Fix typos, spelling, formatting and mdoc mistakes found by Nobuyuki while

translating these manual pages.  Minor corrections by me.

Submitted by:	Nobuyuki Koganemaru <n-kogane@syd.odn.ne.jp>
This commit is contained in:
Joel Dahl 2010-08-16 15:18:30 +00:00
parent e49471b04b
commit c2025a7660
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=211397
80 changed files with 110 additions and 109 deletions

View File

@ -545,7 +545,7 @@ function performs Bluetooth inquiry.
The
.Fa devname
parameter specifies which local Bluetooth device should perform an inquiry.
If not secified, i.e.
If not specified, i.e.
.Dv NULL ,
then first available device will be used.
The

View File

@ -149,7 +149,7 @@ The same behaviour may be requested by
option of the static linker
.Xr ld 1 .
.It Dv RTLD_NOLOAD
Ony return valid handle for the object if it is already loaded in
Only return valid handle for the object if it is already loaded in
the process address space, otherwise
.Dv NULL
is returned.

View File

@ -101,7 +101,8 @@ The
.Fn inet6_rth_init
function initializes the pre-allocated buffer pointed to by
.Fa bp
to contain a routing header of the specified type The
to contain a routing header of the specified type.
The
.Fa bp_len
argument is used to verify that the buffer is large enough.
The caller must allocate the buffer pointed to by bp.

View File

@ -187,7 +187,7 @@ The
.Fa sinfo->sinfo_timetolive
argument is then a number of milliseconds for which the data is
attempted to be transmitted.
If that many milliseconds ellapse
If that many milliseconds elapse
and the peer has not acknowledged the data, the data will be
skipped and no longer transmitted.
Note that this policy does

View File

@ -180,7 +180,7 @@ to find the association but also as the actual address to send to.
.Pp
For a one-to-many type (SOCK_SEQPACKET) socket the flag
.Dv SCTP_SENDALL
can be used as a convient way to make one send call and have
can be used as a convenient way to make one send call and have
all associations that are under the socket get a copy of the message.
Note that this mechanism is quite efficient and makes only one actual
copy of the data which is shared by all the associations for sending.
@ -199,7 +199,7 @@ The
.Fa timetolive
argument is then a number of milliseconds for which the data is
attempted to be transmitted.
If that many milliseconds ellapse
If that many milliseconds elapse
and the peer has not acknowledged the data, the data will be
skipped and no longer transmitted.
Note that this policy does

View File

@ -469,9 +469,9 @@ The
.Fn getopt_long
and
.Fn getopt_long_only
functions first appeared in
functions first appeared in the
.Tn GNU
libiberty.
libiberty library.
The first
.Bx
implementation of

View File

@ -69,7 +69,7 @@ These system calls are restricted to the superuser.
The
.Fn getfh
and
.Fn lgetfgh
.Fn lgetfh
system calls
fail if one or more of the following are true:
.Bl -tag -width Er

View File

@ -129,6 +129,6 @@ The
interface first appeared in
.Fx 3.0 .
.Sh BUGS
The pathname many not be accurate if the file system mounts have
The pathname may not be accurate if the file system mounts have
changed since the module was loaded, or if this function is called
within a chrooted environment.

View File

@ -284,7 +284,7 @@ At the end of the day, second 23:59:59 will be skipped.
.It TIME_OOP
Leap second in progress.
.It TIME_WAIT
Leap second has occurred within the last few seconds..
Leap second has occurred within the last few seconds.
.It TIME_ERROR
Clock not synchronized.
.El

View File

@ -296,9 +296,9 @@ created has its immutable flag set, see the
.Xr chflags 2
manual page for more information.
.It Bq Er EPERM
.Dv The named file has its immutable flag set and the file is to be modified.
The named file has its immutable flag set and the file is to be modified.
.It Bq Er EPERM
.Dv The named file has its append-only flag set, the file is to be modified, and
The named file has its append-only flag set, the file is to be modified, and
.Dv O_TRUNC
is specified or
.Dv O_APPEND

View File

@ -231,7 +231,7 @@ is specified and the named shared memory object does not exist.
.Dv O_CREAT
and
.Dv O_EXCL
are specified and the named shared memory object dies exist.
are specified and the named shared memory object does exist.
.It Bq Er EACCES
The required permissions (for reading or reading and writing) are denied.
.El

View File

@ -738,7 +738,7 @@ and before a new line is to be tokenized.
.It Fn tok_line
Tokenize
.Fa li ,
If successful, modify:
if successful, modify
.Fa argv
to contain the words,
.Fa argc

View File

@ -463,7 +463,7 @@ Close an ELF descriptor and release all its resources.
.It Fn elf_memory
Opens an
.Xr ar 1
archive or ELF object present in a memory arena.
archive or ELF object present in a memory area.
.It Fn elf_version
Sets the operating version.
.El
@ -563,7 +563,7 @@ descriptor and can set the
member of the descriptor to point to a region of memory allocated
using
.Xr malloc 3 .
It is the applications responsibility to free this arena, though the
It is the applications responsibility to free this area, though the
library will reclaim the space used by the
.Vt Elf_Data
descriptor itself.

View File

@ -392,4 +392,4 @@ library appeared in
.Sh AUTHORS
.An Poul-Henning Kamp Aq phk@FreeBSD.org
.An Lukas Ertl Aq le@FreeBSD.org
.An Pawel Jakub Dawidek pjd@FreeBSD.org
.An Pawel Jakub Dawidek Aq pjd@FreeBSD.org

View File

@ -524,7 +524,7 @@ is used to configure the parallel poll response to
.Fa v .
.Em This function is currently not implemented.
.Pp
The fucntion
The function
.Fn ibrd
is used to receive
.Fa cnt

View File

@ -121,7 +121,7 @@ following restrictions apply to the output parameters:
.Pp
The value returned via the
.Fa time_rec
parameter is undefined Unless the
parameter is undefined unless the
accompanying
.Fa ret_flags
parameter contains the bit

View File

@ -184,7 +184,7 @@ Type contained within desired_name parameter is not supported.
.It GSS_S_BAD_NAME
Value supplied for desired_name parameter is ill formed.
.It GSS_S_CREDENTIALS_EXPIRED
The credentials could not be acquired Because they have expired.
The credentials could not be acquired because they have expired.
.It GSS_S_NO_CRED
No credentials were found for the specified name.
.El

View File

@ -139,7 +139,7 @@ GSS-API Context-Level Routines:
.It gss_init_sec_context
Initiate a security context with a peer application
.It gss_accept_sec_context
Accept a security context initiated by a peer application
Accept a security context initiated by a peer application
.It gss_delete_sec_context
Discard a security context
.It gss_process_context_token

View File

@ -48,7 +48,7 @@ Performance monitoring counters (PMCs) are represented by the library
using a software abstraction.
These
.Dq abstract
PMCs can have one two scopes:
PMCs can have two scopes:
.Bl -bullet
.It
System scope.

View File

@ -993,7 +993,7 @@ Counting: Faulting executions of GETSEC/VM entry/VM Exit/MWait will not
count as retired instructions.
.It Li INST_RETIRED.X87
.Pq Event C0H , Umask 02H
Counts the number of MMX instructions retired:.
Counts the number of MMX instructions retired.
.It Li INST_RETIRED.MMX
.Pq Event C0H , Umask 04H
Counts the number of floating point computational operations retired:

View File

@ -434,7 +434,7 @@ Counts cycles all the entries in the DRAM channel 0 high priority queue are
occupied with isochronous read requests.
.It Li QMC_ISOC_FULL.READ.CH1
.Pq Event 28H , Umask 02H
Counts cycles all the entries in the DRAM channel 1high priority queue are
Counts cycles all the entries in the DRAM channel 1 high priority queue are
occupied with isochronous read requests.
.It Li QMC_ISOC_FULL.READ.CH2
.Pq Event 28H , Umask 04H

View File

@ -975,7 +975,7 @@ Counting: Faulting executions of GETSEC/VM entry/VM Exit/MWait will not
count as retired instructions.
.It Li INST_RETIRED.X87
.Pq Event C0H , Umask 02H
Counts the number of floating point computational operations retired:
Counts the number of floating point computational operations retired
floating point computational operations executed by the assist handler and
sub-operations of complex floating point instructions like transcendental
instructions.

View File

@ -464,7 +464,7 @@ Counts cycles all the entries in the DRAM channel 0 high priority queue are
occupied with isochronous read requests.
.It Li QMC_ISOC_FULL.READ.CH1
.Pq Event 28H , Umask 02H
Counts cycles all the entries in the DRAM channel 1high priority queue are
Counts cycles all the entries in the DRAM channel 1 high priority queue are
occupied with isochronous read requests.
.It Li QMC_ISOC_FULL.READ.CH2
.Pq Event 28H , Umask 04H

View File

@ -68,7 +68,7 @@ Argument
.Fa cl
was invalid.
.It Bq Er ENOMEM
Allocation of a memory arena to hold the result failed.
Allocation of a memory area to hold the result failed.
.El
.Sh SEE ALSO
.Xr pmc 3 ,

View File

@ -46,7 +46,7 @@ These functions read and write the current value of a PMC.
.Pp
Function
.Fn pmc_read
with read the current value of the PMC specified by argument
will read the current value of the PMC specified by argument
.Fa pmc
and write it to the location specified by argument
.Fa value .

View File

@ -464,7 +464,7 @@ subsequent library calls using the same handle.
To free the resources used by the RADIUS library, call
.Fn rad_close .
.Ss Server operation
Server mode operates much alike to client mode, except packet send and receieve
Server mode operates much alike to client mode, except packet send and receive
steps are swapped. To operate as server you should obtain server context with
.Fn rad_server_open
function, passing opened and bound UDP socket file descriptor as argument.

View File

@ -68,7 +68,7 @@ typedef enum {
.Ed
.It Vt rpc_gss_options_ret_t
This structure contains various optional values which are used while
creating a security contect.
creating a security context.
.Bd -literal
typedef struct {
int req_flags; /* GSS request bits */

View File

@ -270,7 +270,7 @@ Note: attributes are returned in the order they appear in the Service Search
Attribute Response.
SDP server could return several attributes for the same record.
In this case the order of the attributes will be: all attributes for the first
records, then all attributes for the secord record etc.
records, then all attributes for the second record etc.
.Pp
The
.Fn sdp_attr2desc

View File

@ -524,7 +524,7 @@ returns a zero terminated string describing the backend used.
.Pp
.
.Fn libusb20_dev_get_info
retrives the BSD specific usb_device_info structure into the memory location given by
retrieves the BSD specific usb_device_info structure into the memory location given by
.Fa pinfo .
The USB device given by
.Fa pdev

View File

@ -121,7 +121,7 @@ The
.Fn quota_on
function enables quotas for the filesystem associated with its
.Va qf
argument which may have been opened
argument which may have been opened with
.Dv O_RDONLY
or
.Dv O_RDWR .
@ -138,7 +138,7 @@ The
.Fn quota_off
function disables quotas for the filesystem associated with its
.Va qf
argument which may have been opened
argument which may have been opened with
.Dv O_RDONLY
or
.Dv O_RDWR .

View File

@ -65,7 +65,7 @@ is an \*(Na, then an \*(Na is returned.
Otherwise, the result is
.Li +0.0 .
.Pp
Overflow or underflow may occur iff the exact result is not
Overflow or underflow may occur if the exact result is not
representable in the return type.
No other exceptions are raised.
.Sh SEE ALSO

View File

@ -380,7 +380,7 @@ USB device is detached from the system.
.Bl -tag -width ".Li DETACH" -compact
.It Sy Type
.It Li ATTACH
USB interface is attached from a device.
USB interface is attached to a device.
.It Li DETACH
USB interface is detached from a device.
.El

View File

@ -179,7 +179,7 @@ and block 160 for UFS2.
Check if file system was dismounted cleanly.
If so, skip file system checks (like "preen").
However, if the file system was not cleanly dismounted, do full checks,
is if
as if
.Nm
was invoked without
.Fl C .

View File

@ -84,7 +84,7 @@ Load the kernel module that implements the given class.
This command is only available if the class does not yet exist in the kernel and
the file
.Pa geom_ Ns Ao Ar class Ac Ns Pa .ko
can be found in one of the directories specifed in
can be found in one of the directories specified in
.Va kern.module_path
sysctl.
.It Cm unload

View File

@ -105,7 +105,7 @@ The default extent size is
Maximum number of dirty extents to keep dirty all the time.
Most recently used extents are kept dirty to reduce number of metadata
updates.
The default numer of most recently used extents which will be kept
The default number of most recently used extents which will be kept
dirty is
.Va 64 .
.It Fl m Ar mediasize

View File

@ -34,7 +34,7 @@
.Nm hast.conf
.Nd configuration file for the
.Xr hastd 8
deamon and the
daemon and the
.Xr hastctl 8
utility.
.Sh DESCRIPTION

View File

@ -939,7 +939,7 @@ should be used by specifying ``6:g''.
Similarly the channel width can be specified by appending it
with ``/''; e.g. ``6/40'' specifies a 40MHz wide channel,
These attributes can be combined as in: ``6:ht/40''.
The full set of flags specified following a `:'' are:
The full set of flags specified following a ``:'' are:
.Cm a
(802.11a),
.Cm b
@ -966,7 +966,7 @@ The full set of channel widths following a '/' are:
(20MHz mostly for use in specifying ht20),
and
.Cm 40
(40MHz mostly for use in specifying ht40),
(40MHz mostly for use in specifying ht40).
In addition,
a 40MHz HT channel specification may include the location
of the extension channel by appending ``+'' or ``-'' for above and below,
@ -999,7 +999,7 @@ according to a least-congested criteria.
DFS support is mandatory for some 5Ghz frequencies in certain
locales (e.g. ETSI).
By default DFS is enabled according to the regulatory definitions
specified in /etc/regdomain.xml and the curent country code, regdomain,
specified in /etc/regdomain.xml and the current country code, regdomain,
and channel.
Note the underlying device (and driver) must support radar detection
for full DFS support to work.
@ -1719,7 +1719,7 @@ If an
.Ar index
is not given, key 1 is set.
A WEP key will be either 5 or 13
characters (40 or 104 bits) depending of the local network and the
characters (40 or 104 bits) depending on the local network and the
capabilities of the adaptor.
It may be specified either as a plain
string or as a string of hexadecimal digits preceded by
@ -1942,7 +1942,7 @@ Nodes on the mesh without a path to this root mesh station with try to
discover a path to us.
.It Cm PROACTIVE
Send broadcast path requests every two seconds and every node must reply with
with a path reply even if it already has a path to this root mesh station,
with a path reply even if it already has a path to this root mesh station.
.It Cm RANN
Send broadcast root announcement (RANN) frames.
Nodes on the mesh without a path to this root mesh station with try to

View File

@ -1917,7 +1917,7 @@ and
.Pp
The SCHED_MASK is used to assign flows to one or more
scheduler instances, one for each
value of the packet's 5-fuple after applying SCHED_MASK.
value of the packet's 5-tuple after applying SCHED_MASK.
As an example, using ``src-ip 0xffffff00'' creates one instance
for each /24 destination subnet.
.Pp
@ -2098,7 +2098,7 @@ with either delay or probability first, according
to the chosen format.
The unit for delay is milliseconds.
Data points do not need to be sorted.
Also, tne number of actual lines can be different
Also, the number of actual lines can be different
from the value of the "samples" parameter:
.Nm
utility will sort and interpolate

View File

@ -128,7 +128,7 @@ is set to an integer from 1 to 23 taken from the following table:
.Em sysctl hw.bt848.tuner=nnnn
This can be used to override the tuner make which was detected at boot time.
.Ql nnnn
is set to an integer from 1 to 16 taken from the following table:
is set to an integer from 0 to 16 taken from the following table:
.Pp
.Bl -tag -compact -width 22n
.It NO_TUNER

View File

@ -57,7 +57,7 @@ MultiMaster "W" Series Host Adapters:
.Pp
.Em "Adapter Bus Commands Description"
BT-948 PCI 192 Ultra SCSI-3
BT-958 PCI 192 Wide ULtra SCSI-3
BT-958 PCI 192 Wide Ultra SCSI-3
BT-958D PCI 192 Wide Differential Ultra SCSI-3
.El
.Bl -column "BT-956CD " "ISA " "Commands " Description

View File

@ -127,7 +127,7 @@ a very impossible task.
.Pp
Armed with one or more sector keys, our patient attacker will then go
through essentially the same exercise, using the sector key and the
encrypted sector key to find the key used to encrypt the sectorkey.
encrypted sector key to find the key used to encrypt the sector key.
.Pp
Armed with one or more of these
.Dq kkeys ,

View File

@ -81,7 +81,7 @@ Some architectures offer faster methods of reading these counts.
.It Em Sampling
In sampling modes, the PMCs are configured to sample the CPU
instruction pointer (and optionally to capture the call chain leading
upto the sampled instruction pointer) after a configurable number of
up to the sampled instruction pointer) after a configurable number of
hardware events have been observed.
Instruction pointer samples and call chain records are usually
directed to a log file for subsequent analysis.

View File

@ -757,7 +757,7 @@ and
.Va ip_off
fields
.Em must
be provided in host byte order .
be provided in host byte order.
All other fields must be provided in network byte order.
See
.Xr byteorder 3

View File

@ -517,7 +517,7 @@ packets occasionally.
.Ss Device Polling
.\"
A T3 receiver can generate over 100K interrupts per second,
This can cause a system to
this can cause a system to
.Dq live-lock :
spend all of its
time servicing interrupts.

View File

@ -63,7 +63,7 @@ which protects the integrity of system objects and subjects by means of
an information flow policy coupled with the subject demotion
via floating labels.
In LOMAC, all system subjects and objects are assigned integrity labels, made
up of one or more hierarchal grades, depending on the their types.
up of one or more hierarchial grades, depending on the their types.
Together, these label elements permit all labels to be placed in a partial
order, with information flow protections and demotion decisions
based on a dominance operator

View File

@ -94,4 +94,4 @@ by
It was ported to
.Fx
by
.An Patrick Lamaiziere Aq patfbsd@davenulle.org
.An Patrick Lamaiziere Aq patfbsd@davenulle.org .

View File

@ -525,7 +525,7 @@ The
.Dv METEORSETGEO
will also attempt to reallocate a new contiguous
kernel buffer if the new geometry exceeds the old geometry.
On
On the
other hand, if the new geometry will fit in the existing buffer,
the existing buffer is used.
.Pp

View File

@ -158,7 +158,7 @@ When this flag is set,
the
.Nm
driver will register as a watchdog via the interface defined in
.Xr 9 watchdog
.Xr watchdog 9
if supported by the specific chip model.
.It Dv MK48TXX_WDOG_ENABLE_WDS
When this flag is set,

View File

@ -230,7 +230,7 @@ Return the MAC address for the current BSS identifier via
.Va i_data .
When the interface is running, the bssid is either the value
configured locally (e.g. for an IBSS network started by the local station)
or the value adopted when joing an existing network.
or the value adopted when joining an existing network.
For WDS interfaces this value is the address of the remote station.
When the interface is not running, the bssid returned is the desired
bssid, if any, that has been configured.
@ -485,12 +485,12 @@ and
.It Dv IEEE80211_IOC_PUREG
Return whether ``pure 11g'' mode is enabled in
.Va i_val .
This setting is meaningful only for acces point operation;
This setting is meaningful only for access point operation;
when non-zero, 802.11b stations will not be allowed to associate.
.It Dv IEEE80211_IOC_PUREN
Return whether ``pure 11n'' mode is enabled in
.Va i_val .
This setting is meaningful only for acces point operation;
This setting is meaningful only for access point operation;
when non-zero, legacy (non-11n capable) stations will not be
allowed to associate.
.It Dv IEEE80211_IOC_REGDOMAIN
@ -595,7 +595,7 @@ Return whether Atheros Dynamic Turbo mode is enabled in
Dynamic Turbo mode is a non-standard protocol extension available only
on Atheros devices where channel width is dynamically
changed between 20MHz and 40MHz.
Note tht enabling Dynamic Turbo mode support does not guarantee use;
Note that enabling Dynamic Turbo mode support does not guarantee use;
both client and access point must use Atheros devices and support must
be enabled on both sides.
.It Dv IEEE80211_IOC_TXPARAMS
@ -654,7 +654,7 @@ together with an optional IEEE80211_WMEPARAM_BSS flag to indicate if the
parameter for the BSS or the channel is desired.
If WME is not supported then
.Er EINVAL
wil be returned.
will be returned.
.It Dv IEEE80211_IOC_WME_CWMAX
Return the WME CWmax setting (log2) for the specified Access Class (AC) in
.Va i_val .

View File

@ -531,7 +531,7 @@ The message can be examined using the
macro, or completely extracted from the item using the
.Fn NGI_GET_MSG
which also removes the reference within the item.
If the Item still holds a reference to the message when it is freed
If the item still holds a reference to the message when it is freed
(using the
.Fn NG_FREE_ITEM
macro), then the message will also be freed appropriately.

View File

@ -69,7 +69,7 @@ struct sockaddr_hci {
};
.Ed
.Pp
Raw HCI sockets support number of
Raw HCI sockets support a number of
.Xr ioctl 2
requests such as:
.Bl -tag -width indent

View File

@ -110,7 +110,7 @@ The list of pieces must be terminated by
The
.Fn uni_msg_destroy
function
destroyes the messages and frees all the messages's memory.
destroys the messages and frees all the messages's memory.
.Pp
The
.Fn uni_msg_unpack_mbuf

View File

@ -341,7 +341,7 @@ The sound system will dynamically create up to this many
Set to
.Dq 0
if no
.Tn VCHANS
.Tn VCHANs
are desired.
Maximum value is 256.
.It Va hw.snd.report_soft_formats

View File

@ -203,7 +203,7 @@ association.
.It Dv SCTP_INITMSG
This option allows you to get or set the default sending
parameters when an association is implicitly setup.
It allows you to change such things as the maxium number of
It allows you to change such things as the maximum number of
streams allowed inbound and the number of streams requested
of the peer.
.It Dv SCTP_AUTOCLOSE
@ -278,7 +278,7 @@ By default, when opening an IPV6 socket, when
data arrives on the socket from a peer's
V4 address the V4 address will be presented with an address family
of AF_INET.
If this is undesireable, then this option
If this is undesirable, then this option
can be enabled which will then convert all V4 addresses
into mapped V6 representations.
.It Dv SCTP_MAXSEG
@ -338,8 +338,8 @@ a peer.
This option will let you get or set the list of
HMAC algorithms used to authenticate peers.
Note that the HMAC values are in priority order where
the first HMAC identifier is the most prefered
and the last is the least prefered.
the first HMAC identifier is the most preferred
and the last is the least preferred.
.It Dv SCTP_AUTH_ACTIVE_KEY
This option allows you to make a key active for
the generation of authentication information.

View File

@ -1053,7 +1053,7 @@ overflowing the input queue.
The precise conditions under which
.Dv STOP
and
START
.Dv START
characters are transmitted are implementation defined.
.Pp
If

View File

@ -90,7 +90,7 @@ additional commands to switch it to modem mode.
The
.Xr u3gstub 4
device will attach temporarily to a 3G device with a mass storage device and
force it to switch to modem mode,
force it to switch to modem mode.
The attach and detach of
.Xr u3gstub
and any driver disk device present on the 3G device is hidden, unless the

View File

@ -36,7 +36,7 @@
.Sh SYNOPSIS
To link into kernel:
.Pp
.D1 Cd "options P1003_1B_MQUEUE"
.Cd "options P1003_1B_MQUEUE"
.Pp
To load as a kernel loadable module:
.Pp

View File

@ -629,7 +629,7 @@ The default value if no value is set is 30.
The same as
.Va daily_scrub_zfs_default_threshold
but specific to the pool
.Va Ns Ao Ar poolname Ac Ns .
.Ao Ar poolname Ac Ns .
.It Va daily_local
.Pq Vt str
Set to a list of extra scripts that should be run after all other

View File

@ -67,7 +67,7 @@ A list of extra MIB definition files for
.Xr gensnmptree 1 .
This is optional.
This file list is given to both calls to
.Xr gensnmptree 1 \(em
.Xr gensnmptree 1 No \(em
the one that extracts the symbols in
.Va XSYM
from the MIB definitions and the one that

View File

@ -91,7 +91,7 @@ magical about them.
.Bl -tag -width BUS_PROBE_NOWILDCARD
.It BUS_PROBE_SPECIFIC
The device that cannot be reprobed, and that no
possible other driver may exist (typically legacy drivers who don't fallow
possible other driver may exist (typically legacy drivers who don't follow
all the rules, or special needs drivers).
.It BUS_PROBE_VENDOR
The device is supported by a vendor driver.

View File

@ -78,7 +78,7 @@ will be
.Dv NULL
when
.Fa size
is not, and vise versa.
is not, and vice versa.
.It Fa cred
The user credentials to use in authorizing the request.
.It Fa td

View File

@ -42,7 +42,7 @@
.Sh DESCRIPTION
This translates a vnode into its component name, and writes that name to
the head of the buffer specified by
.Fa buf
.Fa buf .
.Bl -tag -width buflen
.It Fa vp
The vnode to translate.

View File

@ -109,9 +109,9 @@ The topology lock has to be held.
.Fn g_destroy_geom :
.Bl -item -offset indent
.It
The geom cannot posses any providers.
The geom cannot possess any providers.
.It
The geom cannot posses any consumers.
The geom cannot possess any consumers.
.It
The topology lock has to be held.
.El

View File

@ -54,7 +54,7 @@ This is an automatic
to avoid duplicated code in all classes.
Before it is called, field
.Va softc
should be disposed off and set to
should be disposed of and set to
.Dv NULL .
Note that the
.Fn g_wither_geom

View File

@ -205,11 +205,11 @@ method.
Transmit a raw 802.11 frame.
The default method drops the frame and generates a message on the console.
.It Dv ic_updateslot
Update hardware state after an 802.11 IFS slot time change,
Update hardware state after an 802.11 IFS slot time change.
There is no default method; the pointer may be NULL in which case
it will not be used.
.It Dv ic_update_mcast
Update hardware for a change in the multicast packet filter,
Update hardware for a change in the multicast packet filter.
The default method prints a console message.
.It Dv ic_update_promisc
Update hardware for a change in the promiscuous mode setting.
@ -261,13 +261,13 @@ The default method ages frames on the power-save queue (in AP mode)
and pending frames in the receive reorder queues (for stations using A-MPDU).
.It Dv ic_node_drain
Reclaim all optional resources associated with a node.
This call is used to free up resources when they are in short supply,
This call is used to free up resources when they are in short supply.
.It Dv ic_node_getrssi
Return the Receive Signal Strength Indication (RSSI) in .5 dBm units for
the specified node.
This interface returns a subset of the information
returned by
.Dv ic_node_getsignal ,
.Dv ic_node_getsignal .
The default method calculates a filtered average over the last ten
samples passed in to
.Xr ieee80211_input 9
@ -341,7 +341,7 @@ Drivers may interpose this method if they need to setup private state
for handling transmit A-MPDU.
.It Dv ic_addb_response
Process a received ADDBA Response Action frame and setup resources as
needed for doing transmit A-MPDU,
needed for doing transmit A-MPDU.
.It Dv ic_addb_stop
Shutdown an A-MPDU transmit stream for the specified station and AC.
The default method reclaims local state after sending a DelBA Action frame.
@ -490,7 +490,7 @@ Devices supports hardware CKIP cipher.
The follow general 802.11n capabilities are defined.
The first capabilities are defined exactly as they appear in the
802.11n specification.
Capabilities beginning with IEEE80211_HTC_AMPDU are used soley by the
Capabilities beginning with IEEE80211_HTC_AMPDU are used solely by the
.Nm
layer.
.Bl -tag -width IEEE80211_C_8023ENCAP

View File

@ -244,7 +244,7 @@ when it is called by the new process.
The
.Fa procptr
pointer points to a
.Vt "struct proc "
.Vt "struct proc"
pointer that is the location to be updated with the new proc pointer
if a new process is created, or if not
.Dv NULL ,
@ -255,7 +255,7 @@ then a new process is created and the field updated.
If not NULL, the
.Fa tdptr
pointer points to a
.Vt "struct thread "
.Vt "struct thread"
pointer that is the location to be updated with the new thread pointer.
The
.Fa flags

View File

@ -103,7 +103,7 @@ If the protocol implements
.Va nh_m2flow ,
then
.Nm
will query the protocol in the evet that the
will query the protocol in the event that the
.Vt mbuf
doesn't have a flow ID, falling back on source ordering.
.It NETISR_POLICY_CPU
@ -120,7 +120,7 @@ whose fields are defined as follows:
.Bl -tag -width "netisr_handler_t nh_handler"
.It Vt "const char *" Va nh_name
Unique character string name of the protocol, which may be included in
.Xr 2 sysctl
.Xr sysctl 2
MIB names, so should not contain whitespace.
.It Vt netisr_handler_t Va nh_handler
Protocol handler function that will be invoked on each packet received for

View File

@ -84,7 +84,7 @@ The range is expected to be
.Dv DEV_BSIZE
aligned and no larger than
.Dv PAGE_SIZE .
If it is not properly aligned, any unaligned chucks of the
If it is not properly aligned, any unaligned chunks of the
.Dv DEV_BSIZE
blocks at the beginning and end of the range will be zeroed.
.Pp

View File

@ -295,7 +295,7 @@ for more information.
.Sh EXAMPLES
The
.Nm
command is traditionally used to copy file heirarchies in conjunction
command is traditionally used to copy file hierarchies in conjunction
with the
.Xr find 1
command.

View File

@ -225,7 +225,7 @@ Like the
display,
except that it displays
.Tn IPv6
statics.
statistics.
It does not display
.Tn UDP statistics.
.It Ic tcp

View File

@ -30,7 +30,7 @@
.Os
.Sh NAME
.Nm snmp_bridge
.Nd "bridge module for snmpd.
.Nd "bridge module for snmpd"
.Sh LIBRARY
.Pq begemotSnmpdModulePath."bridge" = "/usr/lib/snmp_bridge.so"
.Sh DESCRIPTION
@ -46,7 +46,7 @@ MIB also defines additional objects which make the functionality of
similar to
.Xr ifconfig 8
for configuring bridge interfaces.
Therefore one should consider adding write comminities or loading the
Therefore one should consider adding write communities or loading the
.Nm
module on systems where security is crucial.
.Sh IMPLEMENTATION NOTES

View File

@ -45,7 +45,7 @@ management of virtual wireless interfaces. The MIB defines objects similar to th
state data and configuration capabilities of
.Xr ifconfig 8
for configuring virtual wireless interfaces.
Therefore one should consider adding write comminities or loading the
Therefore one should consider adding write communities or loading the
.Nm
module on systems where security is crucial.
.Sh IMPLEMENTATION NOTES

View File

@ -56,7 +56,7 @@ Release Engineering Team, e.g.,
.Fx
7.3-RELEASE and
.Fx
8.0, but not
8.0-RELEASE, but not
.Fx
6.3-STABLE or
.Fx

View File

@ -78,7 +78,7 @@ transfer has been written to the device and before the actual read/write
operation. rs - repeated start; ss - stop start; no - none.
.It Fl n Ar skip_addr
skip address - address(es) to be skipped during bus scan.
The are two ways to specify addresses to ignore: by range 'a..b' or
There are two ways to specify addresses to ignore: by range 'a..b' or
using selected addresses 'a:b:c'. This option is available only when "-s" is
used.
.It Fl o Ar offset

View File

@ -108,7 +108,7 @@ All parameters after this apply to the T1E1 card.
All parameters after this apply to the T3 card.
.El
.Ss Commands for all cards
The following parameters apply to more then one card type.
The following parameters apply to more than one card type.
.Bl -tag -width indent
.It Fl a Ar number
Set Transmitter clock source to
@ -281,7 +281,7 @@ Select RAWIP mode \[em] bypass line protocol code.
.It Fl X
Select line protocol code rather than RAWIP mode.
.It Fl y
Disable SPPP keep-alive packets,
Disable SPPP keep-alive packets.
.It Fl Y
Enable SPPP keep-alive packets.
.It Fl z
@ -512,7 +512,7 @@ Print the status of the on-board T3 DSU \[em] see the
.Sx EXAMPLES
section.
.It Fl S Ar number
Set payload scrambler polynominal to
Set payload scrambler polynomial to
.Ar number :
.Pp
.Bl -column "9" -offset 1m -compact

View File

@ -76,7 +76,7 @@ defined by NFSV4_CBPORT in /usr/include/fs/nfs/nfs.h, unless
has been specified.
For more information on what callbacks and Open Delegations do, see
.%T "Network File System (NFS) Version 4 Protocol" ,
RFC3530 .
RFC3530.
.Pp
The
.Nm

View File

@ -327,5 +327,5 @@ NFS V4 stable restart file
At this time, there is no recall of delegations for local file system
operations.
As such, delegations should only be enabled for file systems
that are being used soley as NFS export volumes and are not being accessed
that are being used solely as NFS export volumes and are not being accessed
via local system calls nor services such as Samba.

View File

@ -58,7 +58,7 @@ can be any one of the following:
.It help
Display a list of all commands.
.It help Ar command
Dispay the help data for the specified command.
Display the help data for the specified command.
.It disk-list
Provide a listing of the storage devices detected on this system.
.It disk-part Ar disk
@ -117,4 +117,4 @@ first appeared in
This utility was written to install PC-BSD and has seen limited use as an
installer for FreeBSD. It's likely that usage to install FreeBSD will expose
edge cases that PC-BSD doesn't, as well as generate feature requests based
on unforseen needs.
on unforeseen needs.

View File

@ -172,7 +172,7 @@ of the form
Ns Va function Ns ,
.Li pci Ns Va bus Ns \&: Ns Va device Ns \&: Ns Va function Ns , or
.Li pci Ns Va bus Ns \&: Ns Va device Ns .
In case of an abrigded form, omitted selector components are assumed to be 0.
In case of an abridged form, omitted selector components are assumed to be 0.
An optional leading device name followed by @ and an optional final colon
will be ignored; this is so that the first column in the output of
.Nm

View File

@ -97,7 +97,7 @@ operate on the directory
or as given in the configuration file.)
.It Fl s Ar server
Fetch files from the specified server or server pool.
(default: portsnap.FreeBSD.org , or as given in the
(default: portsnap.FreeBSD.org, or as given in the
configuration file.)
.It path
For