Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 7 Jan 2012 16:10:32 +0000 (UTC)
From:      Ulrich Spoerlein <uqs@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r229783 - in head/etc: . namedb rc.d
Message-ID:  <201201071610.q07GAWZA046912@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: uqs
Date: Sat Jan  7 16:10:32 2012
New Revision: 229783
URL: http://svn.freebsd.org/changeset/base/229783

Log:
  Spelling fixes for etc/

Modified:
  head/etc/mac.conf
  head/etc/namedb/named.conf
  head/etc/network.subr
  head/etc/rc.d/bgfsck
  head/etc/rc.firewall
  head/etc/rc.initdiskless
  head/etc/rc.subr
  head/etc/services

Modified: head/etc/mac.conf
==============================================================================
--- head/etc/mac.conf	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/mac.conf	Sat Jan  7 16:10:32 2012	(r229783)
@@ -3,7 +3,7 @@
 #
 # TrustedBSD MAC userland policy configuration file.  Kernel modules
 # export label information, and mac.conf indicates to userland
-# applications what defaults they should use in the absense of any
+# applications what defaults they should use in the absence of any
 # other user-provided information.
 #
 

Modified: head/etc/namedb/named.conf
==============================================================================
--- head/etc/namedb/named.conf	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/namedb/named.conf	Sat Jan  7 16:10:32 2012	(r229783)
@@ -94,7 +94,7 @@ zone "." { type hint; file "/etc/namedb/
 
 	As documented at http://dns.icann.org/services/axfr/ these zones:
 	"." (the root), ARPA, IN-ADDR.ARPA, IP6.ARPA, and ROOT-SERVERS.NET
-	are availble for AXFR from these servers on IPv4 and IPv6:
+	are available for AXFR from these servers on IPv4 and IPv6:
 	xfr.lax.dns.icann.org, xfr.cjr.dns.icann.org
 */
 /*

Modified: head/etc/network.subr
==============================================================================
--- head/etc/network.subr	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/network.subr	Sat Jan  7 16:10:32 2012	(r229783)
@@ -139,7 +139,7 @@ ifconfig_up()
 			_cfg=0
 		fi
 
-		# backward compatiblity: $ipv6_ifconfig_IF
+		# backward compatibility: $ipv6_ifconfig_IF
 		ifconfig_args=`get_if_var $1 ipv6_ifconfig_IF`
 		if [ -n "${ifconfig_args}" ]; then
 			warn "\$ipv6_ifconfig_$1 is obsolete." \

Modified: head/etc/rc.d/bgfsck
==============================================================================
--- head/etc/rc.d/bgfsck	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/rc.d/bgfsck	Sat Jan  7 16:10:32 2012	(r229783)
@@ -22,7 +22,7 @@ bgfsck_start ()
 		background_fsck_delay=0
 	fi
 	if [ ${background_fsck_delay} -lt 0 ]; then
-		echo "Background file system checks delayed indefinitly"
+		echo "Background file system checks delayed indefinitely"
 		return 0
 	fi
 

Modified: head/etc/rc.firewall
==============================================================================
--- head/etc/rc.firewall	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/rc.firewall	Sat Jan  7 16:10:32 2012	(r229783)
@@ -46,7 +46,7 @@ fi
 #   client      - will try to protect just this machine
 #   simple      - will try to protect a whole network
 #   closed      - totally disables IP services except via lo0 interface
-#   workstation - will try to protect just this machine using statefull
+#   workstation - will try to protect just this machine using stateful
 #		  firewalling. See below for rc.conf variables used
 #   UNKNOWN     - disables the loading of firewall rules.
 #   filename    - will load the rules in the given filename (full path required)
@@ -105,7 +105,7 @@ setup_ipv6_mandatory () {
 	${fwcmd} add pass ipv6-icmp from fe80::/10 to fe80::/10
 	${fwcmd} add pass ipv6-icmp from fe80::/10 to ff02::/16
 
-	# Allow ICMPv6 destination unreach
+	# Allow ICMPv6 destination unreachable
 	${fwcmd} add pass ipv6-icmp from any to any icmp6types 1
 
 	# Allow NS/NA/toobig (don't filter it out)
@@ -437,7 +437,7 @@ case ${firewall_type} in
 	#				 default denied packets should be
 	#				 logged (in /var/log/security).
 	#  firewall_nologports:		List of TCP/UDP ports for which
-	#				 denied incomming packets are not
+	#				 denied incoming packets are not
 	#				 logged.
 
 	# Allow packets for which a state has been built.
@@ -505,7 +505,7 @@ case ${firewall_type} in
 	  ${fwcmd} add deny { tcp or udp } from any to any $i in
 	done
 
-	# Broadcasts and muticasts
+	# Broadcasts and multicasts
 	${fwcmd} add deny ip  from any to 255.255.255.255
 	${fwcmd} add deny ip  from any to 224.0.0.0/24 in	# XXX
 
@@ -513,7 +513,7 @@ case ${firewall_type} in
 	${fwcmd} add deny udp from any to any 520 in
 
 	# Noise from webbrowsing.
-	# The statefull filter is a bit agressive, and will cause some
+	# The stateful filter is a bit aggressive, and will cause some
 	#  connection teardowns to be logged.
 	${fwcmd} add deny tcp from any 80,443 to any 1024-65535 in
 

Modified: head/etc/rc.initdiskless
==============================================================================
--- head/etc/rc.initdiskless	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/rc.initdiskless	Sat Jan  7 16:10:32 2012	(r229783)
@@ -46,16 +46,16 @@
 #  bcast/${ipba} same as above
 #  ${class}	where ${class} is a list of directories supplied by
 #		bootp/dhcp through the T134 option.
-#		${ipba} and ${class} are typicall used to configure features
+#		${ipba} and ${class} are typically used to configure features
 #		for group of diskless clients, or even individual features;
 #  ${ip}	where ${ip} is the machine's assigned IP address, typically
 #		used to set host-specific features;
 #  ip/${ip}	same as above
 #
 # Template directories are scanned in the order they are listed above,
-# with each sucessive directory overriding (merged into) the previous one;
+# with each successive directory overriding (merged into) the previous one;
 # non-existing directories are ignored.  The subdirectory forms exist to
-# help keep the top level /conf managable in large installations.
+# help keep the top level /conf manageable in large installations.
 #
 # The existence of a directory /conf/T/M causes this script to create a
 # memory filesystem mounted as /M on the client.

Modified: head/etc/rc.subr
==============================================================================
--- head/etc/rc.subr	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/rc.subr	Sat Jan  7 16:10:32 2012	(r229783)
@@ -1280,7 +1280,7 @@ backup_file()
 #	Make a symbolic link 'link' to src from basedir. If the
 #	directory in which link is to be created does not exist
 #	a warning will be displayed and an error will be returned.
-#	Returns 0 on sucess, 1 otherwise.
+#	Returns 0 on success, 1 otherwise.
 #
 make_symlink()
 {

Modified: head/etc/services
==============================================================================
--- head/etc/services	Sat Jan  7 16:10:23 2012	(r229782)
+++ head/etc/services	Sat Jan  7 16:10:32 2012	(r229783)
@@ -795,7 +795,7 @@ alpes		463/udp
 kpasswd5	464/tcp	   # Kerberos (v5)
 kpasswd5	464/udp	   # Kerberos (v5)
 #PROBLEMS!==============================================================
-# IANA has offically assigned these two ports as ``kpasswd''
+# IANA has officially assigned these two ports as ``kpasswd''
 #kpasswd	464/tcp	   # Kerberos (v5)
 #kpasswd	464/udp	   # Kerberos (v5)
 #PROBLEMS!==============================================================
@@ -1275,8 +1275,8 @@ hcp-wismar      686/tcp    #Hardware Con
 hcp-wismar      686/udp    #Hardware Control Protocol Wismar
 asipregistry	687/tcp
 asipregistry	687/udp
-realm-rusd      688/tcp    #ApplianceWare managment protocol
-realm-rusd      688/udp    #ApplianceWare managment protocol
+realm-rusd      688/tcp    #ApplianceWare management protocol
+realm-rusd      688/udp    #ApplianceWare management protocol
 nmap            689/tcp
 nmap            689/udp
 vatp            690/tcp    #Velazquez Application Transfer Protocol
@@ -2392,7 +2392,7 @@ xdsxdm		6558/tcp
 xdsxdm		6558/udp
 sane-port	6566/tcp   #Scanner Access Now Easy (SANE) Control Port
 sane-port	6566/udp   #Scanner Access Now Easy (SANE) Control Port
-ircd		6667/tcp   #Internet Relay Chat (unoffical)
+ircd		6667/tcp   #Internet Relay Chat (unofficial)
 frc-hp		6704/sctp  #ForCES HP (High Priority) channel
 frc-mp		6705/sctp  #ForCES MP (Medium Priority) channel
 frc-lp		6706/sctp  #ForCES LP (Low priority) channel



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201201071610.q07GAWZA046912>