Date: Thu, 28 Dec 2017 01:31:28 +0000 (UTC) From: Eitan Adler <eadler@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r327259 - in head: lib/libc/sys lib/libopenbsd sbin/ipfw usr.sbin/ntp/doc Message-ID: <201712280131.vBS1VSpP020446@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: eadler Date: Thu Dec 28 01:31:28 2017 New Revision: 327259 URL: https://svnweb.freebsd.org/changeset/base/327259 Log: Fix a few more speelling errors Reviewed by: bjk Reviewed by: jilles (incl formal "accept") Differential Revision: https://reviews.freebsd.org/D13650 Modified: head/lib/libc/sys/kqueue.2 head/lib/libc/sys/sendfile.2 head/lib/libopenbsd/imsg_init.3 head/sbin/ipfw/ipfw.8 head/usr.sbin/ntp/doc/ntp.conf.5 Modified: head/lib/libc/sys/kqueue.2 ============================================================================== --- head/lib/libc/sys/kqueue.2 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libc/sys/kqueue.2 Thu Dec 28 01:31:28 2017 (r327259) @@ -190,7 +190,7 @@ The .Fa ext[2] and .Fa ext[3] -members are always passed throught the kernel as-is, +members are always passed through the kernel as-is, making additional context available to application. .El .Pp Modified: head/lib/libc/sys/sendfile.2 ============================================================================== --- head/lib/libc/sys/sendfile.2 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libc/sys/sendfile.2 Thu Dec 28 01:31:28 2017 (r327259) @@ -190,7 +190,7 @@ may read ahead when reading the file. A macro .Fn SF_FLAGS is provided to combine readahead amount and flags. -Example shows specifing readahead of 16 pages and +An example showing specifying readahead of 16 pages and .Dv SF_NOCACHE flag: .Pp Modified: head/lib/libopenbsd/imsg_init.3 ============================================================================== --- head/lib/libopenbsd/imsg_init.3 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libopenbsd/imsg_init.3 Thu Dec 28 01:31:28 2017 (r327259) @@ -347,7 +347,7 @@ On success returns a pointer to the buffer; on failure it returns NULL. .Pp .Fn ibuf_dynamic -allocates a resizeable buffer of initial length +allocates a resizable buffer of initial length .Fa len and maximum size .Fa max . Modified: head/sbin/ipfw/ipfw.8 ============================================================================== --- head/sbin/ipfw/ipfw.8 Thu Dec 28 01:21:30 2017 (r327258) +++ head/sbin/ipfw/ipfw.8 Thu Dec 28 01:31:28 2017 (r327259) @@ -3020,7 +3020,7 @@ supports in-kernel IPv6/IPv4 network address and proto Stateful NAT64 translation allows IPv6-only clients to contact IPv4 servers using unicast TCP, UDP or ICMP protocols. One or more IPv4 addresses assigned to a stateful NAT64 translator are shared -among serveral IPv6-only clients. +among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server. The kernel module Modified: head/usr.sbin/ntp/doc/ntp.conf.5 ============================================================================== --- head/usr.sbin/ntp/doc/ntp.conf.5 Thu Dec 28 01:21:30 2017 (r327258) +++ head/usr.sbin/ntp/doc/ntp.conf.5 Thu Dec 28 01:31:28 2017 (r327259) @@ -2550,7 +2550,7 @@ While this is generally a feature as it allows for quick recovery if a server key has changed, a properly forged and appropriately delivered crypto\-NAK packet can be used in a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your @@ -2598,7 +2598,7 @@ While this is generally a feature as it allows for quick recovery if a server key has changed, a properly forged and appropriately delivered crypto\-NAK packet can be used in a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your @@ -2618,7 +2618,7 @@ While this is generally a feature as it allows for quick recovery, if this type of packet is carefully forged and sent during an appropriate window it can be used for a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201712280131.vBS1VSpP020446>