Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Dec 2017 01:31:28 +0000 (UTC)
From:      Eitan Adler <eadler@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r327259 - in head: lib/libc/sys lib/libopenbsd sbin/ipfw usr.sbin/ntp/doc
Message-ID:  <201712280131.vBS1VSpP020446@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: eadler
Date: Thu Dec 28 01:31:28 2017
New Revision: 327259
URL: https://svnweb.freebsd.org/changeset/base/327259

Log:
  Fix a few more speelling errors
  
  Reviewed by:		bjk
  Reviewed by:		jilles (incl formal "accept")
  Differential Revision:	https://reviews.freebsd.org/D13650

Modified:
  head/lib/libc/sys/kqueue.2
  head/lib/libc/sys/sendfile.2
  head/lib/libopenbsd/imsg_init.3
  head/sbin/ipfw/ipfw.8
  head/usr.sbin/ntp/doc/ntp.conf.5

Modified: head/lib/libc/sys/kqueue.2
==============================================================================
--- head/lib/libc/sys/kqueue.2	Thu Dec 28 01:21:30 2017	(r327258)
+++ head/lib/libc/sys/kqueue.2	Thu Dec 28 01:31:28 2017	(r327259)
@@ -190,7 +190,7 @@ The
 .Fa ext[2]
 and
 .Fa ext[3]
-members are always passed throught the kernel as-is,
+members are always passed through the kernel as-is,
 making additional context available to application.
 .El
 .Pp

Modified: head/lib/libc/sys/sendfile.2
==============================================================================
--- head/lib/libc/sys/sendfile.2	Thu Dec 28 01:21:30 2017	(r327258)
+++ head/lib/libc/sys/sendfile.2	Thu Dec 28 01:31:28 2017	(r327259)
@@ -190,7 +190,7 @@ may read ahead when reading the file.
 A macro
 .Fn SF_FLAGS
 is provided to combine readahead amount and flags.
-Example shows specifing readahead of 16 pages and
+An example showing specifying readahead of 16 pages and
 .Dv SF_NOCACHE
 flag:
 .Pp

Modified: head/lib/libopenbsd/imsg_init.3
==============================================================================
--- head/lib/libopenbsd/imsg_init.3	Thu Dec 28 01:21:30 2017	(r327258)
+++ head/lib/libopenbsd/imsg_init.3	Thu Dec 28 01:31:28 2017	(r327259)
@@ -347,7 +347,7 @@ On success
 returns a pointer to the buffer; on failure it returns NULL.
 .Pp
 .Fn ibuf_dynamic
-allocates a resizeable buffer of initial length
+allocates a resizable buffer of initial length
 .Fa len
 and maximum size
 .Fa max .

Modified: head/sbin/ipfw/ipfw.8
==============================================================================
--- head/sbin/ipfw/ipfw.8	Thu Dec 28 01:21:30 2017	(r327258)
+++ head/sbin/ipfw/ipfw.8	Thu Dec 28 01:31:28 2017	(r327259)
@@ -3020,7 +3020,7 @@ supports in-kernel IPv6/IPv4 network address and proto
 Stateful NAT64 translation allows IPv6-only clients to contact IPv4 servers
 using unicast TCP, UDP or ICMP protocols.
 One or more IPv4 addresses assigned to a stateful NAT64 translator are shared
-among serveral IPv6-only clients.
+among several IPv6-only clients.
 When stateful NAT64 is used in conjunction with DNS64, no changes are usually
 required in the IPv6 client or the IPv4 server.
 The kernel module

Modified: head/usr.sbin/ntp/doc/ntp.conf.5
==============================================================================
--- head/usr.sbin/ntp/doc/ntp.conf.5	Thu Dec 28 01:21:30 2017	(r327258)
+++ head/usr.sbin/ntp/doc/ntp.conf.5	Thu Dec 28 01:31:28 2017	(r327259)
@@ -2550,7 +2550,7 @@ While this is generally a feature
 as it allows for quick recovery if a server key has changed,
 a properly forged and appropriately delivered crypto\-NAK packet
 can be used in a DoS attack.
-If you have active noticable problems with this type of DoS attack
+If you have active noticeable problems with this type of DoS attack
 then you should consider
 disabling this option.
 You can check your
@@ -2598,7 +2598,7 @@ While this is generally a feature
 as it allows for quick recovery if a server key has changed,
 a properly forged and appropriately delivered crypto\-NAK packet
 can be used in a DoS attack.
-If you have active noticable problems with this type of DoS attack
+If you have active noticeable problems with this type of DoS attack
 then you should consider
 disabling this option.
 You can check your
@@ -2618,7 +2618,7 @@ While this is generally a feature
 as it allows for quick recovery,
 if this type of packet is carefully forged and sent
 during an appropriate window it can be used for a DoS attack.
-If you have active noticable problems with this type of DoS attack
+If you have active noticeable problems with this type of DoS attack
 then you should consider
 disabling this option.
 You can check your



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201712280131.vBS1VSpP020446>