Fix typos in man/

Reviewed-by: Ryan Moeller <ryan@ixsystems.com>
Reviewed-by: Richard Laager <rlaager@wiktel.com>
Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Signed-off-by: Andrea Gelmini <andrea.gelmini@gelma.net>
Closes #9233
This commit is contained in:
Andrea Gelmini 2019-08-30 18:41:35 +02:00 committed by Brian Behlendorf
parent 2b96f77423
commit ac3d4d0cf6
8 changed files with 16 additions and 16 deletions

View File

@ -31,7 +31,7 @@
.IX "OS-Net build tools" "cstyle" "" "\fBcstyle\fP" .IX "OS-Net build tools" "cstyle" "" "\fBcstyle\fP"
.LP .LP
.I cstyle .I cstyle
inspects C source files (*.c and *.h) for common sylistic errors. It inspects C source files (*.c and *.h) for common stylistic errors. It
attempts to check for the cstyle documented in attempts to check for the cstyle documented in
\fIhttp://www.cis.upenn.edu/~lee/06cse480/data/cstyle.ms.pdf\fP. \fIhttp://www.cis.upenn.edu/~lee/06cse480/data/cstyle.ms.pdf\fP.
Note that there is much in that document that Note that there is much in that document that

View File

@ -175,5 +175,5 @@ By default the stack size is limited to 256K.
.BR "zfs (1)" "," .BR "zfs (1)" ","
.BR "zdb (1)" "," .BR "zdb (1)" ","
.SH "AUTHOR" .SH "AUTHOR"
This manual page was transvered to asciidoc by Michael Gebetsroither This manual page was transferred to asciidoc by Michael Gebetsroither
<gebi@grml.org> from http://opensolaris.org/os/community/zfs/ztest/ <gebi@grml.org> from http://opensolaris.org/os/community/zfs/ztest/

View File

@ -41,7 +41,7 @@ disk enclosure).
.TP .TP
\fIenclosure_symlinks\fR <yes|no> \fIenclosure_symlinks\fR <yes|no>
Additionally create /dev/by-enclosure symlinks to the disk enclosure Additionally create /dev/by-enclosure symlinks to the disk enclosure
sg devices using the naming scheme from from vdev_id.conf. sg devices using the naming scheme from vdev_id.conf.
\fIenclosure_symlinks\fR is only allowed for sas_direct mode. \fIenclosure_symlinks\fR is only allowed for sas_direct mode.
.TP .TP
\fIenclosure_symlinks_prefix\fR <prefix> \fIenclosure_symlinks_prefix\fR <prefix>

View File

@ -557,7 +557,7 @@ How many write errors that have been detected on the vdev.
\fBvdev_cksum_errors\fR \fBvdev_cksum_errors\fR
.ad .ad
.RS 12n .RS 12n
How many checkum errors that have been detected on the vdev. How many checksum errors that have been detected on the vdev.
.RE .RE
.sp .sp
@ -858,7 +858,7 @@ such as IDE or parallel SCSI.
.RS 12n .RS 12n
If this field exists, it is an array of counters. Each entry counts bit clears If this field exists, it is an array of counters. Each entry counts bit clears
in a particular bit of a big-endian uint64 type. The first entry counts bits in a particular bit of a big-endian uint64 type. The first entry counts bits
clears of the the high-order bit of the first byte, the 9th byte, etc, and the clears of the high-order bit of the first byte, the 9th byte, etc, and the
last entry counts clears of the low-order bit of the 8th byte, the 16th byte, last entry counts clears of the low-order bit of the 8th byte, the 16th byte,
etc. This information is useful for observing a stuck bit in a parallel data etc. This information is useful for observing a stuck bit in a parallel data
path, such as IDE or parallel SCSI. path, such as IDE or parallel SCSI.

View File

@ -936,7 +936,7 @@ Default value: \fB0\fR.
.ad .ad
.RS 12n .RS 12n
Minimum time "prescient prefetched" blocks are locked in the ARC, specified Minimum time "prescient prefetched" blocks are locked in the ARC, specified
in ms. These blocks are meant to be prefetched fairly aggresively ahead of in ms. These blocks are meant to be prefetched fairly aggressively ahead of
the code that may use them. A value of \fB0\fR will default to 6000 ms. the code that may use them. A value of \fB0\fR will default to 6000 ms.
.sp .sp
Default value: \fB0\fR. Default value: \fB0\fR.
@ -2701,7 +2701,7 @@ Default value: \fB20\fR which is 5% of RAM (1/20).
.ad .ad
.RS 12n .RS 12n
The fraction of the hard limit used to determined the soft limit for I/O sorting The fraction of the hard limit used to determined the soft limit for I/O sorting
by the sequential scan algorithm. When we cross this limit from bellow no action by the sequential scan algorithm. When we cross this limit from below no action
is taken. When we cross this limit from above it is because we are issuing is taken. When we cross this limit from above it is because we are issuing
verification I/O. In this case (unless the metadata scan is done) we stop verification I/O. In this case (unless the metadata scan is done) we stop
issuing verification I/O and start scanning metadata again until we get to the issuing verification I/O and start scanning metadata again until we get to the

View File

@ -248,7 +248,7 @@ DEPENDENCIES bookmark, extensible_dataset, bookmark_v2
.TE .TE
This feature enables additional bookmark accounting fields, enabling the This feature enables additional bookmark accounting fields, enabling the
written#<bookmark> prperty (space written since a bookmark) and estimates of written#<bookmark> property (space written since a bookmark) and estimates of
send stream sizes for incrementals from bookmarks. send stream sizes for incrementals from bookmarks.
This feature becomes \fBactive\fR when a bookmark is created and will be This feature becomes \fBactive\fR when a bookmark is created and will be

View File

@ -251,7 +251,7 @@ and, optionally,
Print block pointer Print block pointer
.It Sy d .It Sy d
Decompress the block. Set environment variable Decompress the block. Set environment variable
.Nm ZBD_NO_ZLE .Nm ZDB_NO_ZLE
to skip zle when guessing. to skip zle when guessing.
.It Sy e .It Sy e
Byte swap the block Byte swap the block

View File

@ -737,7 +737,7 @@ of a dataset is not transferred to other pools when the snapshot is copied
with a send/receive operation. with a send/receive operation.
The The
.Sy objsetid .Sy objsetid
can be reused (for a new datatset) after the dataset is deleted. can be reused (for a new dataset) after the dataset is deleted.
.It Sy origin .It Sy origin
For cloned file systems or volumes, the snapshot from which the clone was For cloned file systems or volumes, the snapshot from which the clone was
created. created.
@ -1396,7 +1396,7 @@ has the same effect as the setting
.Pp .Pp
If set to If set to
.Sy verify , .Sy verify ,
ZFS will do a byte-to-byte comparsion in case of two blocks having the same ZFS will do a byte-to-byte comparison in case of two blocks having the same
signature to make sure the block contents are identical. Specifying signature to make sure the block contents are identical. Specifying
.Sy verify .Sy verify
is mandatory for the is mandatory for the
@ -2145,7 +2145,7 @@ Setting it to
hides its partitions. hides its partitions.
Volumes with property set to Volumes with property set to
.Sy none .Sy none
are not exposed outside ZFS, but can be snapshoted, cloned, replicated, etc, are not exposed outside ZFS, but can be snapshotted, cloned, replicated, etc,
that can be suitable for backup purposes. that can be suitable for backup purposes.
Value Value
.Sy default .Sy default
@ -3416,7 +3416,7 @@ for types.
List project identifier (ID) and inherit flag of file(s) or directories. List project identifier (ID) and inherit flag of file(s) or directories.
.Bl -tag -width "-d" .Bl -tag -width "-d"
.It Fl d .It Fl d
Show the directory project ID and inherit flag, not its childrens. It will Show the directory project ID and inherit flag, not its children. It will
overwrite the former specified overwrite the former specified
.Fl r .Fl r
option. option.
@ -3459,7 +3459,7 @@ option) value or the target directory's project ID.
Print file name with a trailing NUL instead of newline (by default), like Print file name with a trailing NUL instead of newline (by default), like
"find -print0". "find -print0".
.It Fl d .It Fl d
Check the directory project ID and inherit flag, not its childrens. It will Check the directory project ID and inherit flag, not its children. It will
overwrite the former specified overwrite the former specified
.Fl r .Fl r
option. option.
@ -4022,7 +4022,7 @@ This will either produce a normal snapshot or a redacted one, depending on
whether the new send stream is redacted. whether the new send stream is redacted.
.sp .sp
4. To receive an incremental send from a redacted version of the initial 4. To receive an incremental send from a redacted version of the initial
snapshot that is redacted with respect to a subect of the set of snapshots the snapshot that is redacted with respect to a subject of the set of snapshots the
initial snapshot was created with respect to. initial snapshot was created with respect to.
A send stream from a compatible redacted dataset will contain all of the blocks A send stream from a compatible redacted dataset will contain all of the blocks
necessary to fill in any redacted data. necessary to fill in any redacted data.
@ -4037,7 +4037,7 @@ on whether the full send stream was redacted.
.sp .sp
These restrictions are detected and enforced by \fBzfs receive\fR; a These restrictions are detected and enforced by \fBzfs receive\fR; a
redacted send stream will contain the list of snapshots that the stream is redacted send stream will contain the list of snapshots that the stream is
redacted with respsect to. redacted with respect to.
These are stored with the redacted snapshot, and are used to detect and These are stored with the redacted snapshot, and are used to detect and
correctly handle the cases above. Note that for technical reasons, raw sends correctly handle the cases above. Note that for technical reasons, raw sends
and redacted sends cannot be combined at this time. and redacted sends cannot be combined at this time.