diff mbox series

[net-next] selftest:net: fixed spelling mistakes

Message ID 20250217001452.29578-1-andres.emb.sys@gmail.com (mailing list archive)
State New
Headers show
Series [net-next] selftest:net: fixed spelling mistakes | expand

Commit Message

Andres Urian Florez Feb. 17, 2025, 12:14 a.m. UTC
Fixed spelling errors in test_redirect6() error message and
test_port_shadowing() comments

Signed-off-by: Andres Urian Florez <andres.emb.sys@gmail.com>
---
 tools/testing/selftests/net/netfilter/nft_nat.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

Comments

Hangbin Liu Feb. 17, 2025, 2:23 a.m. UTC | #1
On Sun, Feb 16, 2025 at 07:14:50PM -0500, Andres Urian Florez wrote:
> Fixed spelling errors in test_redirect6() error message and
> test_port_shadowing() comments
> 
> Signed-off-by: Andres Urian Florez <andres.emb.sys@gmail.com>

Reviewed-by: Hangbin Liu <liuhangbin@gmail.com>

> ---
>  tools/testing/selftests/net/netfilter/nft_nat.sh | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/tools/testing/selftests/net/netfilter/nft_nat.sh b/tools/testing/selftests/net/netfilter/nft_nat.sh
> index 9e39de26455f..8143b877ae7d 100755
> --- a/tools/testing/selftests/net/netfilter/nft_nat.sh
> +++ b/tools/testing/selftests/net/netfilter/nft_nat.sh
> @@ -569,7 +569,7 @@ test_redirect6()
>  	ip netns exec "$ns0" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
>  
>  	if ! ip netns exec "$ns2" ping -q -c 1 dead:1::99 > /dev/null;then
> -		echo "ERROR: cannnot ping $ns1 from $ns2 via ipv6"
> +		echo "ERROR: cannot ping $ns1 from $ns2 via ipv6"
>  		lret=1
>  	fi
>  
> @@ -859,7 +859,7 @@ EOF
>  	# from router:service bypass connection tracking.
>  	test_port_shadow_notrack "$family"
>  
> -	# test nat based mitigation: fowarded packets coming from service port
> +	# test nat based mitigation: forwarded packets coming from service port
>  	# are masqueraded with random highport.
>  	test_port_shadow_pat "$family"
>  
> -- 
> 2.43.0
>
diff mbox series

Patch

diff --git a/tools/testing/selftests/net/netfilter/nft_nat.sh b/tools/testing/selftests/net/netfilter/nft_nat.sh
index 9e39de26455f..8143b877ae7d 100755
--- a/tools/testing/selftests/net/netfilter/nft_nat.sh
+++ b/tools/testing/selftests/net/netfilter/nft_nat.sh
@@ -569,7 +569,7 @@  test_redirect6()
 	ip netns exec "$ns0" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
 
 	if ! ip netns exec "$ns2" ping -q -c 1 dead:1::99 > /dev/null;then
-		echo "ERROR: cannnot ping $ns1 from $ns2 via ipv6"
+		echo "ERROR: cannot ping $ns1 from $ns2 via ipv6"
 		lret=1
 	fi
 
@@ -859,7 +859,7 @@  EOF
 	# from router:service bypass connection tracking.
 	test_port_shadow_notrack "$family"
 
-	# test nat based mitigation: fowarded packets coming from service port
+	# test nat based mitigation: forwarded packets coming from service port
 	# are masqueraded with random highport.
 	test_port_shadow_pat "$family"