding snippets
112112
<filename>/etc/systemd/coredump.conf.d/*.conf</filename>, see
113113
<citerefentry><refentrytitle>coredump.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>. A new

man/systemd-mount.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@
260260
<refsect1>
261261
<title>The udev Database</title>
262262

263-
<para>If <option>--discover</option> is used, <command>systemd-mount</command> honours a couple of additional udev
263+
<para>If <option>--discover</option> is used, <command>systemd-mount</command> honors a couple of additional udev
264264
properties of block devices:</para>
265265

266266
<variablelist class='udev-directives'>

man/systemd-nspawn.xml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -405,7 +405,7 @@
405405
purposes (usually in the range beyond the host's UID/GID 65536). The parameter may be specified as follows:</para>
406406

407407
<orderedlist>
408-
<listitem><para>If one or two colon-separated numers are specified, user namespacing is turned on. The first
408+
<listitem><para>If one or two colon-separated numbers are specified, user namespacing is turned on. The first
409409
parameter specifies the first host UID/GID to assign to the container, the second parameter specifies the
410410
number of host UIDs/GIDs to assign to the container. If the second parameter is omitted, 65536 UIDs/GIDs are
411411
assigned.</para></listitem>
@@ -425,13 +425,13 @@
425425
range is automatically chosen. As first step, the file owner of the root directory of the container's
426426
directory tree is read, and it is checked that it is currently not used by the system otherwise (in
427427
particular, that no other container is using it). If this check is successful, the UID/GID range determined
428-
this way is used, similar to the behaviour if "yes" is specified. If the check is not successful (and thus
428+
this way is used, similar to the behavior if "yes" is specified. If the check is not successful (and thus
429429
the UID/GID range indicated in the root directory's file owner is already used elsewhere) a new – currently
430430
unused – UID/GID range of 65536 UIDs/GIDs is randomly chosen between the host UID/GIDs of 524288 and
431431
1878982656, always starting at a multiple of 65536. This setting implies
432432
<option>--private-users-chown</option> (see below), which has the effect that the files and directories in
433433
the container's directory tree will be owned by the appropriate users of the range picked. Using this option
434-
makes user namespace behaviour fully automatic. Note that the first invocation of a previously unused
434+
makes user namespace behavior fully automatic. Note that the first invocation of a previously unused
435435
container image might result in picking a new UID/GID range for it, and thus in the (possibly expensive) file
436436
ownership adjustment operation. However, subsequent invocations of the container will be cheap (unless of
437437
course the picked UID/GID range is assigned to a different use by then).</para></listitem>
@@ -440,7 +440,7 @@
440440
<para>It is recommended to assign at least 65536 UIDs/GIDs to each container, so that the usable UID/GID range in the
441441
container covers 16 bit. For best security, do not assign overlapping UID/GID ranges to multiple containers. It is
442442
hence a good idea to use the upper 16 bit of the host 32-bit UIDs/GIDs as container identifier, while the lower 16
443-
bit encode the container UID/GID used. This is in fact the behaviour enforced by the
443+
bit encode the container UID/GID used. This is in fact the behavior enforced by the
444444
<option>--private-users=pick</option> option.</para>
445445

446446
<para>When user namespaces are used, the GID range assigned to each container is always chosen identical to the
@@ -722,7 +722,7 @@
722722
and the subdirectory is symlinked into the host at the same
723723
location. <literal>try-host</literal> and
724724
<literal>try-guest</literal> do the same but do not fail if
725-
the host does not have persistent journalling enabled. If
725+
the host does not have persistent journaling enabled. If
726726
<literal>auto</literal> (the default), and the right
727727
subdirectory of <filename>/var/log/journal</filename> exists,
728728
it will be bind mounted into the container. If the

man/systemd-run.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -402,7 +402,7 @@ There is a screen on:
402402
when the user first logs in, and stays around as long as at least one
403403
login session is open. After the user logs out of the last session,
404404
<filename>user@.service</filename> and all services underneath it
405-
are terminated. This behaviour is the default, when "lingering" is
405+
are terminated. This behavior is the default, when "lingering" is
406406
not enabled for that user. Enabling lingering means that
407407
<filename>user@.service</filename> is started automatically during
408408
boot, even if the user is not logged in, and that the service is

man/systemd-system.conf.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@
109109
<term><varname>CtrlAltDelBurstAction=</varname></term>
110110

111111
<listitem><para>Defines what action will be performed
112-
if user presses Ctr-Alt-Delete more than 7 times in 2s.
112+
if user presses Ctrl-Alt-Delete more than 7 times in 2s.
113113
Can be set to <literal>reboot-force</literal>, <literal>poweroff-force</literal>
114114
or disabled with <literal>ignore</literal>. Defaults to
115115
<literal>reboot-force</literal>.

man/systemd.exec.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -988,7 +988,7 @@
988988
the unit's own user and group to themselves and everything else to the <literal>nobody</literal> user and
989989
group. This is useful to securely detach the user and group databases used by the unit from the rest of the
990990
system, and thus to create an effective sandbox environment. All files, directories, processes, IPC objects and
991-
other resources owned by users/groups not equalling <literal>root</literal> or the unit's own will stay visible
991+
other resources owned by users/groups not equaling <literal>root</literal> or the unit's own will stay visible
992992
from within the unit but appear owned by the <literal>nobody</literal> user and group. If this mode is enabled,
993993
all unit processes are run without privileges in the host user namespace (regardless if the unit's own
994994
user/group is <literal>root</literal> or not). Specifically this means that the process will have zero process
@@ -1560,7 +1560,7 @@
15601560
<varlistentry>
15611561
<term><varname>$MAINPID</varname></term>
15621562

1563-
<listitem><para>The PID of the units main process if it is
1563+
<listitem><para>The PID of the unit's main process if it is
15641564
known. This is only set for control processes as invoked by
15651565
<varname>ExecReload=</varname> and similar. </para></listitem>
15661566
</varlistentry>

0 commit comments

Comments
 (0)
X Tutup