Fix some typos detected by Lintian in manpages
Signed-off-by: Luca Boccassi <bluca@debian.org> Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
This commit is contained in:
parent
35c81b18c4
commit
af96c7b5dd
|
|
@ -10,7 +10,7 @@ Where:
|
||||||
|
|
||||||
ACTION semantics
|
ACTION semantics
|
||||||
- pass and ok are equivalent to accept
|
- pass and ok are equivalent to accept
|
||||||
- continue allows to restart classification lookup
|
- continue allows one to restart classification lookup
|
||||||
- drop drops packets
|
- drop drops packets
|
||||||
- reclassify implies continue classification where we left off
|
- reclassify implies continue classification where we left off
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -63,7 +63,7 @@ Command output show rate object identifier, it's type and rate values along with
|
||||||
parent node name. Rate values printed in SI units which are more suitable to
|
parent node name. Rate values printed in SI units which are more suitable to
|
||||||
represent specific value. To print values in IEC units \fB-i\fR switch is
|
represent specific value. To print values in IEC units \fB-i\fR switch is
|
||||||
used. JSON (\fB-j\fR) output always print rate values in bytes per second. Zero
|
used. JSON (\fB-j\fR) output always print rate values in bytes per second. Zero
|
||||||
rate values means "unlimited" rates and ommited in output, as well as parent
|
rate values means "unlimited" rates and omitted in output, as well as parent
|
||||||
node name.
|
node name.
|
||||||
|
|
||||||
.SS devlink port function rate set - set rate object parameters.
|
.SS devlink port function rate set - set rate object parameters.
|
||||||
|
|
|
||||||
|
|
@ -462,7 +462,7 @@ then VLAN header will be not inserted immediately but only before
|
||||||
passing to the physical device (if this device does not support VLAN
|
passing to the physical device (if this device does not support VLAN
|
||||||
offloading), the similar on the RX direction - by default the packet
|
offloading), the similar on the RX direction - by default the packet
|
||||||
will be untagged before being received by VLAN device. Reordering
|
will be untagged before being received by VLAN device. Reordering
|
||||||
allows to accelerate tagging on egress and to hide VLAN header on
|
allows one to accelerate tagging on egress and to hide VLAN header on
|
||||||
ingress so the packet looks like regular Ethernet packet, at the same
|
ingress so the packet looks like regular Ethernet packet, at the same
|
||||||
time it might be confusing for packet capture as the VLAN header does
|
time it might be confusing for packet capture as the VLAN header does
|
||||||
not exist within the packet.
|
not exist within the packet.
|
||||||
|
|
@ -691,7 +691,7 @@ or the internal FDB should be used.
|
||||||
- enables the Group Policy extension (VXLAN-GBP).
|
- enables the Group Policy extension (VXLAN-GBP).
|
||||||
|
|
||||||
.in +4
|
.in +4
|
||||||
Allows to transport group policy context across VXLAN network peers.
|
Allows one to transport group policy context across VXLAN network peers.
|
||||||
If enabled, includes the mark of a packet in the VXLAN header for outgoing
|
If enabled, includes the mark of a packet in the VXLAN header for outgoing
|
||||||
packets and fills the packet mark based on the information found in the
|
packets and fills the packet mark based on the information found in the
|
||||||
VXLAN header for incoming packets.
|
VXLAN header for incoming packets.
|
||||||
|
|
@ -2093,7 +2093,7 @@ flag in the output of the
|
||||||
|
|
||||||
To change network namespace for wireless devices the
|
To change network namespace for wireless devices the
|
||||||
.B iw
|
.B iw
|
||||||
tool can be used. But it allows to change network namespace only for
|
tool can be used. But it allows one to change network namespace only for
|
||||||
physical devices and by process
|
physical devices and by process
|
||||||
.IR PID .
|
.IR PID .
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -409,7 +409,7 @@ Please take a look at the official documentation for details regarding filters.
|
||||||
.SH STATE-FILTER
|
.SH STATE-FILTER
|
||||||
|
|
||||||
.B STATE-FILTER
|
.B STATE-FILTER
|
||||||
allows to construct arbitrary set of states to match. Its syntax is
|
allows one to construct arbitrary set of states to match. Its syntax is
|
||||||
sequence of keywords state and exclude followed by identifier of
|
sequence of keywords state and exclude followed by identifier of
|
||||||
state.
|
state.
|
||||||
.TP
|
.TP
|
||||||
|
|
|
||||||
|
|
@ -14,7 +14,7 @@ basic \- basic traffic control filter
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The
|
The
|
||||||
.B basic
|
.B basic
|
||||||
filter allows to classify packets using the extended match infrastructure.
|
filter allows one to classify packets using the extended match infrastructure.
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
.TP
|
.TP
|
||||||
.BI action " ACTION_SPEC"
|
.BI action " ACTION_SPEC"
|
||||||
|
|
|
||||||
|
|
@ -12,13 +12,13 @@ fw \- fwmark traffic control filter
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
the
|
the
|
||||||
.B fw
|
.B fw
|
||||||
filter allows to classify packets based on a previously set
|
filter allows one to classify packets based on a previously set
|
||||||
.BR fwmark " by " iptables .
|
.BR fwmark " by " iptables .
|
||||||
If it is identical to the filter's
|
If it is identical to the filter's
|
||||||
.BR handle ,
|
.BR handle ,
|
||||||
the filter matches.
|
the filter matches.
|
||||||
.B iptables
|
.B iptables
|
||||||
allows to mark single packets with the
|
allows one to mark single packets with the
|
||||||
.B MARK
|
.B MARK
|
||||||
target, or whole connections using
|
target, or whole connections using
|
||||||
.BR CONNMARK .
|
.BR CONNMARK .
|
||||||
|
|
|
||||||
|
|
@ -15,7 +15,7 @@ matchall \- traffic control filter that matches every packet
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The
|
The
|
||||||
.B matchall
|
.B matchall
|
||||||
filter allows to classify every packet that flows on the port and run a
|
filter allows one to classify every packet that flows on the port and run a
|
||||||
action on it.
|
action on it.
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
.TP
|
.TP
|
||||||
|
|
|
||||||
|
|
@ -25,7 +25,7 @@ nat - stateless native address translation action
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The
|
The
|
||||||
.B nat
|
.B nat
|
||||||
action allows to perform NAT without the overhead of conntrack, which is
|
action allows one to perform NAT without the overhead of conntrack, which is
|
||||||
desirable if the number of flows or addresses to perform NAT on is large. This
|
desirable if the number of flows or addresses to perform NAT on is large. This
|
||||||
action is best used in combination with the
|
action is best used in combination with the
|
||||||
.B u32
|
.B u32
|
||||||
|
|
|
||||||
|
|
@ -82,7 +82,7 @@ maximum number of packets the qdisc may hold queued at a time.
|
||||||
|
|
||||||
.SS delay
|
.SS delay
|
||||||
adds the chosen delay to the packets outgoing to chosen network interface. The
|
adds the chosen delay to the packets outgoing to chosen network interface. The
|
||||||
optional parameters allows to introduce a delay variation and a correlation.
|
optional parameters allows one to introduce a delay variation and a correlation.
|
||||||
Delay and jitter values are expressed in ms while correlation is percentage.
|
Delay and jitter values are expressed in ms while correlation is percentage.
|
||||||
|
|
||||||
.SS distribution
|
.SS distribution
|
||||||
|
|
@ -99,7 +99,7 @@ is now deprecated due to the noticed bad behavior.
|
||||||
.SS loss state
|
.SS loss state
|
||||||
adds packet losses according to the 4-state Markov using the transition
|
adds packet losses according to the 4-state Markov using the transition
|
||||||
probabilities as input parameters. The parameter p13 is mandatory and if used
|
probabilities as input parameters. The parameter p13 is mandatory and if used
|
||||||
alone corresponds to the Bernoulli model. The optional parameters allows to
|
alone corresponds to the Bernoulli model. The optional parameters allows one to
|
||||||
extend the model to 2-state (p31), 3-state (p23 and p32) and 4-state (p14).
|
extend the model to 2-state (p31), 3-state (p23 and p32) and 4-state (p14).
|
||||||
State 1 corresponds to good reception, State 4 to independent losses, State 3
|
State 1 corresponds to good reception, State 4 to independent losses, State 3
|
||||||
to burst losses and State 2 to good reception within a burst.
|
to burst losses and State 2 to good reception within a burst.
|
||||||
|
|
|
||||||
|
|
@ -118,7 +118,7 @@ or a single byte
|
||||||
.BI at " AT " offmask " MASK " shift " SHIFT"
|
.BI at " AT " offmask " MASK " shift " SHIFT"
|
||||||
This is an optional part of
|
This is an optional part of
|
||||||
.IR RAW_OP
|
.IR RAW_OP
|
||||||
which allows to have a variable
|
which allows one to have a variable
|
||||||
.I OFFSET
|
.I OFFSET
|
||||||
depending on packet data at offset
|
depending on packet data at offset
|
||||||
.IR AT ,
|
.IR AT ,
|
||||||
|
|
@ -202,7 +202,7 @@ unexpected things.
|
||||||
.B icmp_type
|
.B icmp_type
|
||||||
.TQ
|
.TQ
|
||||||
.B icmp_code
|
.B icmp_code
|
||||||
Again, this allows to change data past the actual IP header itself. It assumes
|
Again, this allows one to change data past the actual IP header itself. It assumes
|
||||||
an ICMP header is present immediately following the (minimal sized) IP header.
|
an ICMP header is present immediately following the (minimal sized) IP header.
|
||||||
If it is not or the latter is bigger than the minimum of 20 bytes, this will do
|
If it is not or the latter is bigger than the minimum of 20 bytes, this will do
|
||||||
unexpected things. These fields are eight-bit values.
|
unexpected things. These fields are eight-bit values.
|
||||||
|
|
@ -300,7 +300,7 @@ Keep the addressed data as is.
|
||||||
.BI retain " RVAL"
|
.BI retain " RVAL"
|
||||||
This optional extra part of
|
This optional extra part of
|
||||||
.I CMD_SPEC
|
.I CMD_SPEC
|
||||||
allows to exclude bits from being changed. Supported only for 32 bits fields
|
allows one to exclude bits from being changed. Supported only for 32 bits fields
|
||||||
or smaller.
|
or smaller.
|
||||||
.TP
|
.TP
|
||||||
.I CONTROL
|
.I CONTROL
|
||||||
|
|
|
||||||
|
|
@ -92,8 +92,8 @@ packets that came from a specific rule.
|
||||||
.TP
|
.TP
|
||||||
.BI index " INDEX"
|
.BI index " INDEX"
|
||||||
Is a unique ID for an action. When creating new action instance, this parameter
|
Is a unique ID for an action. When creating new action instance, this parameter
|
||||||
allows to set the new action index. When using existing action, this parameter
|
allows one to set the new action index. When using existing action, this parameter
|
||||||
allows to specify the existing action index. The index must 32bit unsigned
|
allows one to specify the existing action index. The index must 32bit unsigned
|
||||||
integer greater than zero.
|
integer greater than zero.
|
||||||
.SH EXAMPLES
|
.SH EXAMPLES
|
||||||
Sample one of every 100 packets flowing into interface eth0 to psample group 12:
|
Sample one of every 100 packets flowing into interface eth0 to psample group 12:
|
||||||
|
|
|
||||||
|
|
@ -16,9 +16,9 @@ skbedit - SKB editing action
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The
|
The
|
||||||
.B skbedit
|
.B skbedit
|
||||||
action allows to change a packet's associated meta data. It complements the
|
action allows one to change a packet's associated meta data. It complements the
|
||||||
.B pedit
|
.B pedit
|
||||||
action, which in turn allows to change parts of the packet data itself.
|
action, which in turn allows one to change parts of the packet data itself.
|
||||||
|
|
||||||
The most unique feature of
|
The most unique feature of
|
||||||
.B skbedit
|
.B skbedit
|
||||||
|
|
|
||||||
|
|
@ -16,7 +16,7 @@ tcindex \- traffic control index filter
|
||||||
.B action
|
.B action
|
||||||
.BR ACTION_SPEC " ]"
|
.BR ACTION_SPEC " ]"
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
This filter allows to match packets based on their
|
This filter allows one to match packets based on their
|
||||||
.B tcindex
|
.B tcindex
|
||||||
field value, i.e. the combination of the DSCP and ECN fields as present in IPv4
|
field value, i.e. the combination of the DSCP and ECN fields as present in IPv4
|
||||||
and IPv6 headers.
|
and IPv6 headers.
|
||||||
|
|
|
||||||
|
|
@ -23,7 +23,7 @@ tunnel_key - Tunnel metadata manipulation
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The
|
The
|
||||||
.B tunnel_key
|
.B tunnel_key
|
||||||
action combined with a shared IP tunnel device, allows to perform IP tunnel en-
|
action combined with a shared IP tunnel device, allows one to perform IP tunnel en-
|
||||||
or decapsulation on a packet, reflected by
|
or decapsulation on a packet, reflected by
|
||||||
the operation modes
|
the operation modes
|
||||||
.IR UNSET " and " SET .
|
.IR UNSET " and " SET .
|
||||||
|
|
|
||||||
|
|
@ -150,7 +150,7 @@ u32 \- universal 32bit traffic control filter
|
||||||
.BR at " [ " nexthdr+ " ] "
|
.BR at " [ " nexthdr+ " ] "
|
||||||
.IR int_value " ]"
|
.IR int_value " ]"
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The Universal/Ugly 32bit filter allows to match arbitrary bitfields in the
|
The Universal/Ugly 32bit filter allows one to match arbitrary bitfields in the
|
||||||
packet. Due to breaking everything down to values, masks and offsets, It is
|
packet. Due to breaking everything down to values, masks and offsets, It is
|
||||||
equally powerful and hard to use. Luckily many abstracting directives are
|
equally powerful and hard to use. Luckily many abstracting directives are
|
||||||
present which allow defining rules on a higher level and therefore free the
|
present which allow defining rules on a higher level and therefore free the
|
||||||
|
|
@ -375,7 +375,7 @@ or IPv6 (
|
||||||
.BR ip6 )
|
.BR ip6 )
|
||||||
header.
|
header.
|
||||||
.IR IP / IP6
|
.IR IP / IP6
|
||||||
then allows to match various header fields:
|
then allows one to match various header fields:
|
||||||
.RS
|
.RS
|
||||||
.TP
|
.TP
|
||||||
.BI src " ADDR"
|
.BI src " ADDR"
|
||||||
|
|
|
||||||
|
|
@ -35,7 +35,7 @@ vlan - vlan manipulation module
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The
|
The
|
||||||
.B vlan
|
.B vlan
|
||||||
action allows to perform 802.1Q en- or decapsulation on a packet, reflected by
|
action allows one to perform 802.1Q en- or decapsulation on a packet, reflected by
|
||||||
the operation modes
|
the operation modes
|
||||||
.IR POP ", " PUSH " and " MODIFY .
|
.IR POP ", " PUSH " and " MODIFY .
|
||||||
The
|
The
|
||||||
|
|
|
||||||
|
|
@ -10,7 +10,7 @@ xt - tc iptables action
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The
|
The
|
||||||
.B xt
|
.B xt
|
||||||
action allows to call arbitrary iptables targets for packets matching the filter
|
action allows one to call arbitrary iptables targets for packets matching the filter
|
||||||
this action is attached to.
|
this action is attached to.
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
.TP
|
.TP
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue