Date: Thu, 28 Dec 2017 01:31:28 +0000 (UTC) From: Eitan Adler <eadler@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r327259 - in head: lib/libc/sys lib/libopenbsd sbin/ipfw usr.sbin/ntp/doc Message-ID: <201712280131.vBS1VSpP020446@repo.freebsd.org>
index | next in thread | raw e-mail
Author: eadler Date: Thu Dec 28 01:31:28 2017 New Revision: 327259 URL: https://svnweb.freebsd.org/changeset/base/327259 Log: Fix a few more speelling errors Reviewed by: bjk Reviewed by: jilles (incl formal "accept") Differential Revision: https://reviews.freebsd.org/D13650 Modified: head/lib/libc/sys/kqueue.2 head/lib/libc/sys/sendfile.2 head/lib/libopenbsd/imsg_init.3 head/sbin/ipfw/ipfw.8 head/usr.sbin/ntp/doc/ntp.conf.5 Modified: head/lib/libc/sys/kqueue.2 ============================================================================== --- head/lib/libc/sys/kqueue.2 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libc/sys/kqueue.2 Thu Dec 28 01:31:28 2017 (r327259) @@ -190,7 +190,7 @@ The .Fa ext[2] and .Fa ext[3] -members are always passed throught the kernel as-is, +members are always passed through the kernel as-is, making additional context available to application. .El .Pp Modified: head/lib/libc/sys/sendfile.2 ============================================================================== --- head/lib/libc/sys/sendfile.2 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libc/sys/sendfile.2 Thu Dec 28 01:31:28 2017 (r327259) @@ -190,7 +190,7 @@ may read ahead when reading the file. A macro .Fn SF_FLAGS is provided to combine readahead amount and flags. -Example shows specifing readahead of 16 pages and +An example showing specifying readahead of 16 pages and .Dv SF_NOCACHE flag: .Pp Modified: head/lib/libopenbsd/imsg_init.3 ============================================================================== --- head/lib/libopenbsd/imsg_init.3 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libopenbsd/imsg_init.3 Thu Dec 28 01:31:28 2017 (r327259) @@ -347,7 +347,7 @@ On success returns a pointer to the buffer; on failure it returns NULL. .Pp .Fn ibuf_dynamic -allocates a resizeable buffer of initial length +allocates a resizable buffer of initial length .Fa len and maximum size .Fa max . Modified: head/sbin/ipfw/ipfw.8 ============================================================================== --- head/sbin/ipfw/ipfw.8 Thu Dec 28 01:21:30 2017 (r327258) +++ head/sbin/ipfw/ipfw.8 Thu Dec 28 01:31:28 2017 (r327259) @@ -3020,7 +3020,7 @@ supports in-kernel IPv6/IPv4 network address and proto Stateful NAT64 translation allows IPv6-only clients to contact IPv4 servers using unicast TCP, UDP or ICMP protocols. One or more IPv4 addresses assigned to a stateful NAT64 translator are shared -among serveral IPv6-only clients. +among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server. The kernel module Modified: head/usr.sbin/ntp/doc/ntp.conf.5 ============================================================================== --- head/usr.sbin/ntp/doc/ntp.conf.5 Thu Dec 28 01:21:30 2017 (r327258) +++ head/usr.sbin/ntp/doc/ntp.conf.5 Thu Dec 28 01:31:28 2017 (r327259) @@ -2550,7 +2550,7 @@ While this is generally a feature as it allows for quick recovery if a server key has changed, a properly forged and appropriately delivered crypto\-NAK packet can be used in a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your @@ -2598,7 +2598,7 @@ While this is generally a feature as it allows for quick recovery if a server key has changed, a properly forged and appropriately delivered crypto\-NAK packet can be used in a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your @@ -2618,7 +2618,7 @@ While this is generally a feature as it allows for quick recovery, if this type of packet is carefully forged and sent during an appropriate window it can be used for a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check yourhome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201712280131.vBS1VSpP020446>
