Sir or Madam:
Some additional grammatical fixes should be attached to this message.
KUTGW,
Varik "NOT A COMPUTER PROGRAMMER!!!" Valefor
diff --git a/bin/csh/USD.doc/csh.2 b/bin/csh/USD.doc/csh.2
index af767ea3066..4d977df0529 100644
--- a/bin/csh/USD.doc/csh.2
+++ b/bin/csh/USD.doc/csh.2
@@ -293,7 +293,7 @@ date >! now
.DE
if you really wanted to overwrite the contents of `now'.
The `>!' is a special metasyntax indicating that clobbering the
-file is ok.\(dg
+file is OK.\(dg
.FS
\(dgThe space between the `!' and the word `now' is critical here, as `!now'
would be an invocation of the
@@ -400,7 +400,7 @@ list, denoting the argument list `\!*'.
Finally we ran the program `bug' to see that its output is indeed correct.
.PP
To make a numbered listing of the program we ran the `cat' command on the file
`bug.c', with the `-n' flag.
-Unfortunately, we mispelled `cat' as `cay'.
+Unfortunately, we misspelled `cat' as `cay'. \"hunspell saves the day!
To correct this
we used a shell substitute, placing the old text and new text between `^'
characters. This is similar to the substitute command in the editor.
diff --git a/bin/stty/stty.1 b/bin/stty/stty.1
index 9faa65de2d5..975a6011757 100644
--- a/bin/stty/stty.1
+++ b/bin/stty/stty.1
@@ -52,7 +52,7 @@ characteristics for the device that is its standard input.
If no options or operands are specified, it reports the settings of a subset
of characteristics as well as additional ones if they differ from their
default values.
-Otherwise it modifies
+Otherwise, it modifies
the terminal state according to the specified arguments.
Some combinations of arguments are mutually
exclusive on some terminal types.
@@ -99,7 +99,9 @@ This corresponds to the
in the termios structure.
.Bl -tag -width Ds
.It Cm parenb Pq Fl parenb
-Enable (disable) parity generation
+Enable
+.Pq disable
+parity generation
and detection.
.It Cm parodd Pq Fl parodd
Select odd (even) parity.
@@ -136,7 +138,8 @@ to
.Ar number .
.It Cm hupcl Pq Fl hupcl
Stop asserting modem control
-(do not stop asserting modem control) on last close.
+.Pq do not stop asserting modem control
+on last close.
.It Cm hup Pq Fl hup
Same as
.Cm hupcl
@@ -186,7 +189,8 @@ Ignore (do not ignore)
.Dv CR
on input.
.It Cm icrnl Pq Fl icrnl
-Map (do not map)
+Map
+.Pq do not map
.Dv CR
to
.Dv NL
@@ -195,7 +199,8 @@ on input.
Translate (do not translate) upper case to lower case
on input.
.It Cm ixon Pq Fl ixon
-Enable (disable)
+Enable
+.Pq disable
.Dv START/STOP
output
control.
@@ -360,8 +365,8 @@ erased with simply an
.Dv ERASE
character).
.It Cm mdmbuf Pq Fl mdmbuf
-If set, flow control output based on condition of Carrier Detect.
-Otherwise
+If set, flow control output is based on the condition of Carrier Detect.
+Otherwise,
writes return an error if Carrier Detect is low (and Carrier is not being
ignored with the
.Dv CLOCAL
diff --git a/lib/libc/gen/getpwnam.3 b/lib/libc/gen/getpwnam.3
index 1936d38026d..6255481c633 100644
--- a/lib/libc/gen/getpwnam.3
+++ b/lib/libc/gen/getpwnam.3
@@ -123,7 +123,7 @@ These file descriptors can be closed by a call to
It is dangerous for long-running programs to keep the file descriptors
open as the database will become out of date if it is updated while the
program is running.
-However the file descriptors are automatically closed when
+However, the file descriptors are automatically closed when
.Xr execve 2
is called.
.Pp
diff --git a/lib/libc/sys/mkdir.2 b/lib/libc/sys/mkdir.2
index f080bacf051..906402dd614 100644
--- a/lib/libc/sys/mkdir.2
+++ b/lib/libc/sys/mkdir.2
@@ -65,9 +65,9 @@ function is equivalent to
except that where
.Fa path
specifies a relative path,
-the newly created directory is created relative to
+the new directory is created relative to
the directory associated with file descriptor
-.Fa fd
+.Fa fd ,
instead of the current working directory.
.Pp
If
@@ -78,7 +78,7 @@ is passed the special value
.In fcntl.h )
in the
.Fa fd
-parameter, the current working directory is used
+parameter, the current working directory is used,
and the behavior is identical to a call to
.Fn mkdir .
.Sh RETURN VALUES
@@ -87,7 +87,7 @@ and the behavior is identical to a call to
.Fn mkdir
and
.Fn mkdirat
-will fail and no directory will be created if:
+will fail, and no directory will be created if:
.Bl -tag -width Er
.It Bq Er ENOTDIR
A component of the path prefix is not a directory.
@@ -118,7 +118,7 @@ There are no free inodes on the file system on which the
directory is being created.
.It Bq Er EDQUOT
The new directory cannot be created because the user's
-quota of disk blocks on the file system that will
+quota of disk blocks on the file system that would
contain the directory has been exhausted.
.It Bq Er EDQUOT
The user's quota of inodes on the file system on
@@ -189,7 +189,7 @@ Since
.Fn mkdir
reappeared in
.Bx 4.1c ,
-it no longer requires superuser privileges and it automatically creates the
+it no longer requires superuser privileges and automatically creates the
.Sq \&.
and
.Sq \&..
diff --git a/lib/libcrypto/man/PKCS7_verify.3 b/lib/libcrypto/man/PKCS7_verify.3
index 42c3338e672..3be3f20bc6f 100644
--- a/lib/libcrypto/man/PKCS7_verify.3
+++ b/lib/libcrypto/man/PKCS7_verify.3
@@ -209,7 +209,7 @@ and its validity is not considered important.
.Pp
Chain verification should arguably be performed using the signing time
rather than the current time.
-However since the signing time is supplied by the signer, it cannot be
+However, since the signing time is supplied by the signer, it cannot be
trusted without additional evidence (such as a trusted timestamp).
.Sh RETURN VALUES
.Fn PKCS7_verify
diff --git a/lib/libpcap/pcap-filter.5 b/lib/libpcap/pcap-filter.5
index 5555ed0259b..31b796d520c 100644
--- a/lib/libpcap/pcap-filter.5
+++ b/lib/libpcap/pcap-filter.5
@@ -259,9 +259,9 @@ which may be either a name from the networks database
(such as
.Pa /etc/networks )
or a network number.
-An IPv4 network number can be written as a dotted quad (e.g. 192.168.1.0),
-dotted triple (e.g. 192.168.1), dotted pair (e.g 172.16),
-or single number (e.g. 10);
+An IPv4 network number can be written as a dotted quad (e.g., 192.168.1.0),
+dotted triple (e.g., 192.168.1), dotted pair (e.g., 172.16),
+or single number (e.g., 10);
the netmask is 255.255.255.255 for a dotted quad
(which means that it's really a host match),
255.255.255.0 for a dotted triple, 255.255.0.0 for a dotted pair,
@@ -311,7 +311,7 @@ and
.Xr udp 4 ) .
If a name is used, both the port number and protocol are checked.
If a number or ambiguous name is used,
-only the port number is checked (e.g.\&
+only the port number is checked (e.g.,\&
.Dq dst port 513
will print both
TCP/login traffic and UDP/who traffic, and
diff --git a/lib/libskey/skey.5 b/lib/libskey/skey.5
index 5e704fa3b48..c2371fa080e 100644
--- a/lib/libskey/skey.5
+++ b/lib/libskey/skey.5
@@ -31,7 +31,7 @@ directory contains user records for the S/Key one-time
password authentication
system.
.Pp
Records take the form of files within
-.Pa /etc/skey
+.Pa /etc/skey ,
where each file is named for the user whose record it contains.
For example,
.Pa /etc/skey/root
@@ -39,7 +39,7 @@ would hold root's S/Key record.
.Pp
The mode for
.Pa /etc/skey
-should be 01730 and it should be owned by root and group auth.
+should be 01730, and it should be owned by root and group auth.
Individual records within
.Pa /etc/skey
should be owned by the user they describe and be mode 0600.
@@ -51,18 +51,18 @@ Each record consists of five lines:
The name of the user the record describes.
This should be the same as the name of the file.
.It
-The hash type used for this entry;
-one of md5, sha1, or rmd160.
+The hash type used for this entry:
+md5, sha1, or rmd160.
The default is md5.
.It
The sequence number.
-This is a decimal number between one and one thousand.
-Each time the user authenticates via S/Key this number is decremented by one.
+This is a decimal number between one and one-thousand.
+Each time the user authenticates via S/Key, this number is decremented by one.
.It
A seed used along with the sequence number and the six S/Key words to
compute the value.
.It
-The value expected from the crunching of the user's seed, sequence number
+The value expected from the crunching of the user's seed, sequence number,
and the six S/Key words.
When the result matches this value, authentication is considered to have
been successful.
diff --git a/lib/libusbhid/usbhid.3 b/lib/libusbhid/usbhid.3
index d214f576f18..26c8e2da2a1 100644
--- a/lib/libusbhid/usbhid.3
+++ b/lib/libusbhid/usbhid.3
@@ -86,7 +86,7 @@ The
.Nm
library provides routines to extract data from USB Human Interface Devices.
.Ss INTRODUCTION
-USB HID devices send and receive data laid out in a device dependent way.
+USB HIDs send and receive data laid out in a device-dependent way. \""HID
device" is semantically equivalent to "human interface device device", which is
redundant.
The
.Nm
library contains routines to extract the
@@ -117,10 +117,10 @@ return
.Fa NULL
on failure.
.Ss DESCRIPTOR PARSING FUNCTIONS
-To parse the report descriptor the
+To parse the report descriptor, the
.Fn hid_start_parse
function should be called with a report descriptor and a set that
-describes which items that are interesting.
+describes which items are interesting.
The set is obtained by or-ing together values
.Fa (1 << k)
where
@@ -142,7 +142,7 @@ function should be called to free internal data structures.
To iterate through all the items in the report descriptor,
.Fn hid_get_item
should be called while it returns a value greater than 0.
-When the report descriptor ends it will return 0; a syntax
+When the report descriptor ends, it will return 0. A syntax
error within the report descriptor will cause a return value less
than 0.
The struct pointed to by
@@ -154,7 +154,7 @@ can be found in
.In usbhid.h
and the meaning of the components in the USB HID documentation.
.Pp
-Data should be read/written to the device in the size of
+Data should be read from/written to the device in the size of
the report.
The size of a report (of a certain kind) can be computed by the
.Fn hid_report_size
@@ -162,11 +162,11 @@ function.
If the report is prefixed by an ID byte it is given by
.Fa id .
.Pp
-To locate a single item the
+To locate a single item, the
.Fn hid_locate
function can be used.
It should be given the usage code of
-the item and its kind and it will fill the item and return
+the item and its kind. It will fill the item and return
non-zero if the item was found.
.Ss NAME TRANSLATION FUNCTIONS
The function
@@ -198,13 +198,14 @@ A return value of \-1 indicates that an error has
occurred, and
.Va errno
is set.
.Ss DATA EXTRACTION FUNCTIONS
-Given the data obtained from a HID device and an item in the
-report descriptor the
+Given the data obtained from a human interface device and an item in the
+report descriptor, the
.Fn hid_get_data
function extracts the value of the item.
-Conversely
+Conversely,
.Fn hid_set_data
-can be used to put data into a report (which must be zeroed first).
+can be used to put data into a report
+.Pq which must be zeroed first .
.Sh FILES
.Pa /usr/share/misc/usb_hid_usages
The default HID usage table.
diff --git a/lib/libz/compress.3 b/lib/libz/compress.3
index cfac9217c79..653dac6beb8 100644
--- a/lib/libz/compress.3
+++ b/lib/libz/compress.3
@@ -754,7 +754,7 @@ in which case the number of unused bits will be less than
eight.
should normally be called until it returns
.Dv Z_STREAM_END
or an error.
-However if all decompression is to be performed in a single step
+However, if all decompression is to be performed in a single step
.Pq a single call to inflate ,
the parameter
.Fa flush
@@ -1599,7 +1599,7 @@ to signal its absence.
This allows the use of
.Fn deflateSetHeader
with the returned structure to duplicate the header.
-However if those fields are set to allocated memory,
+However, if those fields are set to allocated memory,
then the application will need to save those pointers
elsewhere so that they can be eventually freed.
.Pp
diff --git a/sbin/atactl/atactl.8 b/sbin/atactl/atactl.8
index c2c342e8d4e..84f0fe6d43e 100644
--- a/sbin/atactl/atactl.8
+++ b/sbin/atactl/atactl.8
@@ -336,12 +336,12 @@ A value of 0 will disable the Standby timer.
.Pp
.It Li sleep
Place the specified device into Sleep mode.
-This mode will consume less power than Standby mode,
+This mode will consume less power than Standby mode
but requires a device reset to resume operation.
Typically the
@@ -423,17 +423,19 @@ The summary error log.
.It Li smartstatus
Reads the reliability status of the specified device.
If the device reports
-that one of its thresholds is exceeded (a strong indication of imminent
-failure), the warning
+that one of its thresholds is exceeded
+.Pq a strong indication of imminent failure ,
+the warning
.Sq SMART threshold exceeded!\&
-is printed to stderr and a status of 2 is returned.
+is printed to stderr, and a status of 2 is returned.
.Pp
.It Li standby
Place the specified device into Standby mode.
This mode will consume less power than Idle mode.
.Pp
.It Li writecachedisable
-Disable the write cache on the specified device (if supported).
+Disable the write cache on the specified device
+.Pq if supported .
This may decrease performance.
Support for and status of write caching is indicated by the device with
.Sq write cache
@@ -508,7 +510,7 @@ command indicates support for the requested action.
The device will typically respond with an
.Sq ATA device returned Aborted Command
if the requested action is not supported.
-Similarly a device might not implement all commands in a feature set,
+Similarly, a device might not implement all commands in a feature set,
so even though disabling a feature works, enabling might not.
.Sh BUGS
The output from the
diff --git a/sbin/iked/iked.conf.5 b/sbin/iked/iked.conf.5
index bf109c8de41..ffa7c96c0ad 100644
--- a/sbin/iked/iked.conf.5
+++ b/sbin/iked/iked.conf.5
@@ -945,7 +945,7 @@ keyword.
This is because the most significant bit of each byte is used for parity.
.Pp
The keysize of AES-CTR is actually 128-bit.
-However as well as the key, a 32-bit nonce has to be supplied.
+However, as well as the key, a 32-bit nonce has to be supplied.
Thus 160 bits of key material have to be supplied.
The same applies to AES-GCM, AES-GMAC and Chacha20-Poly1305,
however in the latter case the keysize is 256 bit.
@@ -983,7 +983,7 @@ MODP (exponentiation groups modulo a prime),
ECP (elliptic curve groups modulo a prime),
or Curve25519.
Please note that MODP groups of less than 2048 bits are considered
-as weak or insecure (see RFC 8247 section 2.4) and only provided for
+weak or insecure (see RFC 8247 section 2.4) and only provided for
backwards compatibility.
.Sh FILES
.Bl -tag -width /etc/examples/iked.conf -compact
diff --git a/sbin/ipsecctl/ipsec.conf.5 b/sbin/ipsecctl/ipsec.conf.5
index 83c9f495c0c..8d586e0c73d 100644
--- a/sbin/ipsecctl/ipsec.conf.5
+++ b/sbin/ipsecctl/ipsec.conf.5
@@ -663,8 +663,8 @@ keyword:
This is because the most significant bit of each byte is used for parity.
.Pp
The keysize of AES-CTR can be 128, 192, or 256 bits.
-However as well as the key, a 32-bit nonce has to be supplied.
-Thus 160, 224, or 288 bits of key material, respectively, have to be supplied.
+However, as well as the key, a 32-bit nonce has to be supplied.
+Thus 160, 224, or 288 bits of key material, respectively, must be supplied.
\"This change avoids the problem of plurality -- should "bits" be treated as
being plural or singular in this case?
The same applies to AES-GCM and AES-GMAC.
.Pp
Using AES-GMAC or NULL with ESP will only provide authentication.
diff --git a/sbin/mount_msdos/mount_msdos.8 b/sbin/mount_msdos/mount_msdos.8
index fb9950161d3..30e65cccacb 100644
--- a/sbin/mount_msdos/mount_msdos.8
+++ b/sbin/mount_msdos/mount_msdos.8
@@ -69,7 +69,7 @@ device must correspond to a partition registered in the
.Pp
This command is normally executed by
.Xr mount 8
-at boot time, but can be used by any user to mount an
+at boot time but can be used by any user to mount an
MS-DOS file system on any directory that they own (provided,
of course, that they have appropriate access to the device that
contains the file system).
@@ -160,7 +160,7 @@ or unset using
.Li chmod +w .
.Pp
File modes work the same way for directories.
-However a directory will inherit the executable bit if it is readable.
+However, a directory will inherit the executable bit if it is readable.
See
.Xr chmod 1
for more information about octal file modes.
diff --git a/share/man/man4/gre.4 b/share/man/man4/gre.4
index 18d98b62402..622aa37cd15 100644
--- a/share/man/man4/gre.4
+++ b/share/man/man4/gre.4
@@ -361,7 +361,7 @@ GRE should only be deployed on trusted private networks,
or protected with IPsec to add authentication and encryption for
confidentiality.
IPsec is especially recommended when transporting GRE over the
-public internet.
+public Internet.
.Pp
The Packet Filter
.Xr pf 4
@@ -458,7 +458,7 @@ pass quick on gre proto gre no state
.Ss Point-to-Point Ethernet over GRE tunnel interfaces (egre) example
.Nm egre
can be used to carry Ethernet traffic between two endpoints over
-an IP network, including the public internet.
+an IP network, including the public Internet.
This can also be achieved using
.Xr etherip 4 ,
but
@@ -467,7 +467,7 @@ offers the ability to carry different Ethernet networks
between the
same endpoints by using virtual network identifiers to distinguish
between them.
.Pp
-For example, a pair of routers separated by the internet could
+For example, a pair of routers separated by the Internet could
bridge several Ethernet networks using
.Nm egre
and
@@ -477,7 +477,7 @@ In this example the first router has a public IP of
192.0.2.1, and
the second router has 203.0.113.2.
They are connecting the Ethernet networks on two
.Xr vlan 4
-interfaces over the internet.
+interfaces over the Internet.
A separate
.Nm egre
and
@@ -477,7 +477,7 @@ In this example the first router has a public IP of
192.0.2.1, and
the second router has 203.0.113.2.
They are connecting the Ethernet networks on two
.Xr vlan 4
-interfaces over the internet.
+interfaces over the Internet.
A separate
.Nm egre
tunnel is created for each VLAN and given different virtual network
@@ -488,7 +488,7 @@ The
interfaces are explicitley configured to provide the same MTU as the
.Xr vlan 4
interfaces (1500 bytes) with fragmentation enabled so they can be
-carried over the internet, which has the same or lower MTU.
+carried over the Internet, which has the same or lower MTU.
.Pp
At the first site:
.Bd -literal -offset indent
@@ -621,7 +621,7 @@ On physical host 3:
.Ed
.Pp
Being able to carry working multicast and jumbo frames over the
-public internet is unlikely, which makes it difficult to use NVGRE
+public Internet is unlikely, which makes it difficult to use NVGRE
to extended Ethernet VPNs between different sites.
.Nm nvgre
and
diff --git a/share/man/man4/pfsync.4 b/share/man/man4/pfsync.4
index 109c30d0966..213ade3383f 100644
--- a/share/man/man4/pfsync.4
+++ b/share/man/man4/pfsync.4
@@ -123,11 +123,11 @@ keyword.
.\" # ifconfig pfsync0 syncpeer 10.0.0.2 syncdev enc0
.\" .Ed
.Pp
-It is important that the pfsync traffic be well secured
-as there is no authentication on the protocol and it would
-be trivial to spoof packets which create states, bypassing the pf ruleset.
+It is important that the pfsync traffic be well secured,
+as there is no authentication on the protocol, and it would
+be trivial to spoof packets which create states, thereby bypassing the pf
ruleset.
Only run the pfsync protocol on a trusted network \- ideally a network
-dedicated to pfsync messages such as a crossover cable between two firewalls.
+dedicated to pfsync messages, such as a crossover cable between two firewalls.
.\" or specify a peer address and protect the traffic with
.\" .Xr ipsec 4 .
.Sh EXAMPLES
@@ -150,8 +150,8 @@ interface, using the 192.168.254.0/24 subnet.
A crossover cable connects the two firewalls via their sis2 interfaces.
On all three interfaces, firewall A uses the .254 address, while firewall B
uses .253.
-The interfaces are configured as follows (firewall A unless otherwise
-indicated):
+The interfaces are configured as follows
+.Pq firewall A unless otherwise indicated :
.Pp
.Pa /etc/hostname.sis0 :
.Dl inet 10.0.0.254 255.255.255.0 NONE
@@ -190,8 +190,8 @@ pass quick on { sis2 } proto pfsync keep state (no-sync)
pass on { sis0 sis1 } proto carp keep state (no-sync)
.Ed
.Pp
-It is preferable that one firewall handle the forwarding of all the traffic,
-therefore the
+It is preferable that one firewall handle the forwarding of all the traffic;
+therefore, the
.Ar advskew
on the backup firewall's
.Xr carp 4
diff --git a/share/man/man4/pppoe.4 b/share/man/man4/pppoe.4
index a6af9e09005..ad1e68d1cb5 100644
--- a/share/man/man4/pppoe.4
+++ b/share/man/man4/pppoe.4
@@ -53,8 +53,9 @@ This Ethernet interface is connected to the
.Nm
interface via
.Xr ifconfig 8 .
-The Ethernet interface needs to be marked UP, but does not need to have an
-IP address.
+The Ethernet interface needs to be marked UP, but the interface does not
+need to have an IP address.
.Pp
There are two basic modes of operation, controlled via the
.Em link1
@@ -81,7 +82,9 @@ Create the interface.
.It
Connect an Ethernet interface.
This interface is used for the physical communication.
-As noted above it must be marked UP, but need not have an IP address.
+As noted above it must be marked UP, but the interface need not have an
+IP address.
+\"This problem is another comma conjunction thing.
.It
Configure authentication.
The PPP session needs to identify the client to the peer.
@@ -121,8 +124,8 @@ be changed to an address suggested by the peer.
.Pp
If the destination address is set to a wildcard address in the range
from 0.0.0.1 to 0.0.0.255, it will be changed to an address suggested
-by the peer, and if a default route which uses this interface exists
-the gateway will be changed to the suggested address as well.
+by the peer, and if a default route which uses this interface exists,
+then the gateway will be changed to the suggested address, as well.
.Pp
Otherwise, PPP negotiation will only agree to exactly the IPv4 addresses
which are configured on the interface.
@@ -130,8 +133,8 @@ which are configured on the interface.
.Nm
does not interfere with other PPPoE implementations
running on the same machine.
-However under some circumstances
-(such as after a crash or power failure)
+However, under some circumstances
+.Pq such as after a crash or power failure ,
the peer device might initially refuse to
reestablish a new PPPoE connection
because there is already an open session.
@@ -153,15 +156,15 @@ and
Standard Ethernet uses a
maximum transmission unit (MTU)
of 1500 bytes,
-whereas PPPoE mechanisms need a further 8 bytes of overhead.
+whereas PPPoE mechanisms need an additional 8 bytes of overhead.
+\""Further" seemed an inappropriate word.
This leaves a maximum MTU of 1492.
.Nm
sets the MTU on its interface to 1492 as a matter of course.
However,
machines connecting on a private LAN will still have their MTUs set to 1500,
causing conflict.
-Using a packet filter,
-the
+Using a packet filter, the
maximum segment size (MSS)
can be set (clamped) to the required value.
The following rule in
@@ -243,7 +246,7 @@ but not the maximum MTU supported on the path between them.
If the path cannot pass the larger Ethernet frames, negotiation will succeed
but the connection will not function correctly.
.Sh BUGS
-This implementation is client side only.
+This implementation is client-side only.
.Pp
It is important to specify
.Dq Li netmask 255.255.255.255
@@ -255,7 +258,8 @@ configured to the interface, and it will persist after
negotiation.
The presence of a
.Xr mygate 5
file will interfere with the routing table.
-Make sure this file is either empty or does not exist.
+Make sure this file is empty or does not exist.
+\""[E]ither" was unnecessary in the above sentence.
.Pp
Two
.Nm
diff --git a/share/man/man4/virtio.4 b/share/man/man4/virtio.4
index cc23a8ddbb8..952c4478548 100644
--- a/share/man/man4/virtio.4
+++ b/share/man/man4/virtio.4
@@ -58,9 +58,8 @@ The
driver conforms to the virtio 0.9.5 specification.
The virtio 1.0 standard is only supported for PCI devices.
.Pp
-By default 0.9 is preferred over 1.0.
-This can be changed by setting the bit 0x4 in the flags.
-Setting the bit 0x8 in the flags disables 1.0 support completely.
+By default, 0.9 is preferred over 1.0.
+This can be changed by setting the bit 0x4 in the flags, which disables 1.0
support completely.
.Sh SEE ALSO
.Xr intro 4
.Sh HISTORY
diff --git a/share/man/man7/roff.7 b/share/man/man7/roff.7
index f7d1dd892e1..b2e7584df36 100644
--- a/share/man/man7/roff.7
+++ b/share/man/man7/roff.7
@@ -1118,13 +1118,13 @@ or to false if the result is zero or negative.
.It
Otherwise, the first character of
.Ar condition
-is regarded as a delimiter and it evaluates to true if the string
+is regarded as a delimiter and evaluates to true if the string
extending from its first to its second occurrence is equal to the
string extending from its second to its third occurrence.
.It
If
.Ar condition
-cannot be parsed, it evaluates to false.
+cannot be parsed; it evaluates to false.
.El
.Pp
If a conditional is false, its children are not processed, but are
@@ -1596,7 +1596,7 @@ Define permissible point sizes.
This is a groff extension and currently ignored.
.It Ic \&so Ar filename
Include a source file.
-The file is read and its contents processed as input in place of the
+The file is read, and its contents are processed as input in place of the
.Ic \&so
request line.
To avoid inadvertent inclusion of unrelated files,
diff --git a/usr.bin/mandoc/apropos.1 b/usr.bin/mandoc/apropos.1
index 5f1229f8913..c0b551644a5 100644
--- a/usr.bin/mandoc/apropos.1
+++ b/usr.bin/mandoc/apropos.1
@@ -112,7 +112,9 @@ Prepend the colon-separated paths to the list of paths
searched
for
.Xr makewhatis 8
databases.
-Invalid paths, or paths without manual databases, are ignored.
+Invalid paths and paths without manual databases are ignored.
+\" The previous version of this bit implied that
+\" all invalid paths lack manual databases.
.It Fl O Ar outkey
Show the values associated with the key
.Ar outkey
@@ -151,7 +153,8 @@ and
The
.Fl a
operator has precedence over
-.Fl o
+.Fl o ,
+\" COMPOUND SENTENCE
and both are evaluated left-to-right.
.Bl -tag -width Ds
.It \&( Ar expr No \&)
@@ -354,7 +357,8 @@ A colon-separated list of directories to search for manual
pages; see
.Xr man 1
for details.
Overridden by
-.Fl M ,
+.Fl M ;
+\" FIXED RUN-ON
ignored if
.Fl l
is specified.
diff --git a/usr.bin/mandoc/man.1 b/usr.bin/mandoc/man.1
index eb0fae7a9d3..347aad63cec 100644
--- a/usr.bin/mandoc/man.1
+++ b/usr.bin/mandoc/man.1
@@ -160,8 +160,8 @@ architecture.
.Ar subsection
is case insensitive.
.Pp
-By default manual pages for all architectures are installed.
-Therefore this option can be used to view pages for one
+By default, manual pages for all architectures are installed.
+Therefore, this option can be used to view pages for one
architecture whilst using another.
.Pp
This option overrides the
@@ -258,10 +258,10 @@ man pages can be found in
.It Ev MACHINE
As some manual pages are intended only for specific architectures,
.Nm
-searches any subdirectories,
+searches any subdirectories
with the same name as the current architecture,
in every directory which it searches.
-Machine specific areas are checked before general areas.
+Machine-specific areas are checked before general areas.
The current machine type may be overridden by setting the environment
variable
.Ev MACHINE
diff --git a/usr.bin/nc/nc.1 b/usr.bin/nc/nc.1
index fff5857229a..3a566eb831e 100644
--- a/usr.bin/nc/nc.1
+++ b/usr.bin/nc/nc.1
@@ -30,7 +30,7 @@
.Os
.Sh NAME
.Nm nc
-.Nd arbitrary TCP and UDP connections and listens
+.Nd establishes and listens to arbitrary TCP and UDP connections
.Sh SYNOPSIS
.Nm nc
.Op Fl 46cDdFhklNnrStUuvz
@@ -207,8 +207,8 @@ and
.Fl C .
.It Fl P Ar proxy_username
Specifies a username to present to a proxy server that requires authentication.
-If no username is specified then authentication will not be attempted.
-Proxy authentication is only supported for HTTP CONNECT proxies at present.
+If no username is specified, then authentication will not be attempted.
+Proxy authentication is currently only supported for HTTP CONNECT proxies.
.It Fl p Ar source_port
Specify the source port
.Nm
diff --git a/usr.bin/openssl/openssl.1 b/usr.bin/openssl/openssl.1
index e364586f5ad..5300b9fc803 100644
--- a/usr.bin/openssl/openssl.1
+++ b/usr.bin/openssl/openssl.1
@@ -105,8 +105,8 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
-.\" The licence and distribution terms for any publically available version or
-.\" derivative of this code cannot be changed. i.e. this code cannot simply be
+.\" The licence and distribution terms for any publicly available version or
+.\" derivative of this code cannot be changed, i.e., this code cannot simply be
.\" copied and put under another distribution licence
.\" [including the GNU Public Licence.]
.\"
@@ -4366,7 +4366,7 @@ Enable various workarounds for buggy implementations.
A
.Ar file
containing trusted certificates to use during server authentication
-and to use when attempting to build the client certificate chain.
+and when attempting to build the client certificate chain.
.It Fl CApath Ar directory
The
.Ar directory
@@ -4679,7 +4679,7 @@ Enable various workarounds for buggy implementations.
A
.Ar file
containing trusted certificates to use during client authentication
-and to use when attempting to build the server certificate chain.
+and when attempting to build the server certificate chain. \""[T]o use" is
unnecessary here.
The list is also used in the list of acceptable client CAs passed to the
client when a certificate is requested.
.It Fl CApath Ar directory
@@ -4864,7 +4864,7 @@ will be loaded.
.It Fl www
Send a status message to the client when it connects,
including information about the ciphers used and various session parameters.
-The output is in HTML format so this option will normally be used with a
-The output is in HTML format so this option will normally be used with a
+The output is in HTML format, so this option will normally be used with a
\"Compound sentences must be joined with conjunctions AND commas.
web browser.
.It Fl Verify Ar depth , Fl verify Ar depth
Request a certificate chain from the client,
@@ -4918,7 +4918,7 @@ Enable various workarounds for buggy implementations.
A
.Ar file
containing trusted certificates to use during server authentication
-and to use when attempting to build the client certificate chain.
+and when attempting to build the client certificate chain.
.It Fl CApath Ar directory
The directory to use for server certificate verification.
This directory must be in
@@ -6605,7 +6605,7 @@ considered to be a possible CA;
other extensions are checked according to the intended use of the certificate.
A warning is given in this case because the certificate should really not
be regarded as a CA.
-However it is allowed to be a CA to work around some broken software.
+However, it is allowed to be a CA to work around some broken software.
.Pp
If the certificate is a V1 certificate
(and thus has no extensions) and it is self-signed,
diff --git a/usr.bin/sed/sed.1 b/usr.bin/sed/sed.1
index 87a5d04aa4a..3ea1f27fa67 100644
--- a/usr.bin/sed/sed.1
+++ b/usr.bin/sed/sed.1
@@ -59,9 +59,8 @@ The input is then written to the standard output.
.Pp
A single command may be specified as the first argument to
.Nm sed .
-Multiple commands may be specified
-separated by newlines or semicolons,
-or by using the
+Multiple commands may be separated \" "[S]pecified" was unnecessary here.
+by newlines or semicolons, or by using the
.Fl e
or
.Fl f
@@ -427,7 +426,7 @@ string for the first instance of the regular expression
in the pattern space.
Any character other than backslash or newline can be used instead of
a slash to delimit the regular expression and the replacement.
-Also see the the section about
+Also see the section about
.Sx SED REGULAR EXPRESSIONS .
.Pp
An ampersand
diff --git a/usr.bin/sendbug/sendbug.1 b/usr.bin/sendbug/sendbug.1
index 65850f93cd5..f7d1e75a6b4 100644
--- a/usr.bin/sendbug/sendbug.1
+++ b/usr.bin/sendbug/sendbug.1
@@ -34,7 +34,7 @@ output are important for ACPI development and can only be
included if
is run as root.
.Pp
Fields enclosed in
-.Sq <>
+.Sq Aq
should be completed by the user.
Once the PR is filled out,
the user exits the editor and is presented with a choice:
@@ -62,10 +62,10 @@ Do not attach
.Xr dmesg 8 ,
.Xr usbdevs 8 ,
.Xr pcidump 8 ,
-and
+or
.Xr acpidump 8
output to the report.
-This information is very helpful in reports,
+This information is very helpful in reports
but may contain sensitive information about the sender.
This flag helps protect users' privacy in those cases.
.It Fl E
diff --git a/usr.sbin/authpf/authpf.8 b/usr.sbin/authpf/authpf.8
index 51d3aeeb46b..647d4e9f312 100644
--- a/usr.sbin/authpf/authpf.8
+++ b/usr.sbin/authpf/authpf.8
@@ -49,10 +49,11 @@ is a user shell
which allows multiple connections to take
place from the same IP address.
It is useful primarily in cases where connections are tunneled via
-the gateway system, and can be directly associated with the user name.
+the gateway system and can be directly associated with the username.
+\"A comma was unnecessary here.
It cannot ensure accountability when
classifying connections by IP address;
-in this case the client's IP address
+in this case, the client's IP address
is not provided to the packet filter via the
.Ar client_ip
macro or the
@@ -128,7 +129,7 @@ which is assigned the connecting IP address whenever
is run.
Additionally, the macro
.Em user_id
-is assigned the user name.
+is assigned the username.
.Pp
Rules are stored in a file called
.Pa authpf.rules .
@@ -528,7 +529,7 @@ anchor "authpf/*" from <authpf_users>
\- normally
.Nm
allows only one session per client IP address.
-However in some cases, such as when connections are tunneled via
+However, in some cases, such as when connections are tunneled via
.Xr ssh 1
or
.Xr ipsec 4 ,
diff --git a/usr.sbin/lpr/lpd/lpd.8 b/usr.sbin/lpr/lpd/lpd.8
index 665f2351ed5..9fa28248e03 100644
--- a/usr.sbin/lpr/lpd/lpd.8
+++ b/usr.sbin/lpr/lpd/lpd.8
@@ -84,7 +84,7 @@ Use of this option silently overrides the
.Fl s
option if it is also present on the command line.
.Ar bind-address
-can be a numeric host name in IPV4 or IPV6 notation, or a symbolic host
+can be a numeric host name in IPv4 or IPv6 notation, or a symbolic host
name which will be looked up in the normal way.
.It Fl d
The
@@ -134,17 +134,18 @@ does not listen on a TCP socket but only takes commands
from a
socket.
This is valuable when the machine on which
.Nm
-runs is subject to attack over the network and it is desired that the
-machine be protected from attempts to remotely fill spools and similar
-attacks.
+runs is subject to attack over the network and the machine should be
+protected from attempts to remotely fill spools and similar attacks.
.It Fl w Ar maxwait
The
.Fl w
flag sets
.Ar maxwait
-as the wait time (in seconds) for dead remote server detection.
+as the wait time
+.Pq in seconds
+for dead remote server detection.
If no response is returned from a connected server within this period,
-the connection is closed and a message logged.
+the connection is closed, and a message is logged.
The default is 300 seconds.
.El
.Pp
@@ -161,7 +162,9 @@ Access control is provided by two means.
First, all requests must come from one of the machines listed in the file
.Pa /etc/hosts.lpd ,
one hostname per line.
-A plus "+" may be used as a wildcard to grant access to all hosts.
+A plus
+.Qq +
+may be used as a wildcard to grant access to all hosts.
Second, if the
.Dq rs
capability is specified in the
@@ -188,14 +191,15 @@ file can be edited with your favorite text editor.
.Pp
The daemon begins processing files
after it has successfully set the lock for exclusive
-access (described a bit later),
+access
+.Pq described a bit later ,
and scans the spool directory
for files beginning with
.Em cf .
Lines in each
.Em cf
file specify files to be printed or non-printing actions to be performed.
-Each such line begins with a key character to specify what to do
+Of these lines, each line begins with a key character to specify what to do
with the remainder of the line.
.Bl -tag -width Ds
.It J
@@ -238,7 +242,8 @@ Name of a file to print using
as a filter.
.It t
Troff File.
-The file contains troff output (cat phototypesetter commands).
+The file contains troff output
+.Pq cat phototypesetter commands .
.It n
Ditroff File.
The file contains device independent troff output.
@@ -357,5 +362,5 @@ daemon appeared in
@@ -357,5 +362,5 @@ daemon appeared in
previously required that clients connected using a privileged port
(below 1024).
This restriction was removed because it does not provide additional
-security and also because many modern clients connect using an
-unprivileged port.
+security, and because many modern clients connect using
+unprivileged ports.
diff --git a/usr.sbin/relayd/relayd.conf.5 b/usr.sbin/relayd/relayd.conf.5
index 491fc216b71..246a9edc5c9 100644
--- a/usr.sbin/relayd/relayd.conf.5
+++ b/usr.sbin/relayd/relayd.conf.5
@@ -175,7 +175,7 @@ is used.
.It Ic timeout Ar number
Set the global timeout in milliseconds for checks.
This can be overridden by the timeout value in the table definitions.
-The default timeout is 200 milliseconds and it must not exceed the
+The default timeout is 200 milliseconds, and it must not exceed the
global interval.
Please note that the default value is optimized for checks within the
same collision domain \(en use a higher timeout, such as 1000 milliseconds,
@@ -1048,7 +1048,7 @@ Valid options are:
.Bl -tag -width Ds
.It Ic headerlen Ar number
Set the maximum size of all HTTP headers in bytes.
-The default value is 8192 and it is limited to a maximum of 131072.
+The default value is 8192, and it is limited to a maximum of 131072.
.It Ic websockets
Allow connection upgrade to websocket protocol.
The default is
diff --git a/usr.sbin/tcpdump/tcpdump.8 b/usr.sbin/tcpdump/tcpdump.8
index 37402e53a27..90ad8ed6a1b 100644
--- a/usr.sbin/tcpdump/tcpdump.8
+++ b/usr.sbin/tcpdump/tcpdump.8
@@ -130,10 +130,10 @@ Any additional expressions given on the command line are
ignored.
.It Fl f
Print
.Dq foreign
-internet addresses numerically rather than symbolically.
+Internet addresses numerically rather than symbolically.
This option is intended to get around serious brain damage in
-Sun's yp server \(em usually it hangs forever translating non-local
-internet numbers.
+Sun's yp server \(em usually it hangs forever, translating non-local
+Internet numbers.
.It Fl I
Print the interface on each dump line.
.It Fl i Ar interface
@@ -220,7 +220,7 @@ where
.Em proto
is the name of the protocol level at which the truncation has occurred.
Taking larger snapshots both increases the amount of time it takes
-to process packets and, effectively, decreases the amount of packet buffering.
+to process packets and effectively decreases the amount of packet buffering.
This may cause packets to be lost.
You should limit
.Ar snaplen
@@ -1027,7 +1027,7 @@ To print all traffic between local hosts and hosts at
Berkeley:
.Pp
.Dl # tcpdump net ucb-ether
.Pp
-To print all FTP traffic through internet gateway snup:
+To print all FTP traffic through Internet gateway snup:
.Pp
.Dl # tcpdump 'gateway snup and (port ftp or ftp-data)'
.Pp
@@ -1187,10 +1187,10 @@ arp who-has csam tell rtsg
arp reply csam is-at CSAM
.Ed
.Pp
-In this example, Ethernet addresses are in caps and internet addresses
+In this example, Ethernet addresses are in caps and Internet addresses
in lower case.
The first line says that rtsg sent an arp packet asking for
-the Ethernet address of internet host csam.
+the Ethernet address of Internet host csam.
csam replies with its Ethernet address CSAM.
.Pp
This would look less redundant if we had done
@@ -1297,7 +1297,7 @@ to port login on host csam.
The
.Ql S
indicates that the SYN flag was set.
-The packet sequence number was 768512 and it contained no data.
+The packet sequence number was 768512, and it contained no data.
The notation is
.Sm off
.So
@@ -1469,7 +1469,7 @@ In the first example, helios responds to query
3 from h2opolo
with 3 answer records, 3 name server records and 7 authority records.
The first answer record is type A
-.Pq address and its data is internet
+.Pq address, and its data is Internet
address 128.32.137.3.
The total size of the response was 273 bytes, excluding UDP and IP headers.
The
diff --git a/usr.sbin/ypbind/ypbind.8 b/usr.sbin/ypbind/ypbind.8
index 4e5c771375c..5a454f6afe7 100644
--- a/usr.sbin/ypbind/ypbind.8
+++ b/usr.sbin/ypbind/ypbind.8
@@ -73,7 +73,7 @@ Once a binding is established,
.Nm
maintains this binding by periodically communicating with the server to which
it is bound.
-If the binding is somehow lost, e.g by server reboot,
+If the binding is somehow lost, e.g., by server reboot,
.Nm
marks the domain as unbound and attempts to re-establish the binding.
When the binding is once again successful,