summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLuca Boccassi <bluca@debian.org>2024-05-14 15:38:37 +0200
committerLuca Boccassi <luca.boccassi@gmail.com>2024-05-14 18:33:27 +0200
commit93df5217b91774fb379e7b94eadd609bfe864b82 (patch)
tree433e438c053c5ce5500a2cbe71d0acc2602594f3
parentcgroup-util: allow cg_read_pid() to skip unmapped (zero) pids (diff)
downloadsystemd-93df5217b91774fb379e7b94eadd609bfe864b82.tar.xz
systemd-93df5217b91774fb379e7b94eadd609bfe864b82.zip
tree-wide: 'allows to' -> 'allows one to'
As flagged by Lintian
-rw-r--r--docs/ELF_PACKAGE_METADATA.md2
-rw-r--r--docs/MEMORY_PRESSURE.md2
-rw-r--r--man/systemd-cryptenroll.xml2
-rw-r--r--src/analyze/analyze-security.c2
-rw-r--r--src/boot/efi/secure-boot.c2
-rw-r--r--src/core/manager.c2
-rw-r--r--src/core/transaction.c2
-rw-r--r--src/core/unit.c4
-rw-r--r--src/vconsole/vconsole-setup.c10
9 files changed, 13 insertions, 15 deletions
diff --git a/docs/ELF_PACKAGE_METADATA.md b/docs/ELF_PACKAGE_METADATA.md
index 176f574e91..2b58cf1380 100644
--- a/docs/ELF_PACKAGE_METADATA.md
+++ b/docs/ELF_PACKAGE_METADATA.md
@@ -14,7 +14,7 @@ or parse ELF core files.*
ELF binaries get stamped with a unique, build-time generated hex string identifier called `build-id`,
[which gets embedded as an ELF note called `.note.gnu.build-id`](https://fedoraproject.org/wiki/Releases/FeatureBuildId).
-In most cases, this allows to associate a stripped binary with its debugging information.
+In most cases, this allows a stripped binary to be associated with its debugging information.
It is used, for example, to dynamically fetch DWARF symbols from a debuginfo server, or
to query the local package manager and find out the package metadata or, again, the DWARF
symbols or program sources.
diff --git a/docs/MEMORY_PRESSURE.md b/docs/MEMORY_PRESSURE.md
index 69c23eccb2..da1c9b2e4a 100644
--- a/docs/MEMORY_PRESSURE.md
+++ b/docs/MEMORY_PRESSURE.md
@@ -169,7 +169,7 @@ pressure handling:
setting controls whether to enable the memory pressure protocol for the
service in question.
-* The `MemoryPressureThresholdSec=` setting allows to configure the threshold
+* The `MemoryPressureThresholdSec=` setting allows configuring the threshold
when to signal memory pressure to the services. It takes a time value
(usually in the millisecond range) that defines a threshold per 1s time
window: if memory allocation latencies grow beyond this threshold
diff --git a/man/systemd-cryptenroll.xml b/man/systemd-cryptenroll.xml
index 8baab80dc7..a47866ba61 100644
--- a/man/systemd-cryptenroll.xml
+++ b/man/systemd-cryptenroll.xml
@@ -331,7 +331,7 @@
<term><option>--pkcs11-token-uri=<replaceable>URI</replaceable></option></term>
<listitem><para>Enroll a PKCS#11 security token or smartcard (e.g. a YubiKey). Expects a PKCS#11 URI
- that allows to find an X.509 certificate or a public key on the token. The URI must also be suitable
+ that allows finding an X.509 certificate or a public key on the token. The URI must also be suitable
to find a related private key after changing the type of object in it. Alternatively the special
value <literal>auto</literal> may be specified, in order to automatically determine the suitable URI
if a single security token containing a single key pair is plugged in. The special value
diff --git a/src/analyze/analyze-security.c b/src/analyze/analyze-security.c
index 668475d1f5..75508f4d39 100644
--- a/src/analyze/analyze-security.c
+++ b/src/analyze/analyze-security.c
@@ -2729,7 +2729,7 @@ static int offline_security_checks(
/* When a portable image is analyzed, the profile is what provides a good chunk of
* the security-related settings, but they are obviously not shipped with the image.
- * This allows to take them in consideration. */
+ * This allows them to be taken into consideration. */
if (profile) {
_cleanup_free_ char *unit_name = NULL, *dropin = NULL, *profile_path = NULL;
diff --git a/src/boot/efi/secure-boot.c b/src/boot/efi/secure-boot.c
index 1a7ae63774..2400324fc5 100644
--- a/src/boot/efi/secure-boot.c
+++ b/src/boot/efi/secure-boot.c
@@ -33,7 +33,7 @@ SecureBootMode secure_boot_mode(void) {
}
/*
- * Custom mode allows to change secure boot certificate databases db, dbx, KEK and PK without the variable
+ * Custom mode allows the secure boot certificate databases db, dbx, KEK, and PK to be changed without the variable
* updates being signed. When enrolling certificates to an unconfigured system (no PK present yet) writing
* db, dbx and KEK updates without signature works fine even in standard mode. Writing PK updates without
* signature requires custom mode in any case.
diff --git a/src/core/manager.c b/src/core/manager.c
index 4c9ef44a4a..43fbd0e1e4 100644
--- a/src/core/manager.c
+++ b/src/core/manager.c
@@ -2375,7 +2375,7 @@ int manager_load_unit_prepare(
Unit *unit = manager_get_unit(m, name);
if (unit) {
- /* The time-based cache allows to start new units without daemon-reload,
+ /* The time-based cache allows new units to be started without daemon-reload,
* but if they are already referenced (because of dependencies or ordering)
* then we have to force a load of the fragment. As an optimization, check
* first if anything in the usual paths was modified since the last time
diff --git a/src/core/transaction.c b/src/core/transaction.c
index d70a44b23c..ab6e699d33 100644
--- a/src/core/transaction.c
+++ b/src/core/transaction.c
@@ -964,7 +964,7 @@ int transaction_add_job_and_dependencies(
if (type != JOB_STOP) {
r = bus_unit_validate_load_state(unit, e);
- /* The time-based cache allows to start new units without daemon-reload, but if they are
+ /* The time-based cache allows new units to be started without daemon-reload, but if they are
* already referenced (because of dependencies or ordering) then we have to force a load of
* the fragment. As an optimization, check first if anything in the usual paths was modified
* since the last time the cache was loaded. Also check if the last time an attempt to load
diff --git a/src/core/unit.c b/src/core/unit.c
index 0b2460cada..324f82c3a4 100644
--- a/src/core/unit.c
+++ b/src/core/unit.c
@@ -3186,8 +3186,8 @@ int unit_add_dependency(
if (u->manager && FLAGS_SET(u->manager->test_run_flags, MANAGER_TEST_RUN_IGNORE_DEPENDENCIES))
return 0;
- /* Note that ordering a device unit after a unit is permitted since it allows to start its job
- * running timeout at a specific time. */
+ /* Note that ordering a device unit after a unit is permitted since it allows its job running
+ * timeout to be started at a specific time. */
if (FLAGS_SET(a, UNIT_ATOM_BEFORE) && other->type == UNIT_DEVICE) {
log_unit_warning(u, "Dependency Before=%s ignored (.device units cannot be delayed)", other->id);
return 0;
diff --git a/src/vconsole/vconsole-setup.c b/src/vconsole/vconsole-setup.c
index 2a73d01d7e..e0b1621461 100644
--- a/src/vconsole/vconsole-setup.c
+++ b/src/vconsole/vconsole-setup.c
@@ -390,13 +390,11 @@ static int font_load_and_wait(const char *vc, Context *c) {
}
/*
- * A newly allocated VT uses the font from the source VT. Here
- * we update all possibly already allocated VTs with the configured
- * font. It also allows to restart systemd-vconsole-setup.service,
- * to apply a new font to all VTs.
+ * A newly allocated VT uses the font from the source VT. Here we update all possibly already allocated VTs
+ * with the configured font. It also allows systemd-vconsole-setup.service to be restarted to apply a new
+ * font to all VTs.
*
- * We also setup per-console utf8 related stuff: kbdmode, term
- * processing, stty iutf8.
+ * We also setup per-console utf8 related stuff: kbdmode, term processing, stty iutf8.
*/
static void setup_remaining_vcs(int src_fd, unsigned src_idx, bool utf8) {
struct console_font_op cfo = {