ok, but also screwey -> screwy.

jmc

On 2 January 2022 12:13:23 GMT, Jonathan Gray <j...@jsg.id.au> wrote:
>diff --git sys/net/fq_codel.c sys/net/fq_codel.c
>index e5d103cdf57..e614f4c56a7 100644
>--- sys/net/fq_codel.c
>+++ sys/net/fq_codel.c
>@@ -188,7 +188,7 @@ static const int64_t codel_target = 5000000;
> /* Grace period after last drop, 16 100ms intervals */
> static const int64_t codel_grace = 1600000000;
> 
>-/* First 399 "100 / sqrt(x)" intervarls, ns precision */
>+/* First 399 "100 / sqrt(x)" intervals, ns precision */
> static const uint32_t codel_intervals[] = {
>       100000000, 70710678, 57735027, 50000000, 44721360, 40824829, 37796447,
>       35355339,  33333333, 31622777, 30151134, 28867513, 27735010, 26726124,
>diff --git sys/net/if.c sys/net/if.c
>index 91bacd06a77..f004c5ed78b 100644
>--- sys/net/if.c
>+++ sys/net/if.c
>@@ -258,7 +258,7 @@ ifinit(void)
> 
>       /*
>        * most machines boot with 4 or 5 interfaces, so size the initial map
>-       * to accomodate this
>+       * to accommodate this
>        */
>       if_idxmap_init(8);
> 
>@@ -744,7 +744,7 @@ if_input_local(struct ifnet *ifp, struct mbuf *m, 
>sa_family_t af)
> 
> #if NBPFILTER > 0
>       /*
>-       * Only send packets to bpf if they are destinated to local
>+       * Only send packets to bpf if they are destined to local
>        * addresses.
>        *
>        * if_input_local() is also called for SIMPLEX interfaces to
>diff --git sys/net/if_ppp.h sys/net/if_ppp.h
>index eb13a36f2c0..4e9ea0942e1 100644
>--- sys/net/if_ppp.h
>+++ sys/net/if_ppp.h
>@@ -93,7 +93,7 @@
>  */
> 
> struct npioctl {
>-    int               protocol;       /* PPP procotol, e.g. PPP_IP */
>+    int               protocol;       /* PPP protocol, e.g. PPP_IP */
>     enum NPmode       mode;
> };
> 
>diff --git sys/net/if_spppsubr.c sys/net/if_spppsubr.c
>index 3982c29bbdc..8a4da24a14b 100644
>--- sys/net/if_spppsubr.c
>+++ sys/net/if_spppsubr.c
>@@ -4015,7 +4015,7 @@ sppp_pap_scr(struct sppp *sp)
> /*
>  * Send a PAP or CHAP proto packet.
>  *
>- * Varadic function, each of the elements for the ellipsis is of type
>+ * Variadic function, each of the elements for the ellipsis is of type
>  * ``size_t mlen, const u_char *msg''.  Processing will stop iff
>  * mlen == 0.
>  */
>diff --git sys/net/if_types.h sys/net/if_types.h
>index 64400f95c54..f3da11c6b5f 100644
>--- sys/net/if_types.h
>+++ sys/net/if_types.h
>@@ -205,7 +205,7 @@
> #define       IFT_USB                    0xa0 /* USB Interface */
> #define       IFT_IEEE8023ADLAG          0xa1 /* IEEE 802.3ad Link Aggregate*/
> #define       IFT_BGPPOLICYACCOUNTING    0xa2 /* BGP Policy Accounting */
>-#define       IFT_FRF16MFRBUNDLE         0xa3 /* FRF.16 Multilik Frame Relay*/
>+#define       IFT_FRF16MFRBUNDLE         0xa3 /* FRF.16 Multilink Frame 
>Relay*/
> #define       IFT_H323GATEKEEPER         0xa4 /* H323 Gatekeeper */
> #define       IFT_H323PROXY              0xa5 /* H323 Voice and Video Proxy */
> #define       IFT_MPLS                   0xa6 /* MPLS */
>diff --git sys/net/if_wg.c sys/net/if_wg.c
>index 996ab20d9e4..816ce8fc5ed 100644
>--- sys/net/if_wg.c
>+++ sys/net/if_wg.c
>@@ -1621,7 +1621,7 @@ wg_decap(struct wg_softc *sc, struct mbuf *m)
>        * IP header, we just worry about the sizeof and the version, so we can
>        * read the source address in wg_aip_lookup.
>        *
>-       * We also need to trim the packet, as it was likely paddded before
>+       * We also need to trim the packet, as it was likely padded before
>        * encryption. While we could drop it here, it will be more helpful to
>        * pass it to bpf_mtap and use the counters that people are expecting
>        * in ipv4_input and ipv6_input. We can rely on ipv4_input and
>diff --git sys/net/pf.c sys/net/pf.c
>index 4d497212304..f84e2055fc6 100644
>--- sys/net/pf.c
>+++ sys/net/pf.c
>@@ -1341,7 +1341,7 @@ pf_state_expires(const struct pf_state *state, uint8_t 
>stimeout)
>        * state->timeout by having the caller do the read (and any
>        * chacks it needs to do on the same variable) and then pass
>        * their view of the timeout in here for this function to use.
>-       * the only consequnce of using a stale timeout value is
>+       * the only consequence of using a stale timeout value is
>        * that the state won't be a candidate for purging until the
>        * next pass of the purge task.
>        */
>diff --git sys/net/pfvar_priv.h sys/net/pfvar_priv.h
>index 5bba87b19a8..ffdd7ee959f 100644
>--- sys/net/pfvar_priv.h
>+++ sys/net/pfvar_priv.h
>@@ -176,7 +176,7 @@ struct pf_pdesc {
>       u_int32_t        off;           /* protocol header offset */
>       u_int32_t        hdrlen;        /* protocol header length */
>       u_int32_t        p_len;         /* length of protocol payload */
>-      u_int32_t        extoff;        /* extentsion header offset */
>+      u_int32_t        extoff;        /* extension header offset */
>       u_int32_t        fragoff;       /* fragment header offset */
>       u_int32_t        jumbolen;      /* length from v6 jumbo header */
>       u_int32_t        badopts;       /* v4 options or v6 routing headers */
>diff --git sys/net/pipex.c sys/net/pipex.c
>index e2d0c5c958d..92dbeea8068 100644
>--- sys/net/pipex.c
>+++ sys/net/pipex.c
>@@ -199,7 +199,7 @@ pipex_init_session(struct pipex_session **rsession,
>       struct ifnet *over_ifp = NULL;
> #endif
> 
>-      /* Checks requeted parameters.  */
>+      /* Checks requested parameters.  */
>       switch (req->pr_protocol) {
> #ifdef PIPEX_PPPOE
>       case PIPEX_PROTO_PPPOE:
>@@ -1033,7 +1033,7 @@ pipex_common_input(struct pipex_session *session, struct 
>mbuf *m0, int hlen,
>       }
> 
>       /* ok,  The packet is for PIPEX */
>-      m_adj(m0, hlen);/* cut off the tunnle protocol header */
>+      m_adj(m0, hlen);/* cut off the tunnel protocol header */
> 
>       /* ensure the mbuf length equals the PPP frame length */
>       if (m0->m_pkthdr.len < plen)
>diff --git sys/net/pipex.h sys/net/pipex.h
>index b29903beac7..149660d367b 100644
>--- sys/net/pipex.h
>+++ sys/net/pipex.h
>@@ -51,7 +51,7 @@ struct pipex_mppe_req {
>       int16_t stateless;                      /* mppe key mode.
>                                                  1 for stateless */
>       int16_t keylenbits;                     /* mppe key length(in bits)*/
>-      u_char  master_key[PIPEX_MPPE_KEYLEN];  /* mppe mastter key */
>+      u_char  master_key[PIPEX_MPPE_KEYLEN];  /* mppe master key */
> };
> 
> /* pipex statistics */
>diff --git sys/net/pipex_local.h sys/net/pipex_local.h
>index dd940b6a74a..35e2821b99a 100644
>--- sys/net/pipex_local.h
>+++ sys/net/pipex_local.h
>@@ -70,7 +70,7 @@ struct pipex_mppe {
>               reserved:14;
>       int16_t keylenbits;                     /* [I] key length */
>       int16_t keylen;                         /* [I] */
>-      uint16_t coher_cnt;                     /* [m] cohency counter */
>+      uint16_t coher_cnt;                     /* [m] coherency counter */
>       struct  rc4_ctx rc4ctx;                 /* [m] */
>       u_char master_key[PIPEX_MPPE_KEYLEN];   /* [m] master key of MPPE */
>       u_char session_key[PIPEX_MPPE_KEYLEN];  /* [m] session key of MPPE */
>@@ -153,7 +153,7 @@ struct pipex_l2tp_session {
> 
> struct cpumem;
> 
>-/* pppac ip-extension sessoin table */
>+/* pppac ip-extension session table */
> struct pipex_session {
>       struct radix_node       ps4_rn[2];
>                                       /* [N] tree glue, and other values */
>diff --git sys/net/ppp_tty.c sys/net/ppp_tty.c
>index 124b9df59ac..bd3d5f53887 100644
>--- sys/net/ppp_tty.c
>+++ sys/net/ppp_tty.c
>@@ -286,7 +286,7 @@ pppread(struct tty *tp, struct uio *uio, int flag)
>     if (sc == NULL)
>       return 0;
>     /*
>-     * Loop waiting for input, checking that nothing disasterous
>+     * Loop waiting for input, checking that nothing disastrous
>      * happens in the meantime.
>      */
>     s = spltty();
>diff --git sys/net/radix.c sys/net/radix.c
>index 37dc255537f..c9dee2733ba 100644
>--- sys/net/radix.c
>+++ sys/net/radix.c
>@@ -709,7 +709,7 @@ rn_link_dupedkey(struct radix_node *tt, struct radix_node 
>*x, int before)
>  * - leaf nodes with possible rn_dupedkey list
>  * - internal nodes with maybe their own mklist
>  * If the mask of the route is bigger than the current branch bit then
>- * a rn_mklist entrie needs to be made.
>+ * a rn_mklist entry needs to be made.
>  */
> void
> rn_fixup_nodes(struct radix_node *tt)
>diff --git sys/net/route.c sys/net/route.c
>index 73bd6f53639..fa3fe519a81 100644
>--- sys/net/route.c
>+++ sys/net/route.c
>@@ -1843,7 +1843,7 @@ db_print_ifa(struct ifaddr *ifa)
> }
> 
> /*
>- * Function to pass to rtalble_walk().
>+ * Function to pass to rtable_walk().
>  * Return non-zero error to abort walk.
>  */
> int
>diff --git sys/net/rtable.c sys/net/rtable.c
>index 4cdd303200a..721e32b7f7a 100644
>--- sys/net/rtable.c
>+++ sys/net/rtable.c
>@@ -62,7 +62,7 @@ struct rtmap {
> /*
>  * Array of rtableid -> rdomain mapping.
>  *
>- * Only used for the first index as describbed above.
>+ * Only used for the first index as described above.
>  */
> struct dommp {
>       unsigned int       limit;
>diff --git sys/netinet/ip_ipip.c sys/netinet/ip_ipip.c
>index 9bcde8d533d..ed7a768c169 100644
>--- sys/netinet/ip_ipip.c
>+++ sys/netinet/ip_ipip.c
>@@ -356,7 +356,7 @@ ipip_output(struct mbuf **mp, struct tdb *tdb)
>                   tdb->tdb_src.sin.sin_addr.s_addr == INADDR_ANY ||
>                   tdb->tdb_dst.sin.sin_addr.s_addr == INADDR_ANY) {
> 
>-                      DPRINTF("unspecified tunnel endpoind address "
>+                      DPRINTF("unspecified tunnel endpoint address "
>                           "in SA %s/%08x",
>                           ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)),
>                           ntohl(tdb->tdb_spi));
>@@ -445,7 +445,7 @@ ipip_output(struct mbuf **mp, struct tdb *tdb)
>                   tdb->tdb_src.sa.sa_family != AF_INET6 ||
>                   IN6_IS_ADDR_UNSPECIFIED(&tdb->tdb_src.sin6.sin6_addr)) {
> 
>-                      DPRINTF("unspecified tunnel endpoind address "
>+                      DPRINTF("unspecified tunnel endpoint address "
>                           "in SA %s/%08x",
>                           ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)),
>                           ntohl(tdb->tdb_spi));
>diff --git sys/netinet/ipsec_output.c sys/netinet/ipsec_output.c
>index 58298d3ad91..cd40a864e20 100644
>--- sys/netinet/ipsec_output.c
>+++ sys/netinet/ipsec_output.c
>@@ -276,7 +276,7 @@ ipsp_process_packet(struct mbuf *m, struct tdb *tdb, int 
>af, int tunalready)
> 
>       /*
>        * If this is just an IP-IP TDB and we're told there's already an
>-       * encapsulation header or ipip_output() has encapsulted it, move on.
>+       * encapsulation header or ipip_output() has encapsulated it, move on.
>        */
>       if (tdb->tdb_xform->xf_type == XF_IP4)
>               return ipsp_process_done(m, tdb);
>diff --git sys/netinet/tcp_input.c sys/netinet/tcp_input.c
>index 5b8af422222..f733e4e99e6 100644
>--- sys/netinet/tcp_input.c
>+++ sys/netinet/tcp_input.c
>@@ -3444,7 +3444,7 @@ syn_cache_lookup(struct sockaddr *src, struct sockaddr 
>*dst,
>  *
>  *    -1      We were unable to create the new connection, and are
>  *            aborting it.  An ACK,RST is being sent to the peer
>- *            (unless we got screwey sequence numbners; see below),
>+ *            (unless we got screwey sequence numbers; see below),
>  *            because the 3-way handshake has been completed.  Caller
>  *            should not free the mbuf, since we may be using it.  If
>  *            we are not, we will free it.
>diff --git sys/netinet/tcp_subr.c sys/netinet/tcp_subr.c
>index 1597852ae25..e8e345b86c4 100644
>--- sys/netinet/tcp_subr.c
>+++ sys/netinet/tcp_subr.c
>@@ -667,7 +667,7 @@ tcp6_ctlinput(int cmd, struct sockaddr *sa, u_int rdomain, 
>void *d)
>                       /*
>                        * Depending on the value of "valid" and routing table
>                        * size (mtudisc_{hi,lo}wat), we will:
>-                       * - recalcurate the new MTU and create the
>+                       * - recalculate the new MTU and create the
>                        *   corresponding routing entry, or
>                        * - ignore the MTU change notification.
>                        */
>diff --git sys/netinet/tcp_timer.c sys/netinet/tcp_timer.c
>index 5f3ffdf40fe..d37a76c14b5 100644
>--- sys/netinet/tcp_timer.c
>+++ sys/netinet/tcp_timer.c
>@@ -529,7 +529,7 @@ tcp_timer_reaper(void *arg)
>       /*
>        * This timer is necessary to delay the pool_put() after all timers
>        * have finished, even if they were sleeping to grab the net lock.
>-       * Putting the pool_put() in a timer is sufficinet as all timers run
>+       * Putting the pool_put() in a timer is sufficient as all timers run
>        * from the same timeout thread.  Note that neither softnet thread nor
>        * user process may access the tcpcb after arming the reaper timer.
>        * Freeing may run in parallel as it does not grab the net lock.
>diff --git sys/netinet6/icmp6.c sys/netinet6/icmp6.c
>index bdba0978bfb..b1a937daf44 100644
>--- sys/netinet6/icmp6.c
>+++ sys/netinet6/icmp6.c
>@@ -914,7 +914,7 @@ icmp6_notify_error(struct mbuf *m, int off, int icmp6len, 
>int code)
>               icmp6dst.sin6_scope_id = in6_addr2scopeid(m->m_pkthdr.ph_ifidx,
>                   &icmp6dst.sin6_addr);
>               if (in6_embedscope(&icmp6dst.sin6_addr, &icmp6dst, NULL)) {
>-                      /* should be impossbile */
>+                      /* should be impossible */
>                       nd6log((LOG_DEBUG,
>                           "icmp6_notify_error: in6_embedscope failed\n"));
>                       goto freeit;
>@@ -931,7 +931,7 @@ icmp6_notify_error(struct mbuf *m, int off, int icmp6len, 
>int code)
>               icmp6src.sin6_scope_id = in6_addr2scopeid(m->m_pkthdr.ph_ifidx,
>                   &icmp6src.sin6_addr);
>               if (in6_embedscope(&icmp6src.sin6_addr, &icmp6src, NULL)) {
>-                      /* should be impossbile */
>+                      /* should be impossible */
>                       nd6log((LOG_DEBUG,
>                           "icmp6_notify_error: in6_embedscope failed\n"));
>                       goto freeit;
>diff --git sys/netinet6/in6.c sys/netinet6/in6.c
>index 1721aa191d7..42b392215c4 100644
>--- sys/netinet6/in6.c
>+++ sys/netinet6/in6.c
>@@ -959,7 +959,7 @@ in6_unlink_ifa(struct in6_ifaddr *ia6, struct ifnet *ifp)
> }
> 
> /*
>- * Initialize an interface's intetnet6 address
>+ * Initialize an interface's inet6 address
>  * and routing table entry.
>  */
> int
>diff --git sys/netinet6/in6_var.h sys/netinet6/in6_var.h
>index e38082c9c3c..2a13f5bf978 100644
>--- sys/netinet6/in6_var.h
>+++ sys/netinet6/in6_var.h
>@@ -133,7 +133,7 @@ struct in6_ifstat {
>       u_int64_t ifs6_out_forward;     /* # of datagrams forwarded */
>                                       /* NOTE: increment on outgoing if */
>       u_int64_t ifs6_out_request;     /* # of outgoing datagrams from ULP */
>-                                      /* NOTE: does not include forwrads */
>+                                      /* NOTE: does not include forwards */
>       u_int64_t ifs6_out_discard;     /* # of discarded datagrams */
>       u_int64_t ifs6_out_fragok;      /* # of datagrams fragmented */
>       u_int64_t ifs6_out_fragfail;    /* # of datagrams failed on fragment */
>diff --git sys/netinet6/ip6_forward.c sys/netinet6/ip6_forward.c
>index 4b933ec6852..99eb09d4050 100644
>--- sys/netinet6/ip6_forward.c
>+++ sys/netinet6/ip6_forward.c
>@@ -277,7 +277,7 @@ reroute:
> 
>       /*
>        * Fake scoped addresses. Note that even link-local source or
>-       * destinaion can appear, if the originating node just sends the
>+       * destination can appear, if the originating node just sends the
>        * packet to us (without address resolution for the destination).
>        * Since both icmp6_error and icmp6_redirect_output fill the embedded
>        * link identifiers, we can do this stuff after making a copy for
>diff --git sys/netinet6/ip6_input.c sys/netinet6/ip6_input.c
>index 142477d4fdf..2f805c60d88 100644
>--- sys/netinet6/ip6_input.c
>+++ sys/netinet6/ip6_input.c
>@@ -296,7 +296,7 @@ ip6_input_if(struct mbuf **mp, int *offp, int nxt, int af, 
>struct ifnet *ifp)
> 
>       /*
>        * If the packet has been received on a loopback interface it
>-       * can be destinated to any local address, not necessarily to
>+       * can be destined any local address, not necessarily to
>        * an address configured on `ifp'.
>        */
>       if (ifp->if_flags & IFF_LOOPBACK) {
>diff --git sys/netinet6/ip6_output.c sys/netinet6/ip6_output.c
>index 9141f2e6652..b11efd6691b 100644
>--- sys/netinet6/ip6_output.c
>+++ sys/netinet6/ip6_output.c
>@@ -655,7 +655,7 @@ reroute:
> #endif
> 
>       /*
>-       * If the packet is not going on the wire it can be destinated
>+       * If the packet is not going on the wire it can be destined
>        * to any local address.  In this case do not clear its scopes
>        * to let ip6_input() find a matching local route.
>        */
>diff --git sys/netinet6/ip6protosw.h sys/netinet6/ip6protosw.h
>index af6e2f33757..8e7da7e7276 100644
>--- sys/netinet6/ip6protosw.h
>+++ sys/netinet6/ip6protosw.h
>@@ -83,7 +83,7 @@ struct in6_addr;
>  * argument type for the last arg of pr_ctlinput().
>  * should be consulted only with AF_INET6 family.
>  *
>- * IPv6 ICMP IPv6 [exthdrs] finalhdr paylaod
>+ * IPv6 ICMP IPv6 [exthdrs] finalhdr payload
>  * ^    ^    ^              ^
>  * |    |    ip6c_ip6       ip6c_off
>  * |    ip6c_icmp6
>

Reply via email to