From owner-svn-src-head@freebsd.org Thu Dec 28 01:31:30 2017 Return-Path: Delivered-To: svn-src-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 692ACE8D716; Thu, 28 Dec 2017 01:31:30 +0000 (UTC) (envelope-from eadler@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 28EBE26E1; Thu, 28 Dec 2017 01:31:30 +0000 (UTC) (envelope-from eadler@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id vBS1VTC1020451; Thu, 28 Dec 2017 01:31:29 GMT (envelope-from eadler@FreeBSD.org) Received: (from eadler@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id vBS1VSpP020446; Thu, 28 Dec 2017 01:31:28 GMT (envelope-from eadler@FreeBSD.org) Message-Id: <201712280131.vBS1VSpP020446@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: eadler set sender to eadler@FreeBSD.org using -f From: Eitan Adler Date: Thu, 28 Dec 2017 01:31:28 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r327259 - in head: lib/libc/sys lib/libopenbsd sbin/ipfw usr.sbin/ntp/doc X-SVN-Group: head X-SVN-Commit-Author: eadler X-SVN-Commit-Paths: in head: lib/libc/sys lib/libopenbsd sbin/ipfw usr.sbin/ntp/doc X-SVN-Commit-Revision: 327259 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 28 Dec 2017 01:31:30 -0000 Author: eadler Date: Thu Dec 28 01:31:28 2017 New Revision: 327259 URL: https://svnweb.freebsd.org/changeset/base/327259 Log: Fix a few more speelling errors Reviewed by: bjk Reviewed by: jilles (incl formal "accept") Differential Revision: https://reviews.freebsd.org/D13650 Modified: head/lib/libc/sys/kqueue.2 head/lib/libc/sys/sendfile.2 head/lib/libopenbsd/imsg_init.3 head/sbin/ipfw/ipfw.8 head/usr.sbin/ntp/doc/ntp.conf.5 Modified: head/lib/libc/sys/kqueue.2 ============================================================================== --- head/lib/libc/sys/kqueue.2 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libc/sys/kqueue.2 Thu Dec 28 01:31:28 2017 (r327259) @@ -190,7 +190,7 @@ The .Fa ext[2] and .Fa ext[3] -members are always passed throught the kernel as-is, +members are always passed through the kernel as-is, making additional context available to application. .El .Pp Modified: head/lib/libc/sys/sendfile.2 ============================================================================== --- head/lib/libc/sys/sendfile.2 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libc/sys/sendfile.2 Thu Dec 28 01:31:28 2017 (r327259) @@ -190,7 +190,7 @@ may read ahead when reading the file. A macro .Fn SF_FLAGS is provided to combine readahead amount and flags. -Example shows specifing readahead of 16 pages and +An example showing specifying readahead of 16 pages and .Dv SF_NOCACHE flag: .Pp Modified: head/lib/libopenbsd/imsg_init.3 ============================================================================== --- head/lib/libopenbsd/imsg_init.3 Thu Dec 28 01:21:30 2017 (r327258) +++ head/lib/libopenbsd/imsg_init.3 Thu Dec 28 01:31:28 2017 (r327259) @@ -347,7 +347,7 @@ On success returns a pointer to the buffer; on failure it returns NULL. .Pp .Fn ibuf_dynamic -allocates a resizeable buffer of initial length +allocates a resizable buffer of initial length .Fa len and maximum size .Fa max . Modified: head/sbin/ipfw/ipfw.8 ============================================================================== --- head/sbin/ipfw/ipfw.8 Thu Dec 28 01:21:30 2017 (r327258) +++ head/sbin/ipfw/ipfw.8 Thu Dec 28 01:31:28 2017 (r327259) @@ -3020,7 +3020,7 @@ supports in-kernel IPv6/IPv4 network address and proto Stateful NAT64 translation allows IPv6-only clients to contact IPv4 servers using unicast TCP, UDP or ICMP protocols. One or more IPv4 addresses assigned to a stateful NAT64 translator are shared -among serveral IPv6-only clients. +among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server. The kernel module Modified: head/usr.sbin/ntp/doc/ntp.conf.5 ============================================================================== --- head/usr.sbin/ntp/doc/ntp.conf.5 Thu Dec 28 01:21:30 2017 (r327258) +++ head/usr.sbin/ntp/doc/ntp.conf.5 Thu Dec 28 01:31:28 2017 (r327259) @@ -2550,7 +2550,7 @@ While this is generally a feature as it allows for quick recovery if a server key has changed, a properly forged and appropriately delivered crypto\-NAK packet can be used in a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your @@ -2598,7 +2598,7 @@ While this is generally a feature as it allows for quick recovery if a server key has changed, a properly forged and appropriately delivered crypto\-NAK packet can be used in a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your @@ -2618,7 +2618,7 @@ While this is generally a feature as it allows for quick recovery, if this type of packet is carefully forged and sent during an appropriate window it can be used for a DoS attack. -If you have active noticable problems with this type of DoS attack +If you have active noticeable problems with this type of DoS attack then you should consider disabling this option. You can check your