lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Thu, 18 Oct 2018 13:16:38 -0700
From:   Stephen Hemminger <stephen@...workplumber.org>
To:     netdev@...r.kernel.org
Cc:     Stephen Hemminger <stephen@...workplumber.org>
Subject: [PATCH iproute2] doc/man: spelling fixes

Use ispell and codespell to find/fix spelling errors in documentation
and man pages.

Signed-off-by: Stephen Hemminger <stephen@...workplumber.org>
---
 doc/actions/actions-general | 14 +++++++-------
 doc/actions/ifb-README      | 18 +++++++++---------
 doc/actions/mirred-usage    |  6 +++---
 man/man8/ip-link.8.in       |  4 ++--
 man/man8/ip-tunnel.8        |  2 +-
 man/man8/tc-tunnel_key.8    |  2 +-
 6 files changed, 23 insertions(+), 23 deletions(-)

diff --git a/doc/actions/actions-general b/doc/actions/actions-general
index 70f7cd6528f1..08cc785c4575 100644
--- a/doc/actions/actions-general
+++ b/doc/actions/actions-general
@@ -21,7 +21,7 @@ we execute a policing action which rate limits its bandwidth utilization
 to 1.5Mbps".
 
 The new extensions allow for more than just policing actions to be added.
-They are also fully backward compatible. If you have a kernel that doesnt
+They are also fully backward compatible. If you have a kernel that doesn't
 understand them, then the effect is null i.e if you have a newer tc
 but older kernel, the actions are not installed. Likewise if you
 have a newer kernel but older tc, obviously the tc will use current
@@ -31,7 +31,7 @@ right tc ;->
 
 A side effect is that we can now get stateless firewalling to work with tc. 
 Essentially this is now an alternative to iptables.
-I wont go into details of my dislike for iptables at times, but 
+I won't go into details of my dislike for iptables at times, but 
 scalability is one of the main issues; however, if you need stateful
 classification - use netfilter (for now).
 
@@ -77,7 +77,7 @@ iptable target. I have only tested with mangler targets up to now.
 In terms of hooks:
 *ingress is mapped to pre-routing hook
 *egress is mapped to post-routing hook
-I dont see much value in the other hooks, if you see it and email me good
+I don't see much value in the other hooks, if you see it and email me good
 reasons, the addition is trivial.
 
 Example syntax for iptables targets usage becomes:
@@ -111,12 +111,12 @@ The script below does the following:
 - an incoming packet from 10.0.0.21 is first given a firewall mark of 1. 
 
 - It is then metered to make sure it does not exceed its allocated rate of 
-1Kbps. If it doesnt exceed rate, this is where we terminate action execution.
+1Kbps. If it doesn't exceed rate, this is where we terminate action execution.
 
 - If it does exceed its rate, its "color" changes to a mark of 2 and it is 
 then passed through a second meter.
 
--The second meter is shared across all flows on that device [i am suprised 
+-The second meter is shared across all flows on that device [i am surpised 
 that this seems to be not a well know feature of the policer; Bert was telling 
 me that someone was writing a qdisc just to do sharing across multiple devices;
 it must be the summer heat again; weve had someone doing that every year around
@@ -145,7 +145,7 @@ u32 match ip src 10.0.0.21/32 flowid 1:15 \
 action ipt -j mark --set-mark 1 index 2 \
 #
 # then pass it through a policer which allows 1kbps; if the flow
-# doesnt exceed that rate, this is where we stop, if it exceeds we
+# doesn't exceed that rate, this is where we stop, if it exceeds we
 # pipe the packet to the next action
 action police rate 1kbit burst 9k pipe \
 #
@@ -241,7 +241,7 @@ filter protocol ip pref 1 u32 fh 800::800 order 2048 key ht 800 bkt 0 flowid 1:1
 Neat, eh?
 
 
-Wanna write an action module?
+Want to  write an action module?
 ------------------------------
 Its easy. Either look at the code or send me email. I will document at
 some point; will also accept documentation.
diff --git a/doc/actions/ifb-README b/doc/actions/ifb-README
index 3d011793432e..63247f3cdc3e 100644
--- a/doc/actions/ifb-README
+++ b/doc/actions/ifb-README
@@ -17,26 +17,26 @@ dropping. I am not aware of any study that shows policing is
 worse than shaping in achieving the end goal of rate control.
 I would be interested if anyone is experimenting.
 
-3) Very interesting use: if you are serving p2p you may wanna give 
-preference to your own localy originated traffic (when responses come back)
+3) Very interesting use: if you are serving p2p you may want to give 
+preference to your own locally originated traffic (when responses come back)
 vs someone using your system to do bittorent. So QoSing based on state
-comes in as the solution. What people did to achive this was stick
+comes in as the solution. What people did to achieve this was stick
 the IMQ somewhere prelocal hook.
 I think this is a pretty neat feature to have in Linux in general.
 (i.e not just for IMQ).
-But i wont go back to putting netfilter hooks in the device to satisfy
-this.  I also dont think its worth it hacking ifb some more to be 
+But i won't go back to putting netfilter hooks in the device to satisfy
+this.  I also don't think its worth it hacking ifb some more to be 
 aware of say L3 info and play ip rule tricks to achieve this.
---> Instead the plan is to have a contrack related action. This action will
-selectively either query/create contrack state on incoming packets. 
+--> Instead the plan is to have a conntrack related action. This action will
+selectively either query/create conntrack state on incoming packets. 
 Packets could then be redirected to ifb based on what happens -> eg 
 on incoming packets; if we find they are of known state we could send to 
-a different queue than one which didnt have existing state. This
+a different queue than one which didn't have existing state. This
 all however is dependent on whatever rules the admin enters.
 
 At the moment this 3rd function does not exist yet. I have decided that
 instead of sitting on the patch for another year, to release it and then 
-if theres pressure i will add this feature.
+if there is pressure i will add this feature.
 
 An example, to provide functionality that most people use IMQ for below:
 
diff --git a/doc/actions/mirred-usage b/doc/actions/mirred-usage
index 2622c43bd3e8..e749eedc68a6 100644
--- a/doc/actions/mirred-usage
+++ b/doc/actions/mirred-usage
@@ -26,13 +26,13 @@ dev ("port" in ethernet switch/bridging terminology)
 - redirect
 steals the packet and redirects to specified destination dev.
 
-What NOT to do if you dont want your machine to crash:
+What NOT to do if you don't want your machine to crash:
 ------------------------------------------------------
 
 Do not create loops! 
 Loops are not hard to create in the egress qdiscs.
 
-Here are simple rules to follow if you dont want to get
+Here are simple rules to follow if you don't want to get
 hurt:
 A) Do not have the same packet go to same netdevice twice
 in a single graph of policies. Your machine will just hang!
@@ -129,7 +129,7 @@ so you could tcpdump them (dummy by defaults drops all packets it sees).
 This is a very useful debug feature.
 
 Lets say you are policing packets from alias 192.168.200.200/32
-you dont want those to exceed 100kbps going out.
+you don't want those to exceed 100kbps going out.
 
 ---
 tc qdisc add dev eth0 handle 1:0 root prio
diff --git a/man/man8/ip-link.8.in b/man/man8/ip-link.8.in
index 38e4ee684c2b..cc04dc748fd2 100644
--- a/man/man8/ip-link.8.in
+++ b/man/man8/ip-link.8.in
@@ -629,7 +629,7 @@ or the internal FDB should be used.
 Allows to transport group policy context across VXLAN network peers.
 If enabled, includes the mark of a packet in the VXLAN header for outgoing
 packets and fills the packet mark based on the information found in the
-VXLAN header for incomming packets.
+VXLAN header for incoming packets.
 
 Format of upper 16 bits of packet mark (flags);
 
@@ -880,7 +880,7 @@ discovery.
 - enables/disables IPv4 DF suppression on this tunnel.
 Normally datagrams that exceed the MTU will be fragmented; the presence
 of the DF flag inhibits this, resulting instead in an ICMP Unreachable
-(Fragmentation Required) message.  Enabling this attribute casues the
+(Fragmentation Required) message.  Enabling this attribute causes the
 DF flag to be ignored.
 
 .sp
diff --git a/man/man8/ip-tunnel.8 b/man/man8/ip-tunnel.8
index 9040ddda6bbe..9a510af031c7 100644
--- a/man/man8/ip-tunnel.8
+++ b/man/man8/ip-tunnel.8
@@ -183,7 +183,7 @@ discovery.
 enable IPv4 DF suppression on this tunnel.
 Normally datagrams that exceed the MTU will be fragmented; the presence
 of the DF flag inhibits this, resulting instead in an ICMP Unreachable
-(Fragmentation Required) message.  Enabling this attribute casues the
+(Fragmentation Required) message.  Enabling this attribute causes the
 DF flag to be ignored.
 
 .TP
diff --git a/man/man8/tc-tunnel_key.8 b/man/man8/tc-tunnel_key.8
index 1e093624a940..dc8421b4515a 100644
--- a/man/man8/tc-tunnel_key.8
+++ b/man/man8/tc-tunnel_key.8
@@ -98,7 +98,7 @@ Outer header TOS
 Outer header TTL
 .TP
 .RB [ no ] csum
-Controlls outer UDP checksum. When set to
+Controls outer UDP checksum. When set to
 .B csum
 (which is default), the outer UDP checksum is calculated and included in the
 packets. When set to
-- 
2.17.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ