]> err.no Git - systemd/commitdiff
man: Documentation spelling fixes
authorVille Skyttä <ville.skytta@iki.fi>
Sat, 18 Jun 2011 13:40:20 +0000 (16:40 +0300)
committerLennart Poettering <lennart@poettering.net>
Mon, 20 Jun 2011 15:57:22 +0000 (17:57 +0200)
man/daemon.xml
man/pam_systemd.xml
man/systemctl.xml
man/systemd-ask-password.xml
man/systemd-nspawn.xml
man/systemd.exec.xml
man/systemd.socket.xml
man/systemd.swap.xml
man/systemd.unit.xml

index f39d6cf64a945fbcbffe765fda2706bf6459c417..d5a8491850aa21c53ef4e705a36d0883e9dde764 100644 (file)
@@ -795,7 +795,7 @@ AM_CONDITIONAL(HAVE_SYSTEMD, [test -n "$with_systemdsystemunitdir" -a "x$with_sy
                         machines, and optionally allows their
                         installation even on machines lacking
                         systemd. (Modification of this snippet for the
-                        user unit directory is left as an excercise for the
+                        user unit directory is left as an exercise for the
                         reader.)</para>
 
                         <para>Additionally, to ensure that
index 208c7da1c4f1948081a2c1296d8333e2ca5c46e0..7d5fcad631527602ccf35dae2772a4dd04bdbf82 100644 (file)
                                 cgroup will be created by default for
                                 each user logging in, in addition to
                                 the cgroup in the named 'name=systemd'
-                                hierarchy. If ommited, defaults to an
+                                hierarchy. If omitted, defaults to an
                                 empty list. This may be used to move
                                 user sessions into their own groups in
                                 the 'cpu' hierarchy which ensures that
                                 separated list of cgroup controllers
                                 in which hierarchies the logged in
                                 processes will be reset to the root
-                                cgroup. If ommited, defaults to 'cpu',
+                                cgroup. If omitted, defaults to 'cpu',
                                 meaning that a 'cpu' cgroup grouping
                                 inherited from the login manager will
                                 be reset for the processes of the
index e9e3371ba8d00e6c1613aa28be77369f54b2b953..a9e86ce17cfaae96c446c6f7ff4bcb75e3c6a812 100644 (file)
                                 <term><option>--host</option></term>
 
                                 <listitem><para>Execute operation
-                                remotely. Specifiy a hostname, or
-                                username and hostname seperated by @,
+                                remotely. Specify a hostname, or
+                                username and hostname separated by @,
                                 to connect to. This will use SSH to
                                 talk to the remote systemd
                                 instance.</para></listitem>
index 6d142230d0afdbf51d8f203f1af61335f5e95337..c607b1a367b48351d72d628f56acb266b75d701f 100644 (file)
                                 <term><option>--icon=</option></term>
 
                                 <listitem><para>Specify an icon name
-                                alongside the pasword query, which may
+                                alongside the password query, which may
                                 be used in all agents supporting
                                 graphical display. The icon name
                                 should follow the <ulink
index 667e75c2cd70dd131c0572ce0bef4bdd517276ca..e1b33f72c50ae58dba6e540ef4f50ed5e774ddc0 100644 (file)
@@ -61,7 +61,7 @@
                 container. In many ways it is similar to
                 <citerefentry><refentrytitle>chroot</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
                 but more powerful since it fully virtualizes the file
-                system hierachy, as well as the process tree, the
+                system hierarchy, as well as the process tree, the
                 various IPC subsystems and the host and domain
                 name.</para>
 
                 <para>Note that running two
                 <command>systemd-nspawn</command> containers from the
                 same directory tree will not make processes in them
-                see each other. The PID namespace seperation of the
+                see each other. The PID namespace separation of the
                 two containers is complete and the containers will
                 share very few runtime objects except for the
                 underlying file system.</para>
index 7b4f7e39c3c2e5427d9d75ccd8aa353b82f81c53..9f71492bc15b0db81fdfdfbd40d91f06baaec9b5 100644 (file)
                                 executed process. See
                                 <citerefentry><refentrytitle>capabilities</refentrytitle><manvolnum>7</manvolnum></citerefentry>
                                 for details. Takes a whitespace
-                                seperated list of capability names as
+                                separated list of capability names as
                                 read by
                                 <citerefentry><refentrytitle>cap_from_name</refentrytitle><manvolnum>3</manvolnum></citerefentry>.
                                 Capabilities listed will be included
                                 path for this unit is implied. This
                                 option may be used to place executed
                                 processes in arbitrary groups in
-                                arbitrary hierachies -- which can be
+                                arbitrary hierarchies -- which can be
                                 configured externally with additional execution limits. By default
                                 systemd will place all executed
                                 processes in separate per-unit control
                                 usual file access controls would
                                 permit this. Directories listed in
                                 <varname>InaccessibleDirectories=</varname>
-                                will be made inaccesible for processes
+                                will be made inaccessible for processes
                                 inside the namespace. Note that
                                 restricting access with these options
                                 does not extend to submounts of a
index 6d81f913cbc82054d319c798eb7655e7a8dbb15b..28c8dc456625b784a4582b534ce5f4a8ef1605b8 100644 (file)
                                 <term><varname>Broadcast=</varname></term>
                                 <listitem><para>Takes a boolean
                                 value. This controls the SO_BROADCAST
-                                option, which allows boradcast
+                                option, which allows broadcast
                                 datagrams to be sent from this
                                 socket. Defaults to
                                 <option>false</option>.</para></listitem>
index 954e94412f4a21dd4792f5f8ce99fc6bc0dec987..ab00f9f3186251f3808bcca38865e4238a32c7e6 100644 (file)
@@ -78,7 +78,7 @@
 
                 <para>All swap units automatically get the appropriate
                 dependencies on the devices (resp. on the mount points
-                of the files) they are actived from.</para>
+                of the files) they are activated from.</para>
 
                 <para>Swap units with
                 <varname>DefaultDependencies=</varname> enabled
index 6ad6b4a0bee4803ad1614f72be9dcc64cb372ffa..39da614a821cae36c7440e3e52c5c88efb1cb37d 100644 (file)
                                 verify that the specified condition is
                                 true. With
                                 <varname>ConditionPathExists=</varname>
-                                a file existance condition can be
+                                a file existence condition can be
                                 checked before a unit is started. If
                                 the specified absolute path name does
                                 not exist startup of a unit will not