.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)crypt.3 8.1.1.1 (Berkeley) %G%
+.\" @(#)crypt.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt CRYPT 3
The
.Ar key
is divided into groups of 8 characters (a short final group is null-padded)
-and the low-order 7 bits of each each character (56 bits per group) are
+and the low-order 7 bits of each character (56 bits per group) are
used to form the DES key as follows: the first group of 56 bits becomes the
initial DES key.
For each additional group, the XOR of the group bits and the encryption of
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)getcap.3 8.1 (Berkeley) %G%
+.\" @(#)getcap.3 8.2 (Berkeley) %G%
.\"
.Dd ""
.Dt GETCAP 3
is declared and all subsequent files in the file array.
.Pp
When a database is searched for a capability record, the first matching
-record in the search is returned. When an record is scanned for a
+record in the search is returned. When a record is scanned for a
capability, the first matching capability is returned; the capability
.Ic :nameT@:
will hide any following definition of a value of type
.Nm cgetfirst ,
and
.Nm cgetnext
-return a a value greater than or equal to 0 on success and a value less
+return a value greater than or equal to 0 on success and a value less
than 0 on failure.
.Nm Cgetcap
returns a character pointer on success and a
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)getcwd.3 8.1 (Berkeley) %G%
+.\" @(#)getcwd.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GETCWD 3
.Os BSD 4.2
.Sh NAME
-.Nm getwd
+.Nm getcwd
.Nd get working directory pathname
.Sh SYNOPSIS
.Fd #include <stdio.h>
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)getpwent.3 8.1 (Berkeley) %G%
+.\" @(#)getpwent.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GETPWENT 3
as it doesn't close its file descriptors by default.)
.Pp
It is dangerous for long-running programs to keep the file descriptors
-open the database will become out of date if it is updated while the
+open as the database will become out of date if it is updated while the
program is running.
.Pp
The
These routines have been written to ``shadow'' the password file, e.g.
allow only certain programs to have access to the encrypted password.
If the process which calls them has an effective uid of 0, the encrypted
-password will be returned, otherwise, the password field of the retuned
+password will be returned, otherwise, the password field of the returned
structure will point to the string
.Ql * .
.Sh RETURN VALUES
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)nlist.3 8.1 (Berkeley) %G%
+.\" @(#)nlist.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt NLIST 3
The number of invalid entries is returned if successful; otherwise,
if the file
.Fa filename
-does not exist or is not exectuable, the returned value is \-1.
+does not exist or is not executable, the returned value is \-1.
.Sh SEE ALSO
.Xr a.out 5
.Sh HISTORY
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)signal.3 8.1 (Berkeley) %G%
+.\" @(#)signal.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt SIGNAL 3
.Ef
.Pp
For some system calls, if a signal is caught while the call is
-executing and the call is permaturely terminated,
+executing and the call is prematurely terminated,
the call is automatically restarted.
(The handler is installed using the
.Dv SA_RESTART
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)sysconf.3 8.1 (Berkeley) %G%
+.\" @(#)sysconf.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt SYSCONF 3
.Va errno
for any of the errors specified for the library functions
.Xr sysctl 3 .
-In addition, the following errors may be reported:
+In addition, the following error may be reported:
.Bl -tag -width Er
.It Bq Er EINVAL
The value of the
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)tcsetattr.3 8.1 (Berkeley) %G%
+.\" @(#)tcsetattr.3 8.2 (Berkeley) %G%
.\"
.Dd ""
.Dt TCSETATTR 3
.It Fa TCSAFLUSH
The change occurs after all output written to
.Fa fd
-has been transmitted to the terminal
+has been transmitted to the terminal.
Additionally, any input that has been received but not read is discarded.
.It Fa TCSASOFT
If this value is
.Pp
If
.Nm tcsetattr
-is unable able to make any of the requested changes, it returns -1 and
+is unable to make any of the requested changes, it returns -1 and
sets errno.
Otherwise, it makes all of the requested changes it can.
If the specified input and output baud rates differ and are a combination
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)unvis.3 8.1 (Berkeley) %G%
+.\" @(#)unvis.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt UNVIS 3
to zero. Call
.Fn unvis
with each successive byte, along with a pointer
-to this integer, and a pointer to an destination character.
+to this integer, and a pointer to a destination character.
The
.Xr unvis
function
A valid sequence was detected, but no character was produced. This
return code is necessary to indicate a logical break between characters.
.It Dv UNVIS_SYNBAD
-An invalid esacpe sequence was detected, or the decoder is in an
+An invalid escape sequence was detected, or the decoder is in an
unknown state. The decoder is placed into the starting state.
.El
.Pp
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)isascii.3 8.1 (Berkeley) %G%
+.\" @(#)isascii.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt ISASCII 3
.Fn isascii
function tests for an
.Tn ASCII
-character, which is any character with a value less than than or
+character, which is any character with a value less than or
equal to 0177.
.Sh SEE ALSO
.Xr ctype 3 ,
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)isgraph.3 8.1 (Berkeley) %G%
+.\" @(#)isgraph.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt ISGRAPH 3
.Os
.Sh NAME
.Nm isgraph
-.Nd printing character test (space character exculsive)
+.Nd printing character test (space character exclusive)
.Sh SYNOPSIS
.Fd #include <ctype.h>
.Ft int
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)rune.3 8.1 (Berkeley) %G%
+.\" @(#)rune.3 8.2 (Berkeley) %G%
.\"
.Dd ""
.Dt RUNE 3
\fB<ctype.h>\fP.
The
.Fa locale
-argument indicates the locale which to load.
+argument indicates which locale to load.
If the locale is successfully loaded,
.Dv 0
is returned, otherwise an errno value is returned to indicate the
.Pp
The
.Fn fungetrune
-function function pushes the multibyte encoding, as provided by
+function pushes the multibyte encoding, as provided by
.Fn sputrune ,
of
.Fa rune
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)getservent.3 8.1 (Berkeley) %G%
+.\" @(#)getservent.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GETSERVENT 3
If a protocol name is also supplied (non-
.Dv NULL ) ,
searches must also match the protocol.
+.ne 1I
.Sh FILES
.Bl -tag -width /etc/services -compact
.It Pa /etc/services
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)scanf.3 8.1 (Berkeley) %G%
+.\" @(#)scanf.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt SCANF 3
the next pointer must be a pointer to
.Em unsigned int .
.It Cm x
-Matches an optionally a signed hexadecimal integer;
+Matches an optionally signed hexadecimal integer;
the next pointer must be a pointer to
.Em unsigned int .
.It Cm X
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)stdio.3 8.5 (Berkeley) %G%
+.\" @(#)stdio.3 8.6 (Berkeley) %G%
.\"
.Dd
.Dt STDIO 3
to a terminal) then a
.Em file position indicator
associated with the stream is positioned at the start of the file (byte
-zero), unless the file is opened with appened mode. If append mode
+zero), unless the file is opened with appended mode. If append mode
is used, the position indicator will be placed the end-of-file.
The position indicator is maintained by subsequent reads, writes
and positioning requests. All input occurs as if the characters
.Em stderr .
Initially, the standard error stream
is unbuffered; the standard input and output streams are
-fully buffered if and only if the streams do not to refer to
+fully buffered if and only if the streams do not refer to
an interactive or
.Dq terminal
device, as determined by the
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)bsearch.3 8.1 (Berkeley) %G%
+.\" @(#)bsearch.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt BSEARCH 3
The
.Fa compar
routine
-is expected to have two
+is expected to have
two arguments which point to the
.Fa key
object and to an array member, in that order, and should return an integer
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)getenv.3 8.1 (Berkeley) %G%
+.\" @(#)getenv.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GETENV 3
.Ar name .
If the variable
.Ar name
-is not in the current environment ,
+is not in the current environment,
a null pointer is returned.
.Pp
The
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)getopt.3 8.1 (Berkeley) %G%
+.\" @(#)getopt.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GETOPT 3
then then a missing option argumet causes a
.Ql \&:
to be returned in addition to supressing any error messages.
-option argument
.Pp
Option arguments are allowed to begin with
.Dq Li \- ;
.\" Chris Torek.
.\" %sccs.include.redist.man%
.\"
-.\" @(#)string.3 8.1 (Berkeley) %G%
+.\" @(#)string.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt STRING 3
.Ft char *
.Fn rindex "const char *s" "int c"
.Sh DESCRIPTION
-The string functions
+The string
functions manipulate strings terminated by a
null byte.
.Pp
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)strmode.3 8.1 (Berkeley) %G%
+.\" @(#)strmode.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt STRMODE 3
.Pp
Permission checking is done as specifically as possible.
If read permission is denied to the owner of a file in the first set
-of permssions, the owner of the file will not be able to read the file.
+of permissions, the owner of the file will not be able to read the file.
This is true even if the owner is in the file's group and the group
permissions allow reading or the ``other'' permissions allow reading.
.Pp
.Bl -tag -width xxxx
.It S
If the character is part of the owner permissions and the file is not
-executable or the directory is not searchable, by the owner, and the
+executable or the directory is not searchable by the owner, and the
set-user-id bit is set.
.It S
If the character is part of the group permissions and the file is not
-executable or the directory is not searchable, by the group, and the
+executable or the directory is not searchable by the group, and the
set-group-id bit is set.
.It T
If the character is part of the other permissions and the file is not
-executable or the directory is not searchable, by others, and the ``sticky''
+executable or the directory is not searchable by others, and the ``sticky''
.Pq Dv S_ISVTX
bit is set.
.It s
If the character is part of the owner permissions and the file is
-executable or the directory searchable, by the owner, and the set-user-id
+executable or the directory searchable by the owner, and the set-user-id
bit is set.
.It s
If the character is part of the group permissions and the file is
-executable or the directory searchable, by the group, and the set-group-id
+executable or the directory searchable by the group, and the set-group-id
bit is set.
.It t
If the character is part of the other permissions and the file is
-executable or the directory searchable, by others, and the ``sticky''
+executable or the directory searchable by others, and the ``sticky''
.Pq Dv S_ISVTX
bit is set.
.It x
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)accept.2 8.1 (Berkeley) %G%
+.\" @(#)accept.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt ACCEPT 2
as merely dequeueing the next connection
request and not implying confirmation.
Confirmation can be implied by a normal read or write on the new
-file desciptor, and rejection can be implied by closing the
+file descriptor, and rejection can be implied by closing the
new socket.
.Pp
One can obtain user connection request data without confirming
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)brk.2 8.1 (Berkeley) %G%
+.\" @(#)brk.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt BRK 2
.Fn brk
function
sets the break or lowest address
-of a process's data segment (unilitialized data) to
+of a process's data segment (uninitialized data) to
.Fa addr
(immediately above bss).
Data addressing is restricted between
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)chdir.2 8.1 (Berkeley) %G%
+.\" @(#)chdir.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt CHDIR 2
.Sh DESCRIPTION
The
.Fa path
-arument points to the pathname of a directory.
+argument points to the pathname of a directory.
The
.Fn chdir
function
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)execve.2 8.1 (Berkeley) %G%
+.\" @(#)execve.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt EXECVE 2
.Fn execve Ap d ,
the system
.Fn execve Ap s
-the specified
+runs the specified
.Em interpreter .
If the optional
.Em arg
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)flock.2 8.1 (Berkeley) %G%
+.\" @(#)flock.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt FLOCK 2
.Fa fd .
A lock is applied by specifying an
.Fa operation
-parameter that is the inclusive or of
+parameter that is one of
.Dv LOCK_SH
or
.Dv LOCK_EX
-and, possibly,
+with the optional addition of
.Dv LOCK_NB .
To unlock
an existing lock
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)getitimer.2 8.1 (Berkeley) %G%
+.\" @(#)getitimer.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GETITIMER 2
.It Bq Er EINVAL
A
.Fa value
-parameter specified a time was too large
+parameter specified a time that was too large
to be handled.
.El
.Sh SEE ALSO
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)getsockopt.2 8.1 (Berkeley) %G%
+.\" @(#)getsockopt.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GETSOCKOPT 2
.Dv SO_RCVLOWAT
is an option to set the minimum count for input operations.
In general, receive calls will block until any (non-zero) amount of data
-is received, then return with smaller of the amount available or the amount
+is received, then return with the smaller of the amount available or the amount
requested.
The default value for
.Dv SO_RCVLOWAT
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)intro.2 8.2 (Berkeley) %G%
+.\" @(#)intro.2 8.3 (Berkeley) %G%
.\"
.Dd
.Dt INTRO 2
.Bl -hang -width Ds
.It Er 0 Em "Error 0" .
Not used.
-.It Er 1 EPERM Em "Operation not permitted .
+.It Er 1 EPERM Em "Operation not permitted" .
An attempt was made to perform an operation limited to processes
with appropriate privileges or to the owner of a file or other
resources.
interrupted function call will seem to have returned the error condition.
.It Er 5 EIO Em "Input/output error" .
Some physical input or output error occurred.
-This error not be reported until a subsequent operation on the same file
+This error will not be reported until a subsequent operation on the same file
descriptor and may be lost (over written) by any subsequent errors.
.It Er 6 ENXIO Em "\&No such device or address" .
Input or output on a special file referred to a device that did not
made a request beyond the limits of the device.
This error may also occur when, for example,
a tape drive is not online or no disk pack is
-is loaded on a drive.
+loaded on a drive.
.It Er 7 E2BIG Em "Arg list too long" .
The number of bytes used for the argument and environment
list of the new process exceeded the current limit
.It Er 26 ETXTBSY Em "Text file busy" .
The new process was a pure procedure (shared text) file
which was open for writing by another process, or
-the pure procedure file was being executed an
+while the pure procedure file was being executed an
.Xr open
call requested write access.
.It Er 27 EFBIG Em "File too large" .
.Xr write
to an ordinary file, the creation of a
directory or symbolic link, or the creation of a directory
-entry failed because no more disk blocks are available
+entry failed because no more disk blocks were available
on the file system, or the allocation of an inode for a newly
-created file failed because no more inodes are available
+created file failed because no more inodes were available
on the file system.
.It Er 29 ESPIPE Em "Illegal seek" .
An
A numerical input argument was outside the defined domain of the mathematical
function.
.It Er 34 ERANGE Em "Numerical result out of range" .
-A numerical result of the function was to large to fit in the
+A numerical result of the function was too large to fit in the
available space (perhaps exceeded precision).
.It Er 35 EAGAIN Em "Resource temporarily unavailable" .
This is a temporary condition and later calls to the
when already connected.
.It Er 57 ENOTCONN Em "Socket is not connected" .
An request to send or receive data was disallowed because
-the socket is not connected and (when sending on a datagram socket)
+the socket was not connected and (when sending on a datagram socket)
no address was supplied.
.It Er 58 ESHUTDOWN Em "Cannot send after socket shutdown" .
A request to send data was disallowed because the socket
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)ioctl.2 8.1 (Berkeley) %G%
+.\" @(#)ioctl.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt IOCTL 2
is set to indicate the error.
.Sh ERRORS
.Fn Ioctl
-will fail:
+will fail if:
.Bl -tag -width [ENOTTY]
.It Bq Er EBADF
.Fa d
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)kill.2 8.1 (Berkeley) %G%
+.\" @(#)kill.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt KILL 2
this is a variant of
.Xr killpg 2 .
.It \&If Fa pid No \&is -1 :
-If the user has super user privileges,
+If the user has super-user privileges,
the signal is sent to all processes excluding
system processes and the process sending the signal.
If the user is not the super user, the signal is sent to all processes
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)link.2 8.1 (Berkeley) %G%
+.\" @(#)link.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt LINK 2
.Sh ERRORS
.Fn Link
will fail and no link will be created if:
-are true:
.Bl -tag -width Ar
.It Bq Er ENOTDIR
A component of either path prefix is not a directory.
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)listen.2 8.1 (Berkeley) %G%
+.\" @(#)listen.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt LISTEN 2
.Sh RETURN VALUES
A 0 return value indicates success; -1 indicates an error.
.Sh ERRORS
-.Fn Listen will fail if:
+.Fn Listen
+will fail if:
.Bl -tag -width [EOPNOTSUPP]
.It Bq Er EBADF
The argument
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)lseek.2 8.1 (Berkeley) %G%
+.\" @(#)lseek.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt LSEEK 2
.Sh BUGS
This document's use of
.Fa whence
-is incorrect English, but maintained for historical reasons.
+is incorrect English, but is maintained for historical reasons.
.Sh STANDARDS
The
.Fn lseek
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)mkdir.2 8.1 (Berkeley) %G%
+.\" @(#)mkdir.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt MKDIR 2
.It Bq Er EEXIST
The named file exists.
.It Bq Er ENOSPC
-The directory in which the entry for the new directory is being placed
-cannot be extended because there is no space left on the file
-system containing the directory.
-.It Bq Er ENOSPC
-The new directory cannot be created because there
-there is no space left on the file
-system that will contain the directory.
+The new directory cannot be created because there is no space left
+on the file system that will contain the directory.
.It Bq Er ENOSPC
There are no free inodes on the file system on which the
directory is being created.
.It Bq Er EDQUOT
-The directory in which the entry for the new directory
-is being placed cannot be extended because the
-user's quota of disk blocks on the file system
-containing the directory has been exhausted.
-.It Bq Er EDQUOT
The new directory cannot be created because the user's
quota of disk blocks on the file system that will
contain the directory has been exhausted.
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)mlock.2 8.1 (Berkeley) %G%
+.\" @(#)mlock.2 8.2 (Berkeley) %G%
.\"
.Dd June 2, 1993
.Dt MLOCK 2
After an
.Nm mlock
call, the indicated pages will cause neither a non-resident page
-or address-translation fault until they are unlocked.
+nor address-translation fault until they are unlocked.
They may still cause protection-violation faults or TLB-miss faults on
architectures with software-managed TLBs.
The physical pages remain in memory until all locked mappings for the pages
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)mount.2 8.1 (Berkeley) %G%
+.\" @(#)mount.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt MOUNT 2
Not enough memory was available to read the cylinder
group information for the filesystem.
.It Bq Er EIO
-An paging error occurred while reading the super block or
+A paging error occurred while reading the super block or
cylinder group information.
.It Bq Er EFAULT
.Em Name
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)recv.2 8.1 (Berkeley) %G%
+.\" @(#)recv.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt RECV 2
.Fa s
is an invalid descriptor.
.It Bq Er ENOTCONN
-The socket is assoicated with a connection-oriented protocol
+The socket is associated with a connection-oriented protocol
and has not been connected (see
.Xr connect 2
and
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)sigpending.2 8.1 (Berkeley) %G%
+.\" @(#)sigpending.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt SIGPENDING 2
The
.Nm sigpending
function is defined by
-.St -p1003.1 .
+.St p1003.1 .
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)statfs.2 8.1 (Berkeley) %G%
+.\" @(#)statfs.2 8.2 (Berkeley) %G%
.\"
.Dd
.Dt STATFS 2
.El
.Pp
.Fn Fstatfs
-fails if one or both of the following are true:
+fails if one or more of the following are true:
.Bl -tag -width ENAMETOOLONGA
.It Bq Er EBADF
.Fa Fd
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)insque.3 8.1 (Berkeley) %G%
+.\" @(#)insque.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt INSQUE 3
.Fn remque
functions
manipulate queues built from doubly linked lists. Each
-element in the queue must in the form of
+element in the queue must be in the form of
.Dq Li struct qelem .
The function
.Fn insque
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)kvm_open.3 8.1 (Berkeley) %G%
+.\" @(#)kvm_open.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt KVM_OPEN 3
.Fa flags
argument indicates read/write access as in
.Xr open 2
-and applies to only the core file.
+and applies only to the core file.
Only
.Dv O_RDONLY ,
.Dv O_WRONLY ,
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)lgamma.3 8.1 (Berkeley) %G%
+.\" @(#)lgamma.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt LGAMMA 3
.Fn Gamma
and
.Fn lgamma
-return appropriate values unless an arguent is out of range.
+return appropriate values unless an argument is out of range.
Overflow will occur for sufficiently large positive values, and
non-positive integers.
On the
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)rint.3 8.1 (Berkeley) %G%
+.\" @(#)rint.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt RINT 3
.Os
.Sh NAME
.Nm rint
-.Nd and round-to-closest integer functions
+.Nd round-to-closest integer functions
.Sh SYNOPSIS
.Fd #include <math.h>
.Ft double
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)termcap.3 8.1 (Berkeley) %G%
+.\" @(#)termcap.3 8.2 (Berkeley) %G%
.\"
.Dd
.Dt TERMCAP 3
function
gets the numeric value of capability
.Fa id ,
-returning \-1 if is not given for the terminal.
+returning \-1 if it is not given for the terminal.
The
.Fn tgetflag
function
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)bugfiler.8 8.1 (Berkeley) %G%
+.\" @(#)bugfiler.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt BUGFILER 8
is the date as reported by the system
clock, using
.Xr ctime 3 .
-.Li The Subject:
-and
-.Li Index:
-lines are
The
-.Dq Subject:
+.Li Subject:
and
-.Dq Index:
+.Li Index:
lines are
copies of the
.Dq Subject:
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)lfs_cleanerd.8 8.1 (Berkeley) %G%
+.\" @(#)lfs_cleanerd.8 8.2 (Berkeley) %G%
.\"
.Dd ""
.Dt LFS_CLEANERD 8
The
.Nm lfs_cleanerd
command starts a daemon process which garbage-collects
-the log-structed file system residing at the point named by
+the log-structured file system residing at the point named by
.Ar node
in the global file system namespace.
This command is normally executed by
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)mail.local.8 8.1 (Berkeley) %G%
+.\" @(#)mail.local.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt MAIL.LOCAL 8
.Sh DESCRIPTION
.Nm Mail.local
reads the standard input up to an end-of-file and appends it to each
-.Ar user 's
+.Ar user's
.Pa mail
file.
The
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)makekey.8 8.1 (Berkeley) %G%
+.\" @(#)makekey.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt MAKEKEY 8
.Nm makekey
.Sh DESCRIPTION
.Nm Makekey
-encypts a key and salt which it reads from the standard input
+encrypts a key and salt which it reads from the standard input
and writes the result to the standard output.
The key is expected to be
ten bytes; the salt is expected to be two bytes.
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)rbootd.8 8.1 (Berkeley) %G%
+.\" @(#)rbootd.8 8.2 (Berkeley) %G%
.\"
.\" Utah $Hdr: rbootd.man 3.1 92/07/06$
.\" Author: Jeff Forys, University of Utah CSS
machine.
A line must start with a machine's Ethernet address followed by an optional
list of boot file names.
-An ethernet address is specified in hexadecimal with each of its six octets
+An Ethernet address is specified in hexadecimal with each of its six octets
separated by a colon.
The boot file names come from the boot file directory.
The ethernet address and boot file(s) must be separated by white-space
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)rexecd.8 8.1 (Berkeley) %G%
+.\" @(#)rexecd.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt REXECD 8
.It Sy Login incorrect.
No password file entry for the user name existed.
.It Sy Password incorrect.
-The wrong was password supplied.
+The wrong password was supplied.
.It Sy \&No remote directory.
The
.Xr chdir
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)talkd.8 8.1 (Berkeley) %G%
+.\" @(#)talkd.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt TALKD 8
.Nm Talkd
is the server that notifies a user that someone else wants to
initiate a conversation.
-It acts a repository of invitations, responding to requests
+It acts as a repository of invitations, responding to requests
by clients wishing to rendezvous to hold a conversation.
In normal operation, a client, the caller,
initiates a rendezvous by sending a
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)make_keypair.8 8.1 (Berkeley) %G%
+.\" @(#)make_keypair.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt MAKE_KEYPAIR 8
keys for
each
.Ar hostname .
-The keys are used by priviledged programs such as
+The keys are used by privileged programs such as
.Xr register 1
to make remote updates to the Kerberos database without
having to have first acquired a Kerberos ticket granting ticket
are placed (by hand) in the filesystems of the
kerberos server in
.Pa /etc/kerberosIV/register_keys ,
-and in the root directory on the clients.
+and in the root directory of the clients.
For example, the file
.Pa /.update.key128.32.130.3
would
-contain a copy of the key on the client with
+contain a copy of the key of the client with
IP address 128.32.130.3.
These keys provide a shared secret which may be used to establish
a secure channel between the client hosts and the Kerberos server.
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)registerd.8 8.1 (Berkeley) %G%
+.\" @(#)registerd.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt REGISTERD 8
.Sh SYNOPSIS
.Nm registerd
.Sh DESCRIPTION
-(filler for now)
+Act as a registration agent for a Kerberos domain.
.Sh FILES
.Bl -tag -width /etc/kerberosIV/register_keys -compact
.It Pa /.update.keyxx.xx.xx.xx
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)tarformat.5 6.4 (Berkeley) %G%
+.\" @(#)tarformat.5 6.5 (Berkeley) %G%
.\"
.Dd
.Dt TAR 5
if the file is ``normal'' or a special file,
.Tn ASCII
`1'
-if it is an hard link, and
+if it is a hard link, and
.Tn ASCII
`2'
if it is a symbolic link. The name linked-to, if any, is in
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)fsck.8 8.1 (Berkeley) %G%
+.\" @(#)fsck.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt FSCK 8
.Nm fsck
.Op Fl b Ar block#
.Op Fl c Ar level
+.Op Fl l Ar maxparallel
.Op Fl y
.Op Fl n
.Op Fl m Ar mode
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)fsdb.8 8.1 (Berkeley) %G%
+.\" @(#)fsdb.8 8.2 (Berkeley) %G%
.\"
.TH FSDB 8 ""
.UC 7
1c92434.
.SH SEE ALSO
fsck(8), dir(4), fs(5).
-.SH BUGS
-.PP
-Extreme caution is advised in
-determining the availability
-of
-.IR fsdb
-on the system.
-Suggested permissions are 600 and
-owned by bin.
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)ifconfig.8 8.1 (Berkeley) %G%
+.\" @(#)ifconfig.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt IFCONFIG 8
less favorable; metrics are counted as addition hops
to the destination network or host.
.It Cm netmask Ar mask
-(Inet and Iso)
+(Inet and ISO)
Specify how much of the address to reserve for subdividing
networks into sub-networks.
The mask includes the network part of the local address
(Network Entity Title).
The default value is 1, which is conformant to US
.Tn GOSIP .
-When an iso address is set in an ifconfig command,
+When an ISO address is set in an ifconfig command,
it is really the
.Tn NSAP
which is being specified.
specified in the
.Tn ISO NSAP
to be assigned to the interface.
-There is some evidence that a number different 1 may be useful
+There is some evidence that a number different from 1 may be useful
for
.Tn AFI
37 type addresses.
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)mknod.8 8.1 (Berkeley) %G%
+.\" @(#)mknod.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt MKNOD 8
the type is
.Cm b .
All other devices are character type devices, such as terminal
-and psuedo devices, and are type
+and pseudo devices, and are type
.Cm c .
.It Ar major
The major device number is an integer number which tells the kernel
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)mount_lfs.8 8.1 (Berkeley) %G%
+.\" @(#)mount_lfs.8 8.2 (Berkeley) %G%
.\"
.Dd ""
.Dt MOUNT_LFS 8
.Sh DESCRIPTION
The
.Nm mount_lfs
-command attaches the log-structed file system
+command attaches the log-structured file system
residing on the device named by
.Ar device
to the global file system namespace.
of a difference in normal operation.
.Sh HISTORY
The
-.Nm sysconf
+.Nm mount_lfs
function first appeared in 4.4BSD.
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)mount_null.8 8.1 (Berkeley) %G%
+.\" @(#)mount_null.8 8.2 (Berkeley) %G%
.\"
.\"
.Dd
The bypass routine accepts arbitrary vnode operations for
handling by the lower layer. It begins by examing vnode
operation arguments and replacing any null-nodes by their
-lower-layer equivlants. It then invokes the operation
+lower-layer equivalants. It then invokes the operation
on the lower layer. Finally, it replaces the null-nodes
-in the arguments and, if a vnode is return by the operation,
+in the arguments and, if a vnode is returned by the operation,
stacks a null-node on top of the returned vnode.
.Pp
Although bypass handles most operations,
.Pp
The first approach is to call the aliasing layer's bypass routine.
This method is most suitable when you wish to invoke the operation
-currently being hanldled on the lower layer. It has the advantage
+currently being handled on the lower layer. It has the advantage
the the bypass routine already must do argument mapping.
An example of this is
.Em null_getattrs
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)netgroup.5 8.1 (Berkeley) %G%
+.\" @(#)netgroup.5 8.2 (Berkeley) %G%
.\"
.Dd
.Dt NETGROUP 5
The file format is compatible with that of various vendors, however it
appears that not all vendors use an identical format.
.Sh BUGS
-The interpretation of access restrictions based of the member tuples of a
+The interpretation of access restrictions based on the member tuples of a
netgroup is left up to the various network applications.
Also, it is not obvious how the domain specification
applies to the BSD environment.
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)newfs.8 8.1 (Berkeley) %G%
+.\" @(#)newfs.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt NEWFS 8
Causes the file system parameters to be printed out
without really creating the file system.
.It Fl O
-Creates an 4.3BSD format filesystem.
+Creates a 4.3BSD format filesystem.
This options is primarily used to build root filesystems
that can be understood by older boot ROMs.
.It Fl b Ar block-size
allocating blocks, or to try to minimize the space fragmentation on the disk.
If the value of minfree (see above) is less than 10%,
the default is to optimize for space;
-if the value of minfree greater than or equal to 10%,
+if the value of minfree is greater than or equal to 10%,
the default is to optimize for time.
See
.Xr tunefs 8
Note that changing any of these values from their
defaults will make it impossible for
.Xr fsck
-to find the alternate superblocks if the standard super block is lost.
+to find the alternate superblocks if the standard superblock is lost.
.It Fl r Ar revolutions/minute
The speed of the disk in revolutions per minute.
.It Fl S Ar sector-size
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)nfsd.8 8.1 (Berkeley) %G%
+.\" @(#)nfsd.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt NFSD 8
.Ar numprocs
servers for
.Tn UDP
-transport are started. (compatibility)
-If
+transport are started. For compatibility,
+if
.Ar numprocs
is not specified, it defaults to 4.
.Pp
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)ping.8 8.1 (Berkeley) %G%
+.\" @(#)ping.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt PING 8
and then an arbitrary number of ``pad'' bytes used to fill out the
packet.
The options are as follows:
-Other options are:
.Bl -tag -width Ds
.It Fl c Ar count
Stop after sending (and receiving)
whichever is more.
For every
.Tn ECHO_REQUEST
-sent a period ``.'' is printed, while for ever
+sent a period ``.'' is printed, while for every
.Tn ECHO_REPLY
received a backspace is printed.
This provides a rapid display of how many packets are being dropped.
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)restore.8 8.1 (Berkeley) %G%
+.\" @(#)restore.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt RESTORE 8
The
.Cm r
key precludes an interactive file extraction and can be
-detrimental to ones health if not used carefully (not to mention
+detrimental to one's health if not used carefully (not to mention
the disk). An example:
.Bd -literal -offset indent
newfs /dev/rrp0g eagle
preceded by its file type.
.It Cm y
.Nm Restore
-will not ask whether it should abort the restore if gets an error.
+will not ask whether it should abort the restore if it gets an error.
It will always try to skip over the bad block(s) and continue as
best it can.
.El
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)route.8 8.1 (Berkeley) %G%
+.\" @(#)route.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt ROUTE 8
Lookup and display the route for a destination.
.It Cm monitor
Continuously report any changes to the routing information base,
-routing lookup misses, or suspected network partionings.
+routing lookup misses, or suspected network partitionings.
.El
.Pp
The monitor command has the syntax
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)routed.8 8.1 (Berkeley) %G%
+.\" @(#)routed.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt ROUTED 8
Active gateways are treated equally to network
interfaces. Routing information is distributed
to the gateway and if no routing information is
-received for a period of the time, the associated
+received for a period of time, the associated
route is deleted.
Gateways marked
.Em external
.Tn EGP
is required in order to provide routes for local networks to the rest
of the Internet system.
-Sites needing assistance with such configurations
-should contact the Computer Systems Research Group at Berkeley.
.Sh FILES
.Bl -tag -width /etc/gateways -compact
.It Pa /etc/gateways
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)tunefs.8 8.1 (Berkeley) %G%
+.\" @(#)tunefs.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt TUNEFS 8
been deleted to get under the higher threshold.
.It Fl o Ar optimize_preference
The file system can either try to minimize the time spent
-allocating blocks, or it can attempt minimize the space
+allocating blocks, or it can attempt to minimize the space
fragmentation on the disk.
If the value of minfree (see above) is less than 10%,
then the file system should optimize for space to avoid
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)core.5 8.2 (Berkeley) %G%
+.\" @(#)core.5 8.3 (Berkeley) %G%
.\"
.Dd
.Dt CORE 5
.Sh DESCRIPTION
A small number of signals which cause abnormal termination of a process
also cause a record of the process's in-core state to be written
-to disk for later examination by one of the aviailable debuggers.
+to disk for later examination by one of the available debuggers.
(See
.Xr sigaction 2 . )
This memory image is written to a file named
.Nm programname.core
in the working directory;
provided the terminated process had write permission in the directory,
-and provided the abnormality did not caused
+and provided the abnormality did not cause
a system crash.
(In this event, the decision to save the core file is arbitrary, see
.Xr savecore 8 . )
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)dir.5 8.1 (Berkeley) %G%
+.\" @(#)dir.5 8.2 (Berkeley) %G%
.\"
.Dd
.Dt DIR 5
.Fd #include <sys/types.h>
.Fd #include <sys/dir.h>
.Sh DESCRIPTION
-Directories provide a convienent hierarchical method of grouping
+Directories provide a convenient hierarchical method of grouping
files while obscuring the underlying details of the storage medium.
A directory file is differentiated from a plain file
by a flag in its
.Xr inode 5
entry.
-It consists of records (directory entries) each of which contain
+It consists of records (directory entries) each of which contains
information about a file and a pointer to the file itself.
Directory entries may contain other directories
as well as plain files; such nested directories are refered to as
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)group.5 8.1 (Berkeley) %G%
+.\" @(#)group.5 8.2 (Berkeley) %G%
.\"
.Dd
.Dt GROUP 5
.Ar member
field contains the names of users granted the priviledges of
.Ar group .
-The member names are separated by commas with out spaces or newlines.
+The member names are separated by commas without spaces or newlines.
A user is automatically in a group if that group was specified
in their
.Pa /etc/passwd
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)hosts.5 8.1 (Berkeley) %G%
+.\" @(#)hosts.5 8.2 (Berkeley) %G%
.\"
.Dd
.Dt HOSTS 5
to bring it up to date regarding unofficial aliases
and/or unknown hosts. As the data base maintained at
.Tn NIC
-is incomplete, use of the name server is recommend for
+is incomplete, use of the name server is recommended for
sites on the
.Tn DARPA
Internet.
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)printcap.5 8.1 (Berkeley) %G%
+.\" @(#)printcap.5 8.2 (Berkeley) %G%
.\"
.Dd
.Dt PRINTCAP 5
.Pp
Refer to the
.%T "4.3 BSD Line Printer Spooler Manual"
-for a complete discussion on how setup the database for a given printer.
+for a complete discussion on how to setup the database for a given printer.
.Sh CAPABILITIES
Refer to
.Xr termcap 5
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)intro.8 8.1 (Berkeley) %G%
+.\" @(#)intro.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt INTRO 8
.Ql Xr dump ,
and recover files when disks die an untimely death,
.Ql Xr restore .
-The manual
+The
.Ql Xr format
-should be consulted when formatting disk packs respective
-to the architecture the system is running on.
+manual
+for the specific architecture the system is running on should be
+consulted when formatting disks and tapes.
Network related services like
.Ql Xr inetd
and
are also described.
The section
.Ql Xr crash
-should be consulted in understanding how to interpret system
+should be consulted to understand how to interpret system
crash dumps.
.Sh HISTORY
The
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)rc.8 8.1 (Berkeley) %G%
+.\" @(#)rc.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt RC 8
.Pp
The second part of
.Nm rc ,
-which is run after a auto-reboot succeeds and also if
+which is run after an auto-reboot succeeds and also if
.Nm rc
is invoked when a single user shell terminates (see
.Xr init 8 ) ,
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)termcap.5 8.1 (Berkeley) %G%
+.\" @(#)termcap.5 8.2 (Berkeley) %G%
.\"
.Dd
.Dt TERMCAP 5
.Ed
.Sh CAPABILITIES
The characters in the
-The
.Em Notes
function
field in the table have the following meanings
.It "mo str Turn off"
.Dq meta mode .
.It "mp str Turn on protected attribute."
-.It "mr str Turn on reverse-video attibute."
+.It "mr str Turn on reverse-video attribute."
.It "ms bool Safe to move in standout modes."
.It "mu str (o) Memory unlock (turn off memory lock)."
.It "nc bool (o) No correctly-working"
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)showmount.8 8.1 (Berkeley) %G%
+.\" @(#)showmount.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt SHOWMOUNT 8
.%T "NFS: Network File System Protocol Specification" ,
RFC 1094,
Appendix A ,
-for a detailed desciption of the protocol.
+for a detailed description of the protocol.
.Bl -tag -width Ds
.It Fl a
List all mount points in the form:
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)acucntrl.8 8.1 (Berkeley) %G%
+.\" @(#)acucntrl.8 8.2 (Berkeley) %G%
.\"
.TH ACUCNTRL 8 ""
.UC 6
.SH DESCRIPTION
.PP
.I Acucntrl
-turns around terminal line, enabling it to be used for both dialin and dialout.
+turns around the terminal line,
+enabling it to be used for both dialin and dialout.
On dialin a terminal line is assumed to have modem control enabled and a getty
process in existence waiting for logins. On dialout modem control is disabled
and there is no getty process.
.PP
Steps taken when enabling
.RI ( i . e .
-setup for dialin)
+setup for dialing in)
.IP 1)
check input arguments
.IP 2)
the dh driver there is deliberately no error message given when the TIOCMGET
ioctl fails.
.PP
-Previously there was similar synchronization problem with the init process.
+Previously there were similar synchronization problems with the init process.
When dialins are disabled the capitalized name of the process cannot be posted
into /etc/utmp until init has finished clearing /etc/utmp. However one does
not know how long that will take, and, on a loaded system, it can take quite
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)amd.8 5.7 (Berkeley) %G%
+.\" @(#)amd.8 5.8 (Berkeley) %G%
.\"
.\" $Id: amd.8,v 5.2.2.1 1992/02/09 15:11:39 jsp beta $
.\"
list chosen from: fatal, error, user, warn, info, map, stats, all.
.It Fl D Ar option
Select from a variety of debug options. Prefixing an
-option with the strings
+option with the string
.Em no
reverses the effect of that option. Options are cumulative.
The most useful option is
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)amq.8 8.1 (Berkeley) %G%
+.\" @(#)amq.8 8.2 (Berkeley) %G%
.\"
.\" $Id: amq.8,v 5.2.2.1 1992/02/09 15:11:41 jsp beta $
.\"
.It Fl v
Request the automounter to provide version information. This is a subset
of the information provided by
-.Xr amd Ns \'s
-.It Fl v
+.Xr amd Ns \'s Fl v
option.
.It Fl M
Request automounter to add the given map entry to the root map and then
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)inetd.8 8.1 (Berkeley) %G%
+.\" @(#)inetd.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt INETD 8
and should use a
.Dq wait
entry.
-.Xr Comsat 8
+.Xr Comsat 8 ,
.Pq Xr biff 1
and
.Xr talkd 8
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)lpc.8 8.1 (Berkeley) %G%
+.\" @(#)lpc.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt LPC 8
rearrange the order of jobs in a spooling queue,
.It
find the status of printers, and their associated
-spooling queues and printer dameons.
+spooling queues and printer daemons.
.El
.Pp
Without any arguments,
.It Ic \&? No [ command ... ]
.It Ic help No [ command ... ]
Print a short description of each command specified in the argument list,
-or, if no arguments are given, a list of the recognized commands.
+or, if no argument is given, a list of the recognized commands.
.Pp
.It Ic abort No {\ all\ |\ printer\ }
Terminate an active spooling daemon on the local host immediately and
.It Ic restart No {\ all\ |\ printer\ }
Attempt to start a new printer daemon.
This is useful when some abnormal condition causes the daemon to
-die unexpectedly leaving jobs in the queue.
+die unexpectedly, leaving jobs in the queue.
.Xr Lpq
will report that there is no daemon present when this condition occurs.
If the user is the super-user,
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)lpd.8 8.1 (Berkeley) %G%
+.\" @(#)lpd.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt LPD 8
DVI File. The file contains
.Tn Tex l
output
-DVI format from Standford).
+DVI format from Standford.
.It g
Graph File. The file contains data produced by
.Xr plot 3 .
is invoked in a pipeline).
.El
.Pp
-If a file can not be opened, a message will be logged via
+If a file cannot be opened, a message will be logged via
.Xr syslog 3
using the
.Em LOG_LPR
uses
.Xr flock 2
to provide exclusive access to the lock file and to prevent multiple
-deamons from becoming active simultaneously. If the daemon should be killed
+daemons from becoming active simultaneously. If the daemon should be killed
or die unexpectedly, the lock file need not be removed.
The lock file is kept in a readable
.Tn ASCII
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)mtree.8 8.1 (Berkeley) %G%
+.\" @(#)mtree.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt MTREE 8
compares the file hierarchy rooted in the current directory against a
specification read from the standard input.
Messages are written to the standard output for any files whose
-characteristics do not match the specification's, or which are
+characteristics do not match the specifications, or which are
missing from either the file hierarchy or the specification.
.Pp
The options are as follows:
.\" Robert Elz at The University of Melbourne.
.\" %sccs.include.redist.man%
.\"
-.\" @(#)quotaon.8 8.1 (Berkeley) %G%
+.\" @(#)quotaon.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt QUOTAON 8
If the
.Fl a
flag is supplied in place of any filesystem names,
-.Nm quotaon Ns / Ns quotaoff
+.Nm quotaon Ns / Ns Nm quotaoff
will enable/disable all the filesystems indicated in
.Pa /etc/fstab
to be read-write with disk quotas.
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)rmt.8 8.1 (Berkeley) %G%
+.\" @(#)rmt.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt RMT 8
.Xr rdump 8 ,
.Xr rrestore 8
.Sh BUGS
-People tempted to use this for a remote file access protocol
-are discouraged.
+People should be discouraged from using this for a remote
+file access protocol.
.Sh HISTORY
The
.Nm
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)rwhod.8 8.1 (Berkeley) %G%
+.\" @(#)rwhod.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt RWHOD 8
There should be a way to relay status information between networks.
Status information should be sent only upon request rather than continuously.
People often interpret the server dying
-or network communtication failures
+or network communication failures
as a machine going down.
.Sh HISTORY
The
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)aliases.5 8.1 (Berkeley) %G%
+.\" @(#)aliases.5 8.2 (Berkeley) %G%
.\"
.Dd
.Dt ALIASES 5
If you have compiled
.Xr sendmail
with DBM support instead of NEWDB,
-you may have encounter problems in
+you may have encountered problems in
.Xr dbm 3
restricting a single alias to about 1000 bytes of information.
You can get longer aliases by ``chaining''; that is, make the last name in
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)sendmail.8 8.3 (Berkeley) %G%
+.\" @(#)sendmail.8 8.4 (Berkeley) %G%
.\"
.Dd
.Dt SENDMAIL 8
.It Fl d Ns Ar X
Set debugging value to
.Ar X .
+.ne 1i
.It Fl F Ns Ar fullname
Set the full name of the sender.
.It Fl f Ns Ar name
.\"
.\" %sccs.include.redist.man%
.\"
-.\" @(#)trpt.8 8.1 (Berkeley) %G%
+.\" @(#)trpt.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt TRPT 8
option may be useful in checking to see if
any trace records are present for the socket in
question.
-The
.Pp
If debugging is being performed on a system or
core file other than the default, the last two
.\"
.\" %sccs.include.redist.roff%
.\"
-.\" @(#)update.8 8.1 (Berkeley) %G%
+.\" @(#)update.8 8.2 (Berkeley) %G%
.\"
.Dd
.Dt UPDATE 8
.Nm update
command helps protect the integrity of disk volumes
by flushing
-voliatile cached filesystem data
+volatile cached filesystem data
to disk at thirty second intervals.
.Nm Update
uses the
.Xr rc 8 ,
.Xr sync 8
.Sh BUGS
-It is possible on some systems, that a
+It is possible on some systems that a
.Xr sync
occuring simultaneously with a crash may cause
file system damage. See