ok, but also screwey -> screwy. jmc
On 2 January 2022 12:13:23 GMT, Jonathan Gray <j...@jsg.id.au> wrote: >diff --git sys/net/fq_codel.c sys/net/fq_codel.c >index e5d103cdf57..e614f4c56a7 100644 >--- sys/net/fq_codel.c >+++ sys/net/fq_codel.c >@@ -188,7 +188,7 @@ static const int64_t codel_target = 5000000; > /* Grace period after last drop, 16 100ms intervals */ > static const int64_t codel_grace = 1600000000; > >-/* First 399 "100 / sqrt(x)" intervarls, ns precision */ >+/* First 399 "100 / sqrt(x)" intervals, ns precision */ > static const uint32_t codel_intervals[] = { > 100000000, 70710678, 57735027, 50000000, 44721360, 40824829, 37796447, > 35355339, 33333333, 31622777, 30151134, 28867513, 27735010, 26726124, >diff --git sys/net/if.c sys/net/if.c >index 91bacd06a77..f004c5ed78b 100644 >--- sys/net/if.c >+++ sys/net/if.c >@@ -258,7 +258,7 @@ ifinit(void) > > /* > * most machines boot with 4 or 5 interfaces, so size the initial map >- * to accomodate this >+ * to accommodate this > */ > if_idxmap_init(8); > >@@ -744,7 +744,7 @@ if_input_local(struct ifnet *ifp, struct mbuf *m, >sa_family_t af) > > #if NBPFILTER > 0 > /* >- * Only send packets to bpf if they are destinated to local >+ * Only send packets to bpf if they are destined to local > * addresses. > * > * if_input_local() is also called for SIMPLEX interfaces to >diff --git sys/net/if_ppp.h sys/net/if_ppp.h >index eb13a36f2c0..4e9ea0942e1 100644 >--- sys/net/if_ppp.h >+++ sys/net/if_ppp.h >@@ -93,7 +93,7 @@ > */ > > struct npioctl { >- int protocol; /* PPP procotol, e.g. PPP_IP */ >+ int protocol; /* PPP protocol, e.g. PPP_IP */ > enum NPmode mode; > }; > >diff --git sys/net/if_spppsubr.c sys/net/if_spppsubr.c >index 3982c29bbdc..8a4da24a14b 100644 >--- sys/net/if_spppsubr.c >+++ sys/net/if_spppsubr.c >@@ -4015,7 +4015,7 @@ sppp_pap_scr(struct sppp *sp) > /* > * Send a PAP or CHAP proto packet. > * >- * Varadic function, each of the elements for the ellipsis is of type >+ * Variadic function, each of the elements for the ellipsis is of type > * ``size_t mlen, const u_char *msg''. Processing will stop iff > * mlen == 0. > */ >diff --git sys/net/if_types.h sys/net/if_types.h >index 64400f95c54..f3da11c6b5f 100644 >--- sys/net/if_types.h >+++ sys/net/if_types.h >@@ -205,7 +205,7 @@ > #define IFT_USB 0xa0 /* USB Interface */ > #define IFT_IEEE8023ADLAG 0xa1 /* IEEE 802.3ad Link Aggregate*/ > #define IFT_BGPPOLICYACCOUNTING 0xa2 /* BGP Policy Accounting */ >-#define IFT_FRF16MFRBUNDLE 0xa3 /* FRF.16 Multilik Frame Relay*/ >+#define IFT_FRF16MFRBUNDLE 0xa3 /* FRF.16 Multilink Frame >Relay*/ > #define IFT_H323GATEKEEPER 0xa4 /* H323 Gatekeeper */ > #define IFT_H323PROXY 0xa5 /* H323 Voice and Video Proxy */ > #define IFT_MPLS 0xa6 /* MPLS */ >diff --git sys/net/if_wg.c sys/net/if_wg.c >index 996ab20d9e4..816ce8fc5ed 100644 >--- sys/net/if_wg.c >+++ sys/net/if_wg.c >@@ -1621,7 +1621,7 @@ wg_decap(struct wg_softc *sc, struct mbuf *m) > * IP header, we just worry about the sizeof and the version, so we can > * read the source address in wg_aip_lookup. > * >- * We also need to trim the packet, as it was likely paddded before >+ * We also need to trim the packet, as it was likely padded before > * encryption. While we could drop it here, it will be more helpful to > * pass it to bpf_mtap and use the counters that people are expecting > * in ipv4_input and ipv6_input. We can rely on ipv4_input and >diff --git sys/net/pf.c sys/net/pf.c >index 4d497212304..f84e2055fc6 100644 >--- sys/net/pf.c >+++ sys/net/pf.c >@@ -1341,7 +1341,7 @@ pf_state_expires(const struct pf_state *state, uint8_t >stimeout) > * state->timeout by having the caller do the read (and any > * chacks it needs to do on the same variable) and then pass > * their view of the timeout in here for this function to use. >- * the only consequnce of using a stale timeout value is >+ * the only consequence of using a stale timeout value is > * that the state won't be a candidate for purging until the > * next pass of the purge task. > */ >diff --git sys/net/pfvar_priv.h sys/net/pfvar_priv.h >index 5bba87b19a8..ffdd7ee959f 100644 >--- sys/net/pfvar_priv.h >+++ sys/net/pfvar_priv.h >@@ -176,7 +176,7 @@ struct pf_pdesc { > u_int32_t off; /* protocol header offset */ > u_int32_t hdrlen; /* protocol header length */ > u_int32_t p_len; /* length of protocol payload */ >- u_int32_t extoff; /* extentsion header offset */ >+ u_int32_t extoff; /* extension header offset */ > u_int32_t fragoff; /* fragment header offset */ > u_int32_t jumbolen; /* length from v6 jumbo header */ > u_int32_t badopts; /* v4 options or v6 routing headers */ >diff --git sys/net/pipex.c sys/net/pipex.c >index e2d0c5c958d..92dbeea8068 100644 >--- sys/net/pipex.c >+++ sys/net/pipex.c >@@ -199,7 +199,7 @@ pipex_init_session(struct pipex_session **rsession, > struct ifnet *over_ifp = NULL; > #endif > >- /* Checks requeted parameters. */ >+ /* Checks requested parameters. */ > switch (req->pr_protocol) { > #ifdef PIPEX_PPPOE > case PIPEX_PROTO_PPPOE: >@@ -1033,7 +1033,7 @@ pipex_common_input(struct pipex_session *session, struct >mbuf *m0, int hlen, > } > > /* ok, The packet is for PIPEX */ >- m_adj(m0, hlen);/* cut off the tunnle protocol header */ >+ m_adj(m0, hlen);/* cut off the tunnel protocol header */ > > /* ensure the mbuf length equals the PPP frame length */ > if (m0->m_pkthdr.len < plen) >diff --git sys/net/pipex.h sys/net/pipex.h >index b29903beac7..149660d367b 100644 >--- sys/net/pipex.h >+++ sys/net/pipex.h >@@ -51,7 +51,7 @@ struct pipex_mppe_req { > int16_t stateless; /* mppe key mode. > 1 for stateless */ > int16_t keylenbits; /* mppe key length(in bits)*/ >- u_char master_key[PIPEX_MPPE_KEYLEN]; /* mppe mastter key */ >+ u_char master_key[PIPEX_MPPE_KEYLEN]; /* mppe master key */ > }; > > /* pipex statistics */ >diff --git sys/net/pipex_local.h sys/net/pipex_local.h >index dd940b6a74a..35e2821b99a 100644 >--- sys/net/pipex_local.h >+++ sys/net/pipex_local.h >@@ -70,7 +70,7 @@ struct pipex_mppe { > reserved:14; > int16_t keylenbits; /* [I] key length */ > int16_t keylen; /* [I] */ >- uint16_t coher_cnt; /* [m] cohency counter */ >+ uint16_t coher_cnt; /* [m] coherency counter */ > struct rc4_ctx rc4ctx; /* [m] */ > u_char master_key[PIPEX_MPPE_KEYLEN]; /* [m] master key of MPPE */ > u_char session_key[PIPEX_MPPE_KEYLEN]; /* [m] session key of MPPE */ >@@ -153,7 +153,7 @@ struct pipex_l2tp_session { > > struct cpumem; > >-/* pppac ip-extension sessoin table */ >+/* pppac ip-extension session table */ > struct pipex_session { > struct radix_node ps4_rn[2]; > /* [N] tree glue, and other values */ >diff --git sys/net/ppp_tty.c sys/net/ppp_tty.c >index 124b9df59ac..bd3d5f53887 100644 >--- sys/net/ppp_tty.c >+++ sys/net/ppp_tty.c >@@ -286,7 +286,7 @@ pppread(struct tty *tp, struct uio *uio, int flag) > if (sc == NULL) > return 0; > /* >- * Loop waiting for input, checking that nothing disasterous >+ * Loop waiting for input, checking that nothing disastrous > * happens in the meantime. > */ > s = spltty(); >diff --git sys/net/radix.c sys/net/radix.c >index 37dc255537f..c9dee2733ba 100644 >--- sys/net/radix.c >+++ sys/net/radix.c >@@ -709,7 +709,7 @@ rn_link_dupedkey(struct radix_node *tt, struct radix_node >*x, int before) > * - leaf nodes with possible rn_dupedkey list > * - internal nodes with maybe their own mklist > * If the mask of the route is bigger than the current branch bit then >- * a rn_mklist entrie needs to be made. >+ * a rn_mklist entry needs to be made. > */ > void > rn_fixup_nodes(struct radix_node *tt) >diff --git sys/net/route.c sys/net/route.c >index 73bd6f53639..fa3fe519a81 100644 >--- sys/net/route.c >+++ sys/net/route.c >@@ -1843,7 +1843,7 @@ db_print_ifa(struct ifaddr *ifa) > } > > /* >- * Function to pass to rtalble_walk(). >+ * Function to pass to rtable_walk(). > * Return non-zero error to abort walk. > */ > int >diff --git sys/net/rtable.c sys/net/rtable.c >index 4cdd303200a..721e32b7f7a 100644 >--- sys/net/rtable.c >+++ sys/net/rtable.c >@@ -62,7 +62,7 @@ struct rtmap { > /* > * Array of rtableid -> rdomain mapping. > * >- * Only used for the first index as describbed above. >+ * Only used for the first index as described above. > */ > struct dommp { > unsigned int limit; >diff --git sys/netinet/ip_ipip.c sys/netinet/ip_ipip.c >index 9bcde8d533d..ed7a768c169 100644 >--- sys/netinet/ip_ipip.c >+++ sys/netinet/ip_ipip.c >@@ -356,7 +356,7 @@ ipip_output(struct mbuf **mp, struct tdb *tdb) > tdb->tdb_src.sin.sin_addr.s_addr == INADDR_ANY || > tdb->tdb_dst.sin.sin_addr.s_addr == INADDR_ANY) { > >- DPRINTF("unspecified tunnel endpoind address " >+ DPRINTF("unspecified tunnel endpoint address " > "in SA %s/%08x", > ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)), > ntohl(tdb->tdb_spi)); >@@ -445,7 +445,7 @@ ipip_output(struct mbuf **mp, struct tdb *tdb) > tdb->tdb_src.sa.sa_family != AF_INET6 || > IN6_IS_ADDR_UNSPECIFIED(&tdb->tdb_src.sin6.sin6_addr)) { > >- DPRINTF("unspecified tunnel endpoind address " >+ DPRINTF("unspecified tunnel endpoint address " > "in SA %s/%08x", > ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)), > ntohl(tdb->tdb_spi)); >diff --git sys/netinet/ipsec_output.c sys/netinet/ipsec_output.c >index 58298d3ad91..cd40a864e20 100644 >--- sys/netinet/ipsec_output.c >+++ sys/netinet/ipsec_output.c >@@ -276,7 +276,7 @@ ipsp_process_packet(struct mbuf *m, struct tdb *tdb, int >af, int tunalready) > > /* > * If this is just an IP-IP TDB and we're told there's already an >- * encapsulation header or ipip_output() has encapsulted it, move on. >+ * encapsulation header or ipip_output() has encapsulated it, move on. > */ > if (tdb->tdb_xform->xf_type == XF_IP4) > return ipsp_process_done(m, tdb); >diff --git sys/netinet/tcp_input.c sys/netinet/tcp_input.c >index 5b8af422222..f733e4e99e6 100644 >--- sys/netinet/tcp_input.c >+++ sys/netinet/tcp_input.c >@@ -3444,7 +3444,7 @@ syn_cache_lookup(struct sockaddr *src, struct sockaddr >*dst, > * > * -1 We were unable to create the new connection, and are > * aborting it. An ACK,RST is being sent to the peer >- * (unless we got screwey sequence numbners; see below), >+ * (unless we got screwey sequence numbers; see below), > * because the 3-way handshake has been completed. Caller > * should not free the mbuf, since we may be using it. If > * we are not, we will free it. >diff --git sys/netinet/tcp_subr.c sys/netinet/tcp_subr.c >index 1597852ae25..e8e345b86c4 100644 >--- sys/netinet/tcp_subr.c >+++ sys/netinet/tcp_subr.c >@@ -667,7 +667,7 @@ tcp6_ctlinput(int cmd, struct sockaddr *sa, u_int rdomain, >void *d) > /* > * Depending on the value of "valid" and routing table > * size (mtudisc_{hi,lo}wat), we will: >- * - recalcurate the new MTU and create the >+ * - recalculate the new MTU and create the > * corresponding routing entry, or > * - ignore the MTU change notification. > */ >diff --git sys/netinet/tcp_timer.c sys/netinet/tcp_timer.c >index 5f3ffdf40fe..d37a76c14b5 100644 >--- sys/netinet/tcp_timer.c >+++ sys/netinet/tcp_timer.c >@@ -529,7 +529,7 @@ tcp_timer_reaper(void *arg) > /* > * This timer is necessary to delay the pool_put() after all timers > * have finished, even if they were sleeping to grab the net lock. >- * Putting the pool_put() in a timer is sufficinet as all timers run >+ * Putting the pool_put() in a timer is sufficient as all timers run > * from the same timeout thread. Note that neither softnet thread nor > * user process may access the tcpcb after arming the reaper timer. > * Freeing may run in parallel as it does not grab the net lock. >diff --git sys/netinet6/icmp6.c sys/netinet6/icmp6.c >index bdba0978bfb..b1a937daf44 100644 >--- sys/netinet6/icmp6.c >+++ sys/netinet6/icmp6.c >@@ -914,7 +914,7 @@ icmp6_notify_error(struct mbuf *m, int off, int icmp6len, >int code) > icmp6dst.sin6_scope_id = in6_addr2scopeid(m->m_pkthdr.ph_ifidx, > &icmp6dst.sin6_addr); > if (in6_embedscope(&icmp6dst.sin6_addr, &icmp6dst, NULL)) { >- /* should be impossbile */ >+ /* should be impossible */ > nd6log((LOG_DEBUG, > "icmp6_notify_error: in6_embedscope failed\n")); > goto freeit; >@@ -931,7 +931,7 @@ icmp6_notify_error(struct mbuf *m, int off, int icmp6len, >int code) > icmp6src.sin6_scope_id = in6_addr2scopeid(m->m_pkthdr.ph_ifidx, > &icmp6src.sin6_addr); > if (in6_embedscope(&icmp6src.sin6_addr, &icmp6src, NULL)) { >- /* should be impossbile */ >+ /* should be impossible */ > nd6log((LOG_DEBUG, > "icmp6_notify_error: in6_embedscope failed\n")); > goto freeit; >diff --git sys/netinet6/in6.c sys/netinet6/in6.c >index 1721aa191d7..42b392215c4 100644 >--- sys/netinet6/in6.c >+++ sys/netinet6/in6.c >@@ -959,7 +959,7 @@ in6_unlink_ifa(struct in6_ifaddr *ia6, struct ifnet *ifp) > } > > /* >- * Initialize an interface's intetnet6 address >+ * Initialize an interface's inet6 address > * and routing table entry. > */ > int >diff --git sys/netinet6/in6_var.h sys/netinet6/in6_var.h >index e38082c9c3c..2a13f5bf978 100644 >--- sys/netinet6/in6_var.h >+++ sys/netinet6/in6_var.h >@@ -133,7 +133,7 @@ struct in6_ifstat { > u_int64_t ifs6_out_forward; /* # of datagrams forwarded */ > /* NOTE: increment on outgoing if */ > u_int64_t ifs6_out_request; /* # of outgoing datagrams from ULP */ >- /* NOTE: does not include forwrads */ >+ /* NOTE: does not include forwards */ > u_int64_t ifs6_out_discard; /* # of discarded datagrams */ > u_int64_t ifs6_out_fragok; /* # of datagrams fragmented */ > u_int64_t ifs6_out_fragfail; /* # of datagrams failed on fragment */ >diff --git sys/netinet6/ip6_forward.c sys/netinet6/ip6_forward.c >index 4b933ec6852..99eb09d4050 100644 >--- sys/netinet6/ip6_forward.c >+++ sys/netinet6/ip6_forward.c >@@ -277,7 +277,7 @@ reroute: > > /* > * Fake scoped addresses. Note that even link-local source or >- * destinaion can appear, if the originating node just sends the >+ * destination can appear, if the originating node just sends the > * packet to us (without address resolution for the destination). > * Since both icmp6_error and icmp6_redirect_output fill the embedded > * link identifiers, we can do this stuff after making a copy for >diff --git sys/netinet6/ip6_input.c sys/netinet6/ip6_input.c >index 142477d4fdf..2f805c60d88 100644 >--- sys/netinet6/ip6_input.c >+++ sys/netinet6/ip6_input.c >@@ -296,7 +296,7 @@ ip6_input_if(struct mbuf **mp, int *offp, int nxt, int af, >struct ifnet *ifp) > > /* > * If the packet has been received on a loopback interface it >- * can be destinated to any local address, not necessarily to >+ * can be destined any local address, not necessarily to > * an address configured on `ifp'. > */ > if (ifp->if_flags & IFF_LOOPBACK) { >diff --git sys/netinet6/ip6_output.c sys/netinet6/ip6_output.c >index 9141f2e6652..b11efd6691b 100644 >--- sys/netinet6/ip6_output.c >+++ sys/netinet6/ip6_output.c >@@ -655,7 +655,7 @@ reroute: > #endif > > /* >- * If the packet is not going on the wire it can be destinated >+ * If the packet is not going on the wire it can be destined > * to any local address. In this case do not clear its scopes > * to let ip6_input() find a matching local route. > */ >diff --git sys/netinet6/ip6protosw.h sys/netinet6/ip6protosw.h >index af6e2f33757..8e7da7e7276 100644 >--- sys/netinet6/ip6protosw.h >+++ sys/netinet6/ip6protosw.h >@@ -83,7 +83,7 @@ struct in6_addr; > * argument type for the last arg of pr_ctlinput(). > * should be consulted only with AF_INET6 family. > * >- * IPv6 ICMP IPv6 [exthdrs] finalhdr paylaod >+ * IPv6 ICMP IPv6 [exthdrs] finalhdr payload > * ^ ^ ^ ^ > * | | ip6c_ip6 ip6c_off > * | ip6c_icmp6 >