diff --git sys/net/fq_codel.c sys/net/fq_codel.c
index e5d103cdf57..e614f4c56a7 100644
--- sys/net/fq_codel.c
+++ sys/net/fq_codel.c
@@ -188,7 +188,7 @@ static const int64_t codel_target = 5000000;
 /* Grace period after last drop, 16 100ms intervals */
 static const int64_t codel_grace = 1600000000;
 
-/* First 399 "100 / sqrt(x)" intervarls, ns precision */
+/* First 399 "100 / sqrt(x)" intervals, ns precision */
 static const uint32_t codel_intervals[] = {
        100000000, 70710678, 57735027, 50000000, 44721360, 40824829, 37796447,
        35355339,  33333333, 31622777, 30151134, 28867513, 27735010, 26726124,
diff --git sys/net/if.c sys/net/if.c
index 91bacd06a77..f004c5ed78b 100644
--- sys/net/if.c
+++ sys/net/if.c
@@ -258,7 +258,7 @@ ifinit(void)
 
        /*
         * most machines boot with 4 or 5 interfaces, so size the initial map
-        * to accomodate this
+        * to accommodate this
         */
        if_idxmap_init(8);
 
@@ -744,7 +744,7 @@ if_input_local(struct ifnet *ifp, struct mbuf *m, 
sa_family_t af)
 
 #if NBPFILTER > 0
        /*
-        * Only send packets to bpf if they are destinated to local
+        * Only send packets to bpf if they are destined to local
         * addresses.
         *
         * if_input_local() is also called for SIMPLEX interfaces to
diff --git sys/net/if_ppp.h sys/net/if_ppp.h
index eb13a36f2c0..4e9ea0942e1 100644
--- sys/net/if_ppp.h
+++ sys/net/if_ppp.h
@@ -93,7 +93,7 @@
  */
 
 struct npioctl {
-    int                protocol;       /* PPP procotol, e.g. PPP_IP */
+    int                protocol;       /* PPP protocol, e.g. PPP_IP */
     enum NPmode        mode;
 };
 
diff --git sys/net/if_spppsubr.c sys/net/if_spppsubr.c
index 3982c29bbdc..8a4da24a14b 100644
--- sys/net/if_spppsubr.c
+++ sys/net/if_spppsubr.c
@@ -4015,7 +4015,7 @@ sppp_pap_scr(struct sppp *sp)
 /*
  * Send a PAP or CHAP proto packet.
  *
- * Varadic function, each of the elements for the ellipsis is of type
+ * Variadic function, each of the elements for the ellipsis is of type
  * ``size_t mlen, const u_char *msg''.  Processing will stop iff
  * mlen == 0.
  */
diff --git sys/net/if_types.h sys/net/if_types.h
index 64400f95c54..f3da11c6b5f 100644
--- sys/net/if_types.h
+++ sys/net/if_types.h
@@ -205,7 +205,7 @@
 #define        IFT_USB                    0xa0 /* USB Interface */
 #define        IFT_IEEE8023ADLAG          0xa1 /* IEEE 802.3ad Link Aggregate*/
 #define        IFT_BGPPOLICYACCOUNTING    0xa2 /* BGP Policy Accounting */
-#define        IFT_FRF16MFRBUNDLE         0xa3 /* FRF.16 Multilik Frame Relay*/
+#define        IFT_FRF16MFRBUNDLE         0xa3 /* FRF.16 Multilink Frame 
Relay*/
 #define        IFT_H323GATEKEEPER         0xa4 /* H323 Gatekeeper */
 #define        IFT_H323PROXY              0xa5 /* H323 Voice and Video Proxy */
 #define        IFT_MPLS                   0xa6 /* MPLS */
diff --git sys/net/if_wg.c sys/net/if_wg.c
index 996ab20d9e4..816ce8fc5ed 100644
--- sys/net/if_wg.c
+++ sys/net/if_wg.c
@@ -1621,7 +1621,7 @@ wg_decap(struct wg_softc *sc, struct mbuf *m)
         * IP header, we just worry about the sizeof and the version, so we can
         * read the source address in wg_aip_lookup.
         *
-        * We also need to trim the packet, as it was likely paddded before
+        * We also need to trim the packet, as it was likely padded before
         * encryption. While we could drop it here, it will be more helpful to
         * pass it to bpf_mtap and use the counters that people are expecting
         * in ipv4_input and ipv6_input. We can rely on ipv4_input and
diff --git sys/net/pf.c sys/net/pf.c
index 4d497212304..f84e2055fc6 100644
--- sys/net/pf.c
+++ sys/net/pf.c
@@ -1341,7 +1341,7 @@ pf_state_expires(const struct pf_state *state, uint8_t 
stimeout)
         * state->timeout by having the caller do the read (and any
         * chacks it needs to do on the same variable) and then pass
         * their view of the timeout in here for this function to use.
-        * the only consequnce of using a stale timeout value is
+        * the only consequence of using a stale timeout value is
         * that the state won't be a candidate for purging until the
         * next pass of the purge task.
         */
diff --git sys/net/pfvar_priv.h sys/net/pfvar_priv.h
index 5bba87b19a8..ffdd7ee959f 100644
--- sys/net/pfvar_priv.h
+++ sys/net/pfvar_priv.h
@@ -176,7 +176,7 @@ struct pf_pdesc {
        u_int32_t        off;           /* protocol header offset */
        u_int32_t        hdrlen;        /* protocol header length */
        u_int32_t        p_len;         /* length of protocol payload */
-       u_int32_t        extoff;        /* extentsion header offset */
+       u_int32_t        extoff;        /* extension header offset */
        u_int32_t        fragoff;       /* fragment header offset */
        u_int32_t        jumbolen;      /* length from v6 jumbo header */
        u_int32_t        badopts;       /* v4 options or v6 routing headers */
diff --git sys/net/pipex.c sys/net/pipex.c
index e2d0c5c958d..92dbeea8068 100644
--- sys/net/pipex.c
+++ sys/net/pipex.c
@@ -199,7 +199,7 @@ pipex_init_session(struct pipex_session **rsession,
        struct ifnet *over_ifp = NULL;
 #endif
 
-       /* Checks requeted parameters.  */
+       /* Checks requested parameters.  */
        switch (req->pr_protocol) {
 #ifdef PIPEX_PPPOE
        case PIPEX_PROTO_PPPOE:
@@ -1033,7 +1033,7 @@ pipex_common_input(struct pipex_session *session, struct 
mbuf *m0, int hlen,
        }
 
        /* ok,  The packet is for PIPEX */
-       m_adj(m0, hlen);/* cut off the tunnle protocol header */
+       m_adj(m0, hlen);/* cut off the tunnel protocol header */
 
        /* ensure the mbuf length equals the PPP frame length */
        if (m0->m_pkthdr.len < plen)
diff --git sys/net/pipex.h sys/net/pipex.h
index b29903beac7..149660d367b 100644
--- sys/net/pipex.h
+++ sys/net/pipex.h
@@ -51,7 +51,7 @@ struct pipex_mppe_req {
        int16_t stateless;                      /* mppe key mode.
                                                   1 for stateless */
        int16_t keylenbits;                     /* mppe key length(in bits)*/
-       u_char  master_key[PIPEX_MPPE_KEYLEN];  /* mppe mastter key */
+       u_char  master_key[PIPEX_MPPE_KEYLEN];  /* mppe master key */
 };
 
 /* pipex statistics */
diff --git sys/net/pipex_local.h sys/net/pipex_local.h
index dd940b6a74a..35e2821b99a 100644
--- sys/net/pipex_local.h
+++ sys/net/pipex_local.h
@@ -70,7 +70,7 @@ struct pipex_mppe {
                reserved:14;
        int16_t keylenbits;                     /* [I] key length */
        int16_t keylen;                         /* [I] */
-       uint16_t coher_cnt;                     /* [m] cohency counter */
+       uint16_t coher_cnt;                     /* [m] coherency counter */
        struct  rc4_ctx rc4ctx;                 /* [m] */
        u_char master_key[PIPEX_MPPE_KEYLEN];   /* [m] master key of MPPE */
        u_char session_key[PIPEX_MPPE_KEYLEN];  /* [m] session key of MPPE */
@@ -153,7 +153,7 @@ struct pipex_l2tp_session {
 
 struct cpumem;
 
-/* pppac ip-extension sessoin table */
+/* pppac ip-extension session table */
 struct pipex_session {
        struct radix_node       ps4_rn[2];
                                        /* [N] tree glue, and other values */
diff --git sys/net/ppp_tty.c sys/net/ppp_tty.c
index 124b9df59ac..bd3d5f53887 100644
--- sys/net/ppp_tty.c
+++ sys/net/ppp_tty.c
@@ -286,7 +286,7 @@ pppread(struct tty *tp, struct uio *uio, int flag)
     if (sc == NULL)
        return 0;
     /*
-     * Loop waiting for input, checking that nothing disasterous
+     * Loop waiting for input, checking that nothing disastrous
      * happens in the meantime.
      */
     s = spltty();
diff --git sys/net/radix.c sys/net/radix.c
index 37dc255537f..c9dee2733ba 100644
--- sys/net/radix.c
+++ sys/net/radix.c
@@ -709,7 +709,7 @@ rn_link_dupedkey(struct radix_node *tt, struct radix_node 
*x, int before)
  * - leaf nodes with possible rn_dupedkey list
  * - internal nodes with maybe their own mklist
  * If the mask of the route is bigger than the current branch bit then
- * a rn_mklist entrie needs to be made.
+ * a rn_mklist entry needs to be made.
  */
 void
 rn_fixup_nodes(struct radix_node *tt)
diff --git sys/net/route.c sys/net/route.c
index 73bd6f53639..fa3fe519a81 100644
--- sys/net/route.c
+++ sys/net/route.c
@@ -1843,7 +1843,7 @@ db_print_ifa(struct ifaddr *ifa)
 }
 
 /*
- * Function to pass to rtalble_walk().
+ * Function to pass to rtable_walk().
  * Return non-zero error to abort walk.
  */
 int
diff --git sys/net/rtable.c sys/net/rtable.c
index 4cdd303200a..721e32b7f7a 100644
--- sys/net/rtable.c
+++ sys/net/rtable.c
@@ -62,7 +62,7 @@ struct rtmap {
 /*
  * Array of rtableid -> rdomain mapping.
  *
- * Only used for the first index as describbed above.
+ * Only used for the first index as described above.
  */
 struct dommp {
        unsigned int       limit;
diff --git sys/netinet/ip_ipip.c sys/netinet/ip_ipip.c
index 9bcde8d533d..ed7a768c169 100644
--- sys/netinet/ip_ipip.c
+++ sys/netinet/ip_ipip.c
@@ -356,7 +356,7 @@ ipip_output(struct mbuf **mp, struct tdb *tdb)
                    tdb->tdb_src.sin.sin_addr.s_addr == INADDR_ANY ||
                    tdb->tdb_dst.sin.sin_addr.s_addr == INADDR_ANY) {
 
-                       DPRINTF("unspecified tunnel endpoind address "
+                       DPRINTF("unspecified tunnel endpoint address "
                            "in SA %s/%08x",
                            ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)),
                            ntohl(tdb->tdb_spi));
@@ -445,7 +445,7 @@ ipip_output(struct mbuf **mp, struct tdb *tdb)
                    tdb->tdb_src.sa.sa_family != AF_INET6 ||
                    IN6_IS_ADDR_UNSPECIFIED(&tdb->tdb_src.sin6.sin6_addr)) {
 
-                       DPRINTF("unspecified tunnel endpoind address "
+                       DPRINTF("unspecified tunnel endpoint address "
                            "in SA %s/%08x",
                            ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)),
                            ntohl(tdb->tdb_spi));
diff --git sys/netinet/ipsec_output.c sys/netinet/ipsec_output.c
index 58298d3ad91..cd40a864e20 100644
--- sys/netinet/ipsec_output.c
+++ sys/netinet/ipsec_output.c
@@ -276,7 +276,7 @@ ipsp_process_packet(struct mbuf *m, struct tdb *tdb, int 
af, int tunalready)
 
        /*
         * If this is just an IP-IP TDB and we're told there's already an
-        * encapsulation header or ipip_output() has encapsulted it, move on.
+        * encapsulation header or ipip_output() has encapsulated it, move on.
         */
        if (tdb->tdb_xform->xf_type == XF_IP4)
                return ipsp_process_done(m, tdb);
diff --git sys/netinet/tcp_input.c sys/netinet/tcp_input.c
index 5b8af422222..f733e4e99e6 100644
--- sys/netinet/tcp_input.c
+++ sys/netinet/tcp_input.c
@@ -3444,7 +3444,7 @@ syn_cache_lookup(struct sockaddr *src, struct sockaddr 
*dst,
  *
  *     -1      We were unable to create the new connection, and are
  *             aborting it.  An ACK,RST is being sent to the peer
- *             (unless we got screwey sequence numbners; see below),
+ *             (unless we got screwey sequence numbers; see below),
  *             because the 3-way handshake has been completed.  Caller
  *             should not free the mbuf, since we may be using it.  If
  *             we are not, we will free it.
diff --git sys/netinet/tcp_subr.c sys/netinet/tcp_subr.c
index 1597852ae25..e8e345b86c4 100644
--- sys/netinet/tcp_subr.c
+++ sys/netinet/tcp_subr.c
@@ -667,7 +667,7 @@ tcp6_ctlinput(int cmd, struct sockaddr *sa, u_int rdomain, 
void *d)
                        /*
                         * Depending on the value of "valid" and routing table
                         * size (mtudisc_{hi,lo}wat), we will:
-                        * - recalcurate the new MTU and create the
+                        * - recalculate the new MTU and create the
                         *   corresponding routing entry, or
                         * - ignore the MTU change notification.
                         */
diff --git sys/netinet/tcp_timer.c sys/netinet/tcp_timer.c
index 5f3ffdf40fe..d37a76c14b5 100644
--- sys/netinet/tcp_timer.c
+++ sys/netinet/tcp_timer.c
@@ -529,7 +529,7 @@ tcp_timer_reaper(void *arg)
        /*
         * This timer is necessary to delay the pool_put() after all timers
         * have finished, even if they were sleeping to grab the net lock.
-        * Putting the pool_put() in a timer is sufficinet as all timers run
+        * Putting the pool_put() in a timer is sufficient as all timers run
         * from the same timeout thread.  Note that neither softnet thread nor
         * user process may access the tcpcb after arming the reaper timer.
         * Freeing may run in parallel as it does not grab the net lock.
diff --git sys/netinet6/icmp6.c sys/netinet6/icmp6.c
index bdba0978bfb..b1a937daf44 100644
--- sys/netinet6/icmp6.c
+++ sys/netinet6/icmp6.c
@@ -914,7 +914,7 @@ icmp6_notify_error(struct mbuf *m, int off, int icmp6len, 
int code)
                icmp6dst.sin6_scope_id = in6_addr2scopeid(m->m_pkthdr.ph_ifidx,
                    &icmp6dst.sin6_addr);
                if (in6_embedscope(&icmp6dst.sin6_addr, &icmp6dst, NULL)) {
-                       /* should be impossbile */
+                       /* should be impossible */
                        nd6log((LOG_DEBUG,
                            "icmp6_notify_error: in6_embedscope failed\n"));
                        goto freeit;
@@ -931,7 +931,7 @@ icmp6_notify_error(struct mbuf *m, int off, int icmp6len, 
int code)
                icmp6src.sin6_scope_id = in6_addr2scopeid(m->m_pkthdr.ph_ifidx,
                    &icmp6src.sin6_addr);
                if (in6_embedscope(&icmp6src.sin6_addr, &icmp6src, NULL)) {
-                       /* should be impossbile */
+                       /* should be impossible */
                        nd6log((LOG_DEBUG,
                            "icmp6_notify_error: in6_embedscope failed\n"));
                        goto freeit;
diff --git sys/netinet6/in6.c sys/netinet6/in6.c
index 1721aa191d7..42b392215c4 100644
--- sys/netinet6/in6.c
+++ sys/netinet6/in6.c
@@ -959,7 +959,7 @@ in6_unlink_ifa(struct in6_ifaddr *ia6, struct ifnet *ifp)
 }
 
 /*
- * Initialize an interface's intetnet6 address
+ * Initialize an interface's inet6 address
  * and routing table entry.
  */
 int
diff --git sys/netinet6/in6_var.h sys/netinet6/in6_var.h
index e38082c9c3c..2a13f5bf978 100644
--- sys/netinet6/in6_var.h
+++ sys/netinet6/in6_var.h
@@ -133,7 +133,7 @@ struct in6_ifstat {
        u_int64_t ifs6_out_forward;     /* # of datagrams forwarded */
                                        /* NOTE: increment on outgoing if */
        u_int64_t ifs6_out_request;     /* # of outgoing datagrams from ULP */
-                                       /* NOTE: does not include forwrads */
+                                       /* NOTE: does not include forwards */
        u_int64_t ifs6_out_discard;     /* # of discarded datagrams */
        u_int64_t ifs6_out_fragok;      /* # of datagrams fragmented */
        u_int64_t ifs6_out_fragfail;    /* # of datagrams failed on fragment */
diff --git sys/netinet6/ip6_forward.c sys/netinet6/ip6_forward.c
index 4b933ec6852..99eb09d4050 100644
--- sys/netinet6/ip6_forward.c
+++ sys/netinet6/ip6_forward.c
@@ -277,7 +277,7 @@ reroute:
 
        /*
         * Fake scoped addresses. Note that even link-local source or
-        * destinaion can appear, if the originating node just sends the
+        * destination can appear, if the originating node just sends the
         * packet to us (without address resolution for the destination).
         * Since both icmp6_error and icmp6_redirect_output fill the embedded
         * link identifiers, we can do this stuff after making a copy for
diff --git sys/netinet6/ip6_input.c sys/netinet6/ip6_input.c
index 142477d4fdf..2f805c60d88 100644
--- sys/netinet6/ip6_input.c
+++ sys/netinet6/ip6_input.c
@@ -296,7 +296,7 @@ ip6_input_if(struct mbuf **mp, int *offp, int nxt, int af, 
struct ifnet *ifp)
 
        /*
         * If the packet has been received on a loopback interface it
-        * can be destinated to any local address, not necessarily to
+        * can be destined any local address, not necessarily to
         * an address configured on `ifp'.
         */
        if (ifp->if_flags & IFF_LOOPBACK) {
diff --git sys/netinet6/ip6_output.c sys/netinet6/ip6_output.c
index 9141f2e6652..b11efd6691b 100644
--- sys/netinet6/ip6_output.c
+++ sys/netinet6/ip6_output.c
@@ -655,7 +655,7 @@ reroute:
 #endif
 
        /*
-        * If the packet is not going on the wire it can be destinated
+        * If the packet is not going on the wire it can be destined
         * to any local address.  In this case do not clear its scopes
         * to let ip6_input() find a matching local route.
         */
diff --git sys/netinet6/ip6protosw.h sys/netinet6/ip6protosw.h
index af6e2f33757..8e7da7e7276 100644
--- sys/netinet6/ip6protosw.h
+++ sys/netinet6/ip6protosw.h
@@ -83,7 +83,7 @@ struct in6_addr;
  * argument type for the last arg of pr_ctlinput().
  * should be consulted only with AF_INET6 family.
  *
- * IPv6 ICMP IPv6 [exthdrs] finalhdr paylaod
+ * IPv6 ICMP IPv6 [exthdrs] finalhdr payload
  * ^    ^    ^              ^
  * |    |    ip6c_ip6       ip6c_off
  * |    ip6c_icmp6

Reply via email to