netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH iptables] Fix a few doc typos
@ 2021-09-02 11:33 Štěpán Němec
  2021-09-03 12:58 ` Phil Sutter
  0 siblings, 1 reply; 2+ messages in thread
From: Štěpán Němec @ 2021-09-02 11:33 UTC (permalink / raw)
  To: netfilter-devel, Pablo Neira Ayuso

Signed-off-by: Štěpán Němec <snemec@redhat.com>
---
 extensions/libxt_devgroup.man | 2 +-
 iptables/xtables-monitor.8.in | 6 +++---
 2 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/extensions/libxt_devgroup.man b/extensions/libxt_devgroup.man
index 4a66c9fe2635..480ee3512188 100644
--- a/extensions/libxt_devgroup.man
+++ b/extensions/libxt_devgroup.man
@@ -1,4 +1,4 @@
-Match device group of a packets incoming/outgoing interface.
+Match device group of a packet's incoming/outgoing interface.
 .TP
 [\fB!\fP] \fB\-\-src\-group\fP \fIname\fP
 Match device group of incoming device
diff --git a/iptables/xtables-monitor.8.in b/iptables/xtables-monitor.8.in
index b647a79eb64e..a7f22c0d8c08 100644
--- a/iptables/xtables-monitor.8.in
+++ b/iptables/xtables-monitor.8.in
@@ -51,9 +51,9 @@ The second line dumps information about the packet. Incoming interface
 and packet headers such as source and destination addresses are shown.
 
 The third line shows that the packet completed traversal of the raw table
-PREROUTING chain, and is returning, followed by use the chain policy to make accept/drop
+PREROUTING chain, and is returning, followed by use of the chain policy to make accept/drop
 decision (the example shows accept being applied).
-The fifth line shows that the packet leaves the filter INPUT chain, i.e., no rules in the filter tables
+The fifth line shows that the packet leaves the filter INPUT chain, i.e., no rules in the filter table's
 INPUT chain matched the packet.
 It then got DROPPED by the policy of the INPUT table, as shown by line six.
 The last line shows another packet arriving \-\- the packet id is different.
@@ -81,7 +81,7 @@ by three base hooks INPUT, FORWARD and OUTPUT.  The iptables-nftables tools all
 chains automatically when needed, so this is expected when a table was not yet initialized or when it is
 re-created from scratch by iptables-nftables-restore.  Line five shows a new user-defined chain (TCP)
 being added, followed by addition a few rules. the last line shows that a new ruleset generation has
-become active, i.e., the rule set changes are now active.  This also lists the process id and the programs name.
+become active, i.e., the rule set changes are now active.  This also lists the process id and the program name.
 .SH LIMITATIONS
 .B xtables-monitor
 only works with rules added using iptables-nftables, rules added using

base-commit: e438b9766fcc86d9847312ff05f1d1dac61acf1f
-- 
2.33.0


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH iptables] Fix a few doc typos
  2021-09-02 11:33 [PATCH iptables] Fix a few doc typos Štěpán Němec
@ 2021-09-03 12:58 ` Phil Sutter
  0 siblings, 0 replies; 2+ messages in thread
From: Phil Sutter @ 2021-09-03 12:58 UTC (permalink / raw)
  To: Štěpán Němec; +Cc: netfilter-devel, Pablo Neira Ayuso

On Thu, Sep 02, 2021 at 01:33:59PM +0200, Štěpán Němec wrote:
> Signed-off-by: Štěpán Němec <snemec@redhat.com>

Applied after adding a few words as description (between subject and
SoB).

Thanks, Phil

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-09-03 12:58 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-09-02 11:33 [PATCH iptables] Fix a few doc typos Štěpán Němec
2021-09-03 12:58 ` Phil Sutter

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).