english(4) police.

This commit is contained in:
Jens Schweikhardt 2002-12-27 12:15:40 +00:00
parent aa4d7a8a4b
commit 57bd0fc6e8
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=108317
126 changed files with 359 additions and 359 deletions

View file

@ -83,5 +83,5 @@ function appeared in
.Sh BUGS
The
.Fn devname
function returns a poiner to an internal static object;
function returns a pointer to an internal static object;
thus, subsequent calls will modify the same buffer.

View file

@ -32,7 +32,7 @@
.Os
.Sh NAME
.Nm dirname
.Nd extract the directory portition of a pathname
.Nd extract the directory part of a pathname
.Sh SYNOPSIS
.In libgen.h
.Ft char *

View file

@ -60,6 +60,6 @@ hardware page size.
.Xr sbrk 2
.Sh HISTORY
The
.Fn getpagesze
.Fn getpagesize
function appeared in
.Bx 4.2 .

View file

@ -168,7 +168,7 @@ The
and
.Dv SIGTTOU
signals (stop signal generated from keyboard or due to terminal I/O
from a background proccess) are treated specially.
from a background process) are treated specially.
When the process is resumed after it has been stopped,
.Fn readpassphrase
will reprint the prompt and the user may then enter a passphrase.

View file

@ -46,7 +46,7 @@ function destroys the unnamed semaphore pointed to by
After a successful call to
.Fn sem_destroy ,
.Fa sem
is unuseable until re-initialized by another call to
is unusable until re-initialized by another call to
.Fn sem_init .
.Sh RETURN VALUES
.Rv -std sem_destroy

View file

@ -96,7 +96,7 @@ function.
The input and output baud rates are found in the termios structure.
The unsigned integer
.Li speed_t
is typdef'd in the include file
is typedef'd in the include file
.Aq Pa termios.h .
The value of the integer corresponds directly to the baud rate being
represented, however, the following symbolic values are defined.

View file

@ -68,7 +68,7 @@ specifies the watch address,
specifies the size in bytes of the area to be watched (1, 2, or 4 bytes),
and
.Fa access
specifes the type of watch point:
specifies the type of watch point:
.Pp
.Bd -literal -offset indent -compact
DBREG_DR7_EXEC An execution breakpoint.

View file

@ -66,7 +66,7 @@
.Sh DESCRIPTION
.\"
Building and parsing the Hop-by-Hop and Destination options is
complicated due to alignment constranints, padding and
complicated due to alignment constraints, padding and
ancillary data manipulation.
RFC2292 defines a set of functions to help the application.
The function prototypes for

View file

@ -89,7 +89,7 @@ set to the name of the source,
.Va cb
defined as a function which handles that source, and
.Va cb_data
is used to pass arbritrary data to the callback function.
is used to pass arbitrary data to the callback function.
The last entry in
.Va dtab
should contain
@ -161,7 +161,7 @@ list of the type
.Va va_list .
.Ss Valid source types
Whilst there is support for arbitrary sources, the following
#defines for commonly implementated sources are available:
#defines for commonly implemented sources are available:
.Bl -column NS_COMPAT COMPAT -offset indent
.It Sy "#define value"
.It "NSSRC_FILES ""files"""

View file

@ -41,7 +41,7 @@
permits file systems to export Access Control Lists via the VFS, and
provides a library for userland access to and manipulation of these ACLs.
Not all file systems provide support for ACLs, and some may require that
ACL support be explicitely enabled by the administrator.
ACL support be explicitly enabled by the administrator.
The library calls include routines to allocate, duplicate, retrieve, set,
and validate ACLs associated with file objects.
As well as the POSIX.1e routines, there are a number of non-portable

View file

@ -66,7 +66,7 @@ then the value returned by
will be a pointer to type
.Vt gid_t .
.Pp
If the value of the tag type in the ACL enty referred to by
If the value of the tag type in the ACL entry referred to by
.Fa entry_d
is
.Dv ACL_UNDEFINED_TAG , ACL_USER_OBJ , ACL_GROUP_OBJ ,

View file

@ -42,7 +42,7 @@
The
.Fn acl_get_tag_type
function
is a POSIX.1e call that returs the tag type for the ACL entry
is a POSIX.1e call that returns the tag type for the ACL entry
.Fa entry_d .
Upon successful completion, the location referred to by the argument
.Fa tag_type_p

View file

@ -101,7 +101,7 @@ Setting MAC labels is not supported
by the file referenced by
.Fa fd .
.It Bq Er EPERM
The calling process had insufficient privelege
The calling process had insufficient privilege
to change the MAC label.
.It Bq Er EROFS
File system for the object being modified

View file

@ -298,7 +298,7 @@ struct netbuf {
};
/*
* The format of the addres and options arguments of the XTI t_bind call.
* The format of the address and options arguments of the XTI t_bind call.
* Only provided for compatibility, it should not be used other than
* as an argument to svc_tli_create().
*/

View file

@ -132,7 +132,7 @@ appropriately; otherwise the
.Fn aio_return
system call must be called, and will return -1, and
.Fn aio_error
must be called to determine the actual calue that would have been
must be called to determine the actual value that would have been
returned in
.Va errno .
.Pp

View file

@ -4,7 +4,7 @@
.\" All rights reserved.
.\"
.\" This software was written by William Studenmund of the
.\" Numerical Aerospace Similation Facility, NASA Ames Research Center.
.\" Numerical Aerospace Simulation Facility, NASA Ames Research Center.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
@ -87,7 +87,7 @@ provide the functionality of the
.Xr fstat 2
and
.Xr fstatfs 2
calls except that they return information for the file refered to by
calls except that they return information for the file referred to by
.Fa fhp
rather than an open file.
.Sh RETURN VALUES
@ -105,7 +105,7 @@ In addition to the errors returned by
.Xr fstat 2 ,
and
.Xr fstatfs 2
respectivly,
respectively,
.Fn fhopen ,
.Fn fhstat ,
and

View file

@ -121,7 +121,7 @@ For more information see the MAP_NOSYNC section of
.It Dv MADV_AUTOSYNC
Undoes the effects of MADV_NOSYNC for any future pages dirtied within the
address range. The effect on pages already dirtied is indeterminate - they
may or may not be reverted. You can guarentee reversion by using the
may or may not be reverted. You can guarantee reversion by using the
.Xr msync 2
or
.Xr fsync 2

View file

@ -150,7 +150,7 @@ struct nfsd_srvargs {
struct ucred nsd_cr; /* Cred. uid maps to */
int nsd_authlen; /* Length of auth string (ret) */
u_char *nsd_authstr; /* Auth string (ret) */
int nsd_verflen; /* and the verfier */
int nsd_verflen; /* and the verifier */
u_char *nsd_verfstr;
struct timeval nsd_timestamp; /* timestamp from verifier */
u_int32_t nsd_ttl; /* credential ttl (sec) */

View file

@ -484,7 +484,7 @@ the
.Dv sa_handler
member of
.Dv struct sigaction .
In pratice,
In practice,
.Fx
always sends the three arguments of the latter and since the ANSI C
prototype is a subset, both will work.
@ -517,7 +517,7 @@ handler and the
.Dv si_code
member of the
.Dv info
argument to a SA_SIGINFO handler contain a numeric code explaning the
argument to a SA_SIGINFO handler contain a numeric code explaining the
cause of the signal, usually one of the
.Dv SI_...
values from

View file

@ -85,7 +85,7 @@ PF_XTP eXpress Transfer Protocol,
PF_COIP Connection-Oriented IP, aka ST II,
PF_CNT Computer Network Technology,
PF_SIP Simple Internet Protocol,
PF_IPX Novell Intenet Packet eXchange protocol,
PF_IPX Novell Internet Packet eXchange protocol,
PF_RTIP Help Identify RTIP packets,
PF_PIP Help Identify PIP packets,
PF_ISDN Integrated Services Digital Network,

View file

@ -78,7 +78,7 @@ The
system call
can normally be used just like
.Xr fork 2 .
It does not work, however, to return while running in the childs context
It does not work, however, to return while running in the child's context
from the procedure that called
.Fn vfork
since the eventual return from

View file

@ -44,7 +44,7 @@ Value returned as
.Fa dst
is supposed to be used in conjunction with
.Fn pthread_attr_get*
functions to retrive individual values from
functions to retrieve individual values from
.Vt pthread_attr_t
structure.
Parameter

View file

@ -87,7 +87,7 @@ functions copy the value of the attribute that corresponds to each function name
to the location pointed to by the second function parameter.
.Sh RETURN VALUES
If successful, these functions return 0.
Otherwise, an error number is returned to indicacte the error.
Otherwise, an error number is returned to indicate the error.
.Sh ERRORS
.Fn pthread_mutexattr_init
will fail if:

View file

@ -46,7 +46,7 @@ function destroys the unnamed semaphore pointed to by
After a successful call to
.Fn sem_destroy ,
.Fa sem
is unuseable until re-initialized by another call to
is unusable until re-initialized by another call to
.Fn sem_init .
.Sh RETURN VALUES
.Rv -std sem_destroy

View file

@ -233,11 +233,11 @@ typedef enum {
CAM_MSG_BUF_PHYS = 0x00080000,/* Message buffer ptr is physical*/
CAM_SNS_BUF_PHYS = 0x00100000,/* Autosense data ptr is physical*/
CAM_DATA_PHYS = 0x00200000,/* SG/Buffer data ptrs are phys. */
CAM_CDB_PHYS = 0x00400000,/* CDB poiner is physical */
CAM_CDB_PHYS = 0x00400000,/* CDB pointer is physical */
CAM_ENG_SGLIST = 0x00800000,/* SG list is for the HBA engine */
/* Phase cognizant mode flags */
CAM_DIS_AUTOSRP = 0x01000000,/* Diable autosave/restore ptrs */
CAM_DIS_AUTOSRP = 0x01000000,/* Disable autosave/restore ptrs */
CAM_DIS_AUTODISC = 0x02000000,/* Disable auto disconnect */
CAM_TGT_CCB_AVAIL = 0x04000000,/* Target CCB available */
CAM_TGT_PHASE_MODE = 0x08000000,/* The SIM runs in phase mode */
@ -427,7 +427,7 @@ used as the seek value.
operates like
.Fn csio_decode
except that instead of placing the decoded contents of the buffer in
varardic arguments, the decoded buffer contents are returned to the user
variadic arguments, the decoded buffer contents are returned to the user
via the
.Fn arg_put
function that is passed in.

View file

@ -180,7 +180,7 @@ MD5
Blowfish
.El
.Pp
Other crypt formats may be easilly added. An example salt would be:
Other crypt formats may be easily added. An example salt would be:
.Bl -tag -offset indent
.It Cm "$3$thesalt$rest"
.El

View file

@ -105,7 +105,7 @@ struct devinfo_dev {
char *dd_location; /* Where bus thinks dev at */
uint32_t dd_devflags; /* API flags */
uint16_t dd_flags; /* internal dev flags */
device_state_t dd_state; /* attacement state of dev */
device_state_t dd_state; /* attachment state of dev */
};
struct devinfo_rman {

View file

@ -376,7 +376,7 @@ Cut the entire line and save in cut buffer.
Cut area between mark and cursor and save in cut buffer.
.It Ic em-copy-region
Copy area between mark and cursor to cut buffer.
.It Ic em-gosmacs-traspose
.It Ic em-gosmacs-transpose
Exchange the two characters before the cursor.
.It Ic em-next-word
Move next to end of current word.

View file

@ -42,7 +42,7 @@ To avoid version and autoconfiguration issues, the library has been
renamed to
.Nm
rather than retain the original eXpat library and include file names
to prevent confusion and autoconfiguation issues for 3rd party
to prevent confusion and autoconfiguration issues for 3rd party
software.
.Sh SEE ALSO
For full documentation, please see the eXpat webpage at

View file

@ -512,10 +512,10 @@ This variable is used if and only if connected to an HTTP proxy, and
is ignored if a user and/or a password were specified in the proxy
URL.
.It Ev HTTP_REFERER
Specifies the referer URL to use for HTTP requests.
Specifies the referrer URL to use for HTTP requests.
If set to
.Dq auto ,
the document URL will be used as referer URL.
the document URL will be used as referrer URL.
.It Ev HTTP_USER_AGENT
Specifies the User-Agent string to use for HTTP requests.
This can be useful when working with HTTP origin or proxy servers that

View file

@ -111,7 +111,7 @@ more about what happened if you're familiar with FTP error codes).
returns a human readable version of the supplied server failure code.
.Pp
.Fn ftpGet
attempts to retreive the file named by the
attempts to retrieve the file named by the
.Fa file
argument (which is assumed to be relative to the FTP server's current directory,
see
@ -169,7 +169,7 @@ to boolean value
.Fa status .
.Pp
.Fn ftpGetURL
attempts to retreive the file named by the supplied
attempts to retrieve the file named by the supplied
.Fa URL
and can be considered equivalent to the combined
.Fn ftpLogin ,

View file

@ -178,7 +178,7 @@ Both
.Ar src
and
.Ar dst
can be omited.
can be omitted.
.Pp
.Ar level
must be set to one of the following:

View file

@ -232,7 +232,7 @@ in
.Tn ASCII
format; however, this results in additional messages being
sent which may interfere with debugging. At even higher levels,
even these additional messagages will be displayed, etc.
even these additional messages will be displayed, etc.
.Pp
Note that
.Xr select 2

View file

@ -83,7 +83,7 @@ authentication attempt was declined.
.It Cm no_anon
Disallow anonymous access.
.It Cm ignore
Ingnore the password supplied,
Ignore the password supplied,
and do not use its constituent parts
(username and hostname)
as

View file

@ -84,7 +84,7 @@ debugging information at
level.
.It Cm auth_as_self
This option will require the user
to authenticate themself as the user
to authenticate himself as the user
given by
.Xr getlogin 2 ,
not as the account they are attempting to access.

View file

@ -105,7 +105,7 @@ except that if the previously obtained password fails,
the user is prompted for another password.
.It Cm auth_as_self
This option will require the user
to authenticate themself as the user
to authenticate himself as the user
given by
.Xr getlogin 2 ,
not as the account they are attempting to access.

View file

@ -87,7 +87,7 @@ functions copy the value of the attribute that corresponds to each function name
to the location pointed to by the second function parameter.
.Sh RETURN VALUES
If successful, these functions return 0.
Otherwise, an error number is returned to indicacte the error.
Otherwise, an error number is returned to indicate the error.
.Sh ERRORS
.Fn pthread_mutexattr_init
will fail if:

View file

@ -46,7 +46,7 @@ function destroys the unnamed semaphore pointed to by
After a successful call to
.Fn sem_destroy ,
.Fa sem
is unuseable until re-initialized by another call to
is unusable until re-initialized by another call to
.Fn sem_init .
.Sh RETURN VALUES
.Rv -std sem_destroy

View file

@ -42,7 +42,7 @@
.Sh DESCRIPTION
The function
.Fn auth_getval
returns the value assocated with the field called
returns the value associated with the field called
.Fa name
or NULL if no such field is found or the auth file cannot be opened.
.Sh SEE ALSO

View file

@ -351,7 +351,7 @@ The suffix used determines the units, and multiple values and
units may be used in combination (e.g. 1m500k = 1.5 megabytes).
A value with no suffix is interpreted as bytes, B as 512-byte
blocks, K as kilobytes, M as megabytes, G as gigabytes and T as
terrabytes.
terabytes.
Case is ignored.
The error value is returned if there is a login capabilities database
error, if an invalid suffix is used, or if a numeric value cannot be

View file

@ -40,7 +40,7 @@
.Nm hypotf ,
.Nm cabs ,
.Nm cabsf
.Nd euclidean distance and complex absolute value functions
.Nd Euclidean distance and complex absolute value functions
.Sh LIBRARY
.Lb libm
.Sh SYNOPSIS

View file

@ -467,7 +467,7 @@ comments.
Defining a virtual host for the primary IP address or hostname
changes the default for ftp logins to that address.
The 'user', 'statfile', 'welcome' and 'motd' fields may be left
blank, or a single hypen '-' used to indicate that the default
blank, or a single hyphen '-' used to indicate that the default
value is to be used.
.Pp
As with any anonymous login configuration, due care must be given

View file

@ -427,7 +427,7 @@ Note that the
.Ql \ep
sequence is only valid for send strings and causes a half-second
pause between sending the previous and next characters.
Hexidecimal values are, at most, 2 hex digits long, and octal
Hexadecimal values are, at most, 2 hex digits long, and octal
values are a maximum of 3 octal digits.
.Pp
The

View file

@ -105,7 +105,7 @@ Note that all files created by
are owner readable and writable only for security reasons. Since the
.Tn NIS
maps and the directory in which they reside are normally owned by
root, this prevents non-privleged users from making unauthorized
root, this prevents non-privileged users from making unauthorized
modifications.
.Pp
In order to maintain consistency across all

View file

@ -858,7 +858,7 @@ the whole ATMARP table will be displayed.
If a host name or IP address is specified, only information about the
given host is displayed.
.PP
This command dislays both information that has been learned dynamically
This command displays both information that has been learned dynamically
(through one form or another of ATMARP and via SCSP) and information
which has been configured by the user (through the \fIadd ARP\fP
subcommand).

View file

@ -102,4 +102,4 @@ config files.
.An M. Warner Losh
.Sh BUGS
devd currently always runs "/etc/devd-generic $device $startstop" for
all device events, reguardless of what the config file says to do.
all device events, regardless of what the config file says to do.

View file

@ -71,7 +71,7 @@ after the system has completed going multiuser, with the
flag to do checking on all the file systems
that can do background checking.
Unlike the foreground checking,
the background checking is started asynchonously
the background checking is started asynchronously
so that other system activity can proceed
even on the file systems that are being checked.
.Pp
@ -129,7 +129,7 @@ Enter preen mode.
In preen mode, only a restricted class of innocuous
file system inconsistencies will be corrected.
If unexpected inconsistencies caused by hardware or
software failures are encounted, the check program
software failures are encountered, the check program
will exit with a failure.
See the manual pages for the individual check programs
for a list of the sorts of failures that they correct

View file

@ -389,7 +389,7 @@ So
.Ar out
is required (and
.Ar in
invalid) whenver
invalid) whenever
.Ar xmit
is used.
Specifying

View file

@ -143,7 +143,7 @@ do not run
.Xr mdconfig 8
to try to detach the unit before attaching it.
.It Fl d Ar rotdelay
Specify the mininum time in milliseconds required to initiate another
Specify the minimum time in milliseconds required to initiate another
disk transfer on the same cylinder.
Modern disks with read/write-behind achieve higher performance without
this feature,

View file

@ -82,7 +82,7 @@ To mount an hpfs volume located in /dev/wd1s1:
.Ed
.Sh WRITING
There is limited writing ability and it is not well-tested.
It is strongly recomended to mount readonly!
It is strongly recommended to mount readonly!
.Sh SEE ALSO
.Xr mount 2 ,
.Xr unmount 2 ,
@ -91,7 +91,7 @@ It is strongly recomended to mount readonly!
.Sh HISTORY
The
.Nm
utility first appered in
utility first appeared in
.Fx 3.0 .
.Sh AUTHORS
HPFS kernel implementation,

View file

@ -242,7 +242,7 @@ is not one of this machine's interface addresses, an error is
returned and nothing is sent.
.It Fl t Ar timeout
Specify a timeout, in seconds, before ping exits regardless of how
many packets have been recieved.
many packets have been received.
.It Fl T Ar ttl
Set the IP Time To Live for multicasted packets.
This flag only applies if the ping destination is a multicast address.

View file

@ -1165,7 +1165,7 @@ be desirable to select a SectPerSU value of 16 blocks (8K) or 32
blocks (16K). Since there are 4 data sectors per stripe, the maximum
data per stripe is 64 blocks (32K) or 128 blocks (64K). Again,
empirical measurement will provide the best indicators of which
values will yeild better performance.
values will yield better performance.
.Pp
The parameters used for the file system are also critical to good
performance. For

View file

@ -83,7 +83,7 @@ Boot the specified
on the next system boot.
If the kernel boots successfully, the
.Em default
kernel will be booted on succesive boots, this is a one-shot option.
kernel will be booted on successive boots, this is a one-shot option.
If the boot fails, the system will continue attempting to boot
.Ar kernel
until the boot process is interrupted and a valid kernel booted.

View file

@ -470,7 +470,7 @@ both
.Ar src
and
.Ar dst
can be omited.
can be omitted.
.Ar level
is to be one of the following:
.Li default , use , require

View file

@ -207,7 +207,7 @@ configuration.
.Op Fl r
.Op Ar volume | plex | subdisk
.Xc
Reset statistisc counters for the specified objects, or for all objects if none
Reset statistics counters for the specified objects, or for all objects if none
are specified.
.It Xo
.Ic rm
@ -2073,7 +2073,7 @@ volume raid setupstate
.Ed
.Pp
Here the plexes are striped, increasing performance, and there are two of them,
increasing reliablity. Note that this example shows the subdisks of the second
increasing reliability. Note that this example shows the subdisks of the second
plex in reverse order from the first plex. This is for performance reasons and
will be discussed below. In addition, the volume specification includes the
keyword

View file

@ -20,7 +20,7 @@ pass in from any to any
block in log quick on ppp0 proto icmp from any to any icmp-type redir
block in log quick on ppp0 proto tcp/udp all with short
#
# Block any IP spoofing atempts. (Packets "from" our network
# Block any IP spoofing attempts. (Packets "from" our network
# shouldn't be coming in from outside).
#
block in log quick on ppp0 from 192.168.4.0/24 to any

View file

@ -23,7 +23,7 @@ block in log quick on ppp0 proto icmp from any to any icmp-type redir
block in log quick on ppp0 proto tcp/udp all with short
block in log quick on ppp0 from any to any with ipopts
#
# Block any IP spoofing atempts. (Packets "from" our network
# Block any IP spoofing attempts. (Packets "from" our network
# shouldn't be coming in from outside).
#
block in log quick on ppp0 from 192.168.4.0/24 to any

View file

@ -44,7 +44,7 @@ Value returned as
.Fa dst
is supposed to be used in conjunction with
.Fn pthread_attr_get*
functions to retrive individual values from
functions to retrieve individual values from
.Vt pthread_attr_t
structure.
Parameter

View file

@ -87,7 +87,7 @@ functions copy the value of the attribute that corresponds to each function name
to the location pointed to by the second function parameter.
.Sh RETURN VALUES
If successful, these functions return 0.
Otherwise, an error number is returned to indicacte the error.
Otherwise, an error number is returned to indicate the error.
.Sh ERRORS
.Fn pthread_mutexattr_init
will fail if:

View file

@ -88,7 +88,7 @@ is enabled.
Logically OR the following bits together:
.Bl -column -offset indent Value Function
.Em "Value Function"
0x0001 Show miscellanious information
0x0001 Show miscellaneous information
0x0002 Show sense data
0x0004 Show Serial EEPROM contents
0x0008 Show bus termination settings
@ -118,7 +118,7 @@ configuration option.
The value assigned to this option should be a bitmap
of all units where target mode is desired.
For example, a value of 0x25 would enable target mode on units 0, 2, and 5.
Note that target mode is only supoprted for ultra160 speeds and below.
Note that target mode is only supported for ultra160 speeds and below.
.Pp
Per target configuration performed in the
.Tn SCSI-Select

View file

@ -69,7 +69,7 @@ Perform a crypto operation against a previously setup session.
.El
.Sh FEATURES
Depending on hardware being present, the following symmetric and
assymetric cryptographic features are potentially available from
asymmetric cryptographic features are potentially available from
.Pa /dev/crypto :
.Pp
.Bl -tag -width ".Dv CRYPTO_RIPEMD160_HMAC" -offset indent -compact

View file

@ -126,10 +126,10 @@ A geom with attached consumers has a rank one higher than the
highest rank of the geoms of the providers its consumers are
attached to.
.El
.Sh "SPECIAL TOPOLOGICAL MANEUVRES"
.Sh "SPECIAL TOPOLOGICAL MANEUVERS"
In addition to the straightforward attach, which attaches a consumer
to a provider, and dettach, which breaks the bond, a number of special
toplogical maneuvres exists to facilitate configuration and to
to a provider, and detach, which breaks the bond, a number of special
topological maneuvers exists to facilitate configuration and to
improve the overall flexibility.
.Pp
.Em TASTING
@ -174,7 +174,7 @@ not loose quorum.
When a provider is orphaned, this does not result in any immediate
change in the topology, any attached consumers are still attached,
any opened paths are still open, it is the responsibility of the
geoms above to close and dettach as soon as this can happen.
geoms above to close and detach as soon as this can happen.
.Pp
The typical scenario is that a device driver notices a disk has
gone and orphans the provider for it.
@ -184,11 +184,11 @@ Providers, which are not attached, are destroyed right away.
Eventually at the toplevel the geom which interfaces
to the DEVFS received an orphan event on its consumer and it
calls destroy_dev(9) and does an explicit close if the
device was open and then dettaches its consumer.
device was open and then detaches its consumer.
The provider below is now no longer attached to and can be
destroyed, if the geom has no more providers it can dettach
destroyed, if the geom has no more providers it can detach
its consumer and selfdestruct and so the carnage passes back
down the tree, until the original provider is dettached from
down the tree, until the original provider is detached from
and it can be destroyed by the geom serving the device driver.
.Pp
While this approach seems byzantine, it does provide the maximum
@ -265,7 +265,7 @@ represented by struct bio, originate at a consumer,
are scheduled on its attached provider, and when processed, returned
to the consumer.
It is important to realize that the struct bio which
enters throuh the provider of a particular geom does not "come
enters through the provider of a particular geom does not "come
out on the other side".
Even simple transformations like MBR and BSD will clone the
struct bio, modify the clone, and schedule the clone on their

View file

@ -171,7 +171,7 @@ The Biba integrity model is also similar to
with the exception that the dominance operator and access rules are reversed,
preventing the downward flow of information rather than the upward flow of
information.
Multi-Level Security (MLS) protects the confentiality, rather than the
Multi-Level Security (MLS) protects the confidentiality, rather than the
integrity, of subjects and objects.
.Sh SEE ALSO
.Xr lomac 4 ,

View file

@ -59,7 +59,7 @@ A read-write integer variable that controls the HCI connection timeout, i.e.\&
how long the HCI layer will wait for the
.Dv Connection_Complete
event.
Normaly this should not be required as Bluetooth devices have
Normally this should not be required as Bluetooth devices have
connection timeout of their own and will send event back.
This timeout
is required to ensure that no connection will stall in case when the HCI

View file

@ -242,7 +242,7 @@ Not implemented.
.It Dv SO_L2CAP_FLUSH
Get (set) value of the flush timeout.
.Bf -emphasis
Not implemeted.
Not implemented.
.Ef
.El
.Sh HOOKS

View file

@ -207,7 +207,7 @@ SCO data packets that the Host Controller can have waiting for transmission in
its buffers.
.El
.Pp
As soon as HCI initialization has been successfuly performed, HCI control
As soon as HCI initialization has been successfully performed, HCI control
application must turn on
.Dq inited
bit for the node.
@ -271,8 +271,8 @@ structure.
.It Dv raw
Raw hook.
Every HCI frame (including HCI command frame) that goes in
or out will be delivired to the hook.
Usually Bluetooth raw HCI sockets layer is connected to the hook.
or out will be delivered to the hook.
Usually the Bluetooth raw HCI socket layer is connected to the hook.
Single HCI frame contained in single
.Vt mbuf
structure.

View file

@ -766,7 +766,7 @@ At debug level 2, much more detailed information is logged.
.Sh CAVEATS
Many pad devices behave as if the first (left) button were pressed if
the user `taps' the surface of the pad.
In contrast, some pad products, e.g. some verions of ALPS GlidePoint
In contrast, some pad products, e.g. some versions of ALPS GlidePoint
and Interlink VersaPad, treat the tapping action
as fourth button events.
.Pp

View file

@ -303,7 +303,7 @@ recycling for a few minutes.
.It tcp.inet.tcp.rexmit_{min,slop}
Adjust the retransmit timer calculation for TCP. The slop is
typically added to the raw calculation to take into account
occassional variances that the SRTT (smoothed round trip time)
occasional variances that the SRTT (smoothed round trip time)
is unable to accomodate, while the minimum specifies an
absolute minimum. While a number of TCP RFCs suggest a 1
second minimum these RFCs tend to focus on streaming behavior

View file

@ -225,7 +225,7 @@ Dump the trace buffer from the card. The argument is
.Vt "struct ti_trace_buf" .
.It Dv ALT_ATTACH
This ioctl is used for compatibility with Alteon's Solaris driver. They
apparantly only have one character interface for debugging, so they have
apparently only have one character interface for debugging, so they have
to tell it which Tigon instance they want to debug. This ioctl is a noop
for
.Fx .

View file

@ -2073,7 +2073,7 @@ Set to
by default.
Set to
.Dq Li YES
to enable the display and funtionality of function key labels (as found
to enable the display and functionality of function key labels (as found
on
.Tn Hewlett-Packard
terminals such as the

View file

@ -528,7 +528,7 @@ TCP session disconnections.
.Pp
The
.Va net.inet.tcp.delayed_ack
TCP feature is largly misunderstood.
TCP feature is largely misunderstood.
Historically speaking, this feature
was designed to allow the acknowledgement to transmitted data to be returned
along with the response.
@ -551,7 +551,7 @@ slightly delay the teardown of a connection, or slightly delay the ramp-up
of a slow-start TCP connection.
While we are not sure we believe that
the several FAQs related to packages such as SAMBA and SQUID which advise
turning off delayed acks may be refering to the slow-start issue.
turning off delayed acks may be referring to the slow-start issue.
In
.Fx ,
it would be more beneficial to increase the slow-start flightsize via

View file

@ -176,7 +176,7 @@ configuration suitable for bridges, routers and firewalls.
.Pp
The following configurations are also present but for reference
only.
Many of them are irrimediably out of date and no effort
Many of them are irremediably out of date and no effort
is done to keep them in good shape:
.Bl -hang -width ".Pa bridge"
.It Pa dial

View file

@ -96,7 +96,7 @@ functions were mostly imported from
.Nx
and it is intended that they remain synced between the
two projects. With that in mind there are several variable
defenitions that can help in this regard. They are:
definitions that can help in this regard. They are:
.Bl -tag -width 4n
.It Ic OSTYPE
Its value will be either
@ -243,7 +243,7 @@ log it to the system log using
.Xr logger 1 ,
and
return to the caller.
The error message consists of the sript name
The error message consists of the script name
(from
.Sy $0 ) ,
followed by
@ -251,7 +251,7 @@ followed by
and then
.Ar message .
This function is intended to be used by developers
as an aid to debuging scripts. It can be turned on or off
as an aid to debugging scripts. It can be turned on or off
by the
.Xr rc.conf 5
variable
@ -296,7 +296,7 @@ The message consists of the script name
followed by
.Dq ": INFO: " ,
and then
.Ar mesage .
.Ar message .
The display of this informational output can be
turned on or off by the
.Xr rc.conf 5
@ -618,7 +618,7 @@ Argument provided to
.Sy run_rc_command ,
after fast and force processing has been performed.
.It Sy rc_flags
Flasg to start the default command with.
Flags to start the default command with.
Defaults to
.Sy ${name}_flags ,
unless overridden by the environment variable

View file

@ -107,7 +107,7 @@ the kernel will then disallow and further userland use of the filter.
.Pp
.Fn accept_filt_get
is used internally to locate which accept filter to use via the
.Fn setsocketopt
.Fn setsockopt
syscall.
.Pp
.Fn accept_filt_generic_mod_event

View file

@ -189,7 +189,7 @@ The
MAC Framework was designed by
.An Robert Watson ,
and implemented by the Network Associates Laboratories Network Security
(NETSEC), Secure Execution Environement (SEE), and Adaptive
(NETSEC), Secure Execution Environment (SEE), and Adaptive
Network Defense research groups.
Network Associates Laboratory staff contributing to the CBOSS Project
include (in alphabetical order):

View file

@ -59,7 +59,7 @@ The
function implements the machine independent prelude to a thread context
switch.
It is called from only a few distinguished places in the kernel
code as a result of the principle of non-preemtable kernel mode execution.
code as a result of the principle of non-preemptable kernel mode execution.
The various major uses of
.Nm
can be enumerated as follows:

View file

@ -29,7 +29,7 @@
.Os
.Sh NAME
.Nm microseq
.Nd ppbus microseqencer developer's guide
.Nd ppbus microsequencer developer's guide
.Sh SYNOPSIS
.In sys/types.h
.In dev/ppbus/ppbconf.h

View file

@ -259,7 +259,7 @@ types.
qualifiers, and
.Ic typedef Ns -names
other than the one being declared.)
Separate these identifers from asterisks using a single space.
Separate these identifiers from asterisks using a single space.
.Pp
When declaring variables in structures, declare them sorted by use, then
by size, and then in alphabetical order.

View file

@ -129,6 +129,6 @@ command to set the arguments without disrupting the value(s) of
shell options varies from one shell version to another.
.Pp
Each shellscript has to carry complex code to parse arguments halfway
correcty (like the example presented here). A better getopt-like tool
correctly (like the example presented here). A better getopt-like tool
would move much of the complexity into the tool and keep the client
shell scripts simpler.

View file

@ -1265,7 +1265,7 @@ and not in
while in the first example it's active in both, because in the first
example the
.B example
startion condition is an
start condition is an
.I inclusive
.B (%s)
start condition.

View file

@ -369,7 +369,7 @@ The output format of tracing and of
.Ic dumpdef
are not specified in any standard,
are likely to change and should not be relied upon.
The current format of tracing is closely modelled on GNU-m4,
The current format of tracing is closely modeled on GNU-m4,
to allow
.Nm autoconf
to work.

View file

@ -106,7 +106,7 @@ options consistent with the GNU C compiler.
.It Ev MKDEP_CPP
Specifies the preprocessor to use. The default is "${CC} -E".
.It Ev MKDEP_CPP_OPTS
Specifie the non-CFLAGS options for the preprocessor. The default is
Specifies the non-CFLAGS options for the preprocessor. The default is
"-M".
.El
.Sh SEE ALSO

View file

@ -71,7 +71,7 @@ to place comments in the file.
Following options are available:
.Bl -tag -width indent
.It Fl d
Turns on debuging messages.
Turns on debugging messages.
.It Fl o
Specify output file.
.El

View file

@ -56,7 +56,7 @@ or a default value of 10.
The lower the nice value of a process, the higher its scheduling priority.
.Pp
The superuser may specify a negative increment in order to run a utility
with a higher scheduling prority.
with a higher scheduling priority.
.Pp
Some shells may provide a builtin
.Nm

View file

@ -466,12 +466,12 @@ Display a list of available devices.
.Ar type , Ns Ar if , Ns Ar pass
.Op | Ar ...
.Xc
Display devivces matching the given pattern. The basic matching
Display devices matching the given pattern. The basic matching
expressions are the same as those used in
.Xr iostat 8
with one difference. Instead of specifying multiple
.Fl t
arguments which are then ORed together, the user instead specifys multiple
arguments which are then ORed together, the user instead specifies multiple
matching expressions joined by the pipe
.Pq Ql \&|
character.

View file

@ -93,7 +93,7 @@ command appeared in
.Sh BUGS
.Bl -item
.It
Writting an image of a tape to a file does not preserve much more than
Writing an image of a tape to a file does not preserve much more than
the raw data.
Block size(s) and tape EOF marks are lost which would
otherwise be preserved in a tape-to-tape copy.

View file

@ -588,7 +588,7 @@ The host specification may be either a host name (see
.Xr hosts 5 ) ,
an Internet address specified in the \*(Lqdot notation\*(Rq (see
.Xr inet 3 ) ,
or IPv6 host name or IPv6 coloned-hexadecimal addreess.
or IPv6 host name or IPv6 coloned-hexadecimal address.
The
.Fl l
option may be used to specify the user name

View file

@ -72,7 +72,7 @@ it.
Otherwise, this option has no effect.
.It Fl h
Print times in a human friendly format. Times are printed in minutes, hours,
etc. as appropiate.
etc. as appropriate.
.It Fl l
The contents of the
.Em rusage

View file

@ -106,7 +106,7 @@ as a logical EOF marker.
.It Fl I Ar replstr
Execute
.Ar utility
for each input line, replacing one or more occurences of
for each input line, replacing one or more occurrences of
.Ar replstr
in up to
.Ar replacements

View file

@ -71,7 +71,7 @@ the OS. The information is stored in AML format.
.Pp
The AML interpreter can execute any of the Control Methods specified
by users. When executed, it interprets the byte sequence in the
Control Method of DSDT, and disassembles the opecodes that it
Control Method of DSDT, and disassembles the opcodes that it
recognizes into ASL
(ACPI Source Language)
format to be displayed.
@ -204,7 +204,7 @@ characters are necessary for specifying objects which have less than four
character string. Unless additional underscores specified, matching
occurs as the beginning of word with the specified number of characters.
.It Cm h
.Em Show help messsage :
.Em Show help message :
Displays the command summary of
.Nm .
.El

View file

@ -91,7 +91,7 @@ the user's full name.
Additionally, it may contain a comma separated
list of values such as office number and work and home phones.
If the
name contains an amperstand it will be replaced by the capitalized
name contains an ampersand it will be replaced by the capitalized
login name when displayed by other programs.
The
.Ql \&:
@ -248,7 +248,7 @@ argument may have one of the following values:
.Bl -tag -width ".Cm random"
.It Cm no
Disable the password.
Instead of an encrypted string, the passowrd field will contain a single
Instead of an encrypted string, the password field will contain a single
.Ql *
character.
The user may not log in until the super-user
@ -366,7 +366,7 @@ option is used with a
or
.Cm none
argument.
Be carefull not to terminate this field with a closing
Be careful not to terminate this field with a closing
.Ql \&:
because it will be treated as part of the password.
.El
@ -430,7 +430,7 @@ each line of the message file.
This means that shell commands can also be embedded in the message file.
The
.Nm
utility attemps to mitigate the possibility of an attacker using this
utility attempts to mitigate the possibility of an attacker using this
feature by refusing to evaluate the file if it is not owned and writeable
only by the root user.
In addition, shell special characters and operators will have to be

View file

@ -138,7 +138,7 @@ prompts on whether to remove the specified user and whether to remove
the home directory.
This option requires that either the
.Fl f
option be used, or one or more user names be given as commmand line
option be used, or one or more user names be given as command line
arguments.
.It Ar username
Identifies one or more users to be removed; if not present,

View file

@ -395,7 +395,7 @@ the factory default.
Set the radio frequency of a given interface.
The
.Ar frequency
should be specfied as a channel ID as shown in the table below.
should be specified as a channel ID as shown in the table below.
The
list of available frequencies is dependent on radio regulations specified
by regional authorities.
@ -442,7 +442,7 @@ The default is 2312.
.It Fl i Ar iface Fl r Ar RTS_threshold
Set the RTS/CTS threshold for a given interface.
This controls the
number of bytes used for the RTS/CTS handhake boundary.
number of bytes used for the RTS/CTS handshake boundary.
The
.Ar RTS_threshold
can be any value between 0 and 2312.
@ -487,7 +487,7 @@ secure than using
authentication when WEP is enabled.
.Pp
Devices may alternate among all of the configured WEP keys when
tranmitting packets.
transmitting packets.
Therefore, all configured keys (up to four) must agree.
.Sh EXAMPLES
.Bd -literal -offset indent

View file

@ -198,7 +198,7 @@ Other events will not be sent to
.It
command line syntax
.Bd -ragged -offset indent
In the example above, the three lines begining with
In the example above, the three lines beginning with
.Ql exec
are commands for the event.
Each line should be terminated with a semicolon.

View file

@ -59,7 +59,7 @@ leading or trailing blanks.
The
.Em name
string may also be placed in quote (single or double, but matching)
to preserve leading, traling or inner blanks.
to preserve leading, trailing or inner blanks.
.Pp
Several environment variables are set up
automatically by the

View file

@ -76,7 +76,7 @@ Possible values are:
.Dq Li 2.88M ,
or
.Dq Li unknown .
This information is primarily intented to be easily parsable by
This information is primarily intended to be easily parsable by
scripts.
.Pp
In order to add some descriptive text that makes the output better

View file

@ -49,7 +49,7 @@
The
.Nm
utility configures the physical address for the generic IP tunnel
inteface, such as "gif0".
interface, such as "gif0".
Argument
.Ar physsrc
and

View file

@ -45,7 +45,7 @@ is part of the isdn4bsd package and is used to detect DTMF tones in the
audio stream.
.Pp
It reads audio G.711 A-Law coded data from stdin and outputs the detected
numbers values as ASCII charcters to stdout.
numbers values as ASCII characters to stdout.
.Pp
The detector is implemented as 8 narrow band-pass filters realized with
an integer double-cross recursive algorithm. Various ad-hoc methods are

View file

@ -110,7 +110,7 @@ print layer 1 (I.430) INFO signals to monitor layer 1 activity (default off).
switch displaying of Layer 2 (Q.921) frames off (default on).
.It Fl n
This option takes a numeric argument specifying the minimum
frame size in octetts a frame must have to be displayed. (default 0)
frame size in octets a frame must have to be displayed. (default 0)
.It Fl o
switch off writing trace output to a file (default on).
.It Fl p

View file

@ -44,7 +44,7 @@ for answering machine support.
The driver is part of the isdn4bsd package.
.Pp
The lower six bits of the drivers's minor number is used to specify a
unit number, wheras the upper two bits specify a functionality.
unit number, whereas the upper two bits specify a functionality.
.Pp
Functionality zero is the usual telephony data stream i/o driver.
.Pp

Some files were not shown because too many files have changed in this diff Show more