Message ID | 20250217001452.29578-1-andres.emb.sys@gmail.com (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | [net-next] selftest:net: fixed spelling mistakes | expand |
On Sun, Feb 16, 2025 at 07:14:50PM -0500, Andres Urian Florez wrote: > Fixed spelling errors in test_redirect6() error message and > test_port_shadowing() comments > > Signed-off-by: Andres Urian Florez <andres.emb.sys@gmail.com> Reviewed-by: Hangbin Liu <liuhangbin@gmail.com> > --- > tools/testing/selftests/net/netfilter/nft_nat.sh | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/tools/testing/selftests/net/netfilter/nft_nat.sh b/tools/testing/selftests/net/netfilter/nft_nat.sh > index 9e39de26455f..8143b877ae7d 100755 > --- a/tools/testing/selftests/net/netfilter/nft_nat.sh > +++ b/tools/testing/selftests/net/netfilter/nft_nat.sh > @@ -569,7 +569,7 @@ test_redirect6() > ip netns exec "$ns0" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null > > if ! ip netns exec "$ns2" ping -q -c 1 dead:1::99 > /dev/null;then > - echo "ERROR: cannnot ping $ns1 from $ns2 via ipv6" > + echo "ERROR: cannot ping $ns1 from $ns2 via ipv6" > lret=1 > fi > > @@ -859,7 +859,7 @@ EOF > # from router:service bypass connection tracking. > test_port_shadow_notrack "$family" > > - # test nat based mitigation: fowarded packets coming from service port > + # test nat based mitigation: forwarded packets coming from service port > # are masqueraded with random highport. > test_port_shadow_pat "$family" > > -- > 2.43.0 >
diff --git a/tools/testing/selftests/net/netfilter/nft_nat.sh b/tools/testing/selftests/net/netfilter/nft_nat.sh index 9e39de26455f..8143b877ae7d 100755 --- a/tools/testing/selftests/net/netfilter/nft_nat.sh +++ b/tools/testing/selftests/net/netfilter/nft_nat.sh @@ -569,7 +569,7 @@ test_redirect6() ip netns exec "$ns0" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null if ! ip netns exec "$ns2" ping -q -c 1 dead:1::99 > /dev/null;then - echo "ERROR: cannnot ping $ns1 from $ns2 via ipv6" + echo "ERROR: cannot ping $ns1 from $ns2 via ipv6" lret=1 fi @@ -859,7 +859,7 @@ EOF # from router:service bypass connection tracking. test_port_shadow_notrack "$family" - # test nat based mitigation: fowarded packets coming from service port + # test nat based mitigation: forwarded packets coming from service port # are masqueraded with random highport. test_port_shadow_pat "$family"
Fixed spelling errors in test_redirect6() error message and test_port_shadowing() comments Signed-off-by: Andres Urian Florez <andres.emb.sys@gmail.com> --- tools/testing/selftests/net/netfilter/nft_nat.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)