net-next: docs: Fix typos in snmp_counter.rst

This patch fixes some spelling typos in snmp_counter.rst

Signed-off-by: Masanari Iida <standby24x7@gmail.com>
Reviewed-by: Randy Dunlap <rdunlap@infradead.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
Masanari Iida 2021-01-05 23:40:29 +09:00 committed by David S. Miller
parent 708290479c
commit ede71cae72
1 changed files with 14 additions and 14 deletions

View File

@ -314,7 +314,7 @@ https://lwn.net/Articles/576263/
* TcpExtTCPOrigDataSent * TcpExtTCPOrigDataSent
This counter is explained by `kernel commit f19c29e3e391`_, I pasted the This counter is explained by `kernel commit f19c29e3e391`_, I pasted the
explaination below:: explanation below::
TCPOrigDataSent: number of outgoing packets with original data (excluding TCPOrigDataSent: number of outgoing packets with original data (excluding
retransmission but including data-in-SYN). This counter is different from retransmission but including data-in-SYN). This counter is different from
@ -324,7 +324,7 @@ explaination below::
* TCPSynRetrans * TCPSynRetrans
This counter is explained by `kernel commit f19c29e3e391`_, I pasted the This counter is explained by `kernel commit f19c29e3e391`_, I pasted the
explaination below:: explanation below::
TCPSynRetrans: number of SYN and SYN/ACK retransmits to break down TCPSynRetrans: number of SYN and SYN/ACK retransmits to break down
retransmissions into SYN, fast-retransmits, timeout retransmits, etc. retransmissions into SYN, fast-retransmits, timeout retransmits, etc.
@ -332,7 +332,7 @@ explaination below::
* TCPFastOpenActiveFail * TCPFastOpenActiveFail
This counter is explained by `kernel commit f19c29e3e391`_, I pasted the This counter is explained by `kernel commit f19c29e3e391`_, I pasted the
explaination below:: explanation below::
TCPFastOpenActiveFail: Fast Open attempts (SYN/data) failed because TCPFastOpenActiveFail: Fast Open attempts (SYN/data) failed because
the remote does not accept it or the attempts timed out. the remote does not accept it or the attempts timed out.
@ -382,7 +382,7 @@ Defined in `RFC1213 tcpAttemptFails`_.
Defined in `RFC1213 tcpOutRsts`_. The RFC says this counter indicates Defined in `RFC1213 tcpOutRsts`_. The RFC says this counter indicates
the 'segments sent containing the RST flag', but in linux kernel, this the 'segments sent containing the RST flag', but in linux kernel, this
couner indicates the segments kerenl tried to send. The sending counter indicates the segments kernel tried to send. The sending
process might be failed due to some errors (e.g. memory alloc failed). process might be failed due to some errors (e.g. memory alloc failed).
.. _RFC1213 tcpOutRsts: https://tools.ietf.org/html/rfc1213#page-52 .. _RFC1213 tcpOutRsts: https://tools.ietf.org/html/rfc1213#page-52
@ -700,7 +700,7 @@ SACK option could have up to 4 blocks, they are checked
individually. E.g., if 3 blocks of a SACk is invalid, the individually. E.g., if 3 blocks of a SACk is invalid, the
corresponding counter would be updated 3 times. The comment of the corresponding counter would be updated 3 times. The comment of the
`Add counters for discarded SACK blocks`_ patch has additional `Add counters for discarded SACK blocks`_ patch has additional
explaination: explanation:
.. _Add counters for discarded SACK blocks: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=18f02545a9a16c9a89778b91a162ad16d510bb32 .. _Add counters for discarded SACK blocks: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=18f02545a9a16c9a89778b91a162ad16d510bb32
@ -829,7 +829,7 @@ PAWS check fails or the received sequence number is out of window.
* TcpExtTCPACKSkippedTimeWait * TcpExtTCPACKSkippedTimeWait
Tha ACK is skipped in Time-Wait status, the reason would be either The ACK is skipped in Time-Wait status, the reason would be either
PAWS check failed or the received sequence number is out of window. PAWS check failed or the received sequence number is out of window.
* TcpExtTCPACKSkippedChallenge * TcpExtTCPACKSkippedChallenge
@ -984,7 +984,7 @@ TcpExtSyncookiesRecv counter wont be updated.
Challenge ACK Challenge ACK
============= =============
For details of challenge ACK, please refer the explaination of For details of challenge ACK, please refer the explanation of
TcpExtTCPACKSkippedChallenge. TcpExtTCPACKSkippedChallenge.
* TcpExtTCPChallengeACK * TcpExtTCPChallengeACK
@ -1002,7 +1002,7 @@ prune
===== =====
When a socket is under memory pressure, the TCP stack will try to When a socket is under memory pressure, the TCP stack will try to
reclaim memory from the receiving queue and out of order queue. One of reclaim memory from the receiving queue and out of order queue. One of
the reclaiming method is 'collapse', which means allocate a big sbk, the reclaiming method is 'collapse', which means allocate a big skb,
copy the contiguous skbs to the single big skb, and free these copy the contiguous skbs to the single big skb, and free these
contiguous skbs. contiguous skbs.
@ -1163,7 +1163,7 @@ The server side nstat output::
IpExtOutOctets 52 0.0 IpExtOutOctets 52 0.0
IpExtInNoECTPkts 1 0.0 IpExtInNoECTPkts 1 0.0
Input a string in nc client side again ('world' in our exmaple):: Input a string in nc client side again ('world' in our example)::
nstatuser@nstat-a:~$ nc -v nstat-b 9000 nstatuser@nstat-a:~$ nc -v nstat-b 9000
Connection to nstat-b 9000 port [tcp/*] succeeded! Connection to nstat-b 9000 port [tcp/*] succeeded!
@ -1211,7 +1211,7 @@ replied an ACK. But kernel handled them in different ways. When the
TCP window scale option is not used, kernel will try to enable fast TCP window scale option is not used, kernel will try to enable fast
path immediately when the connection comes into the established state, path immediately when the connection comes into the established state,
but if the TCP window scale option is used, kernel will disable the but if the TCP window scale option is used, kernel will disable the
fast path at first, and try to enable it after kerenl receives fast path at first, and try to enable it after kernel receives
packets. We could use the 'ss' command to verify whether the window packets. We could use the 'ss' command to verify whether the window
scale option is used. e.g. run below command on either server or scale option is used. e.g. run below command on either server or
client:: client::
@ -1343,7 +1343,7 @@ Check TcpExtTCPAbortOnMemory on client::
nstatuser@nstat-a:~$ nstat | grep -i abort nstatuser@nstat-a:~$ nstat | grep -i abort
TcpExtTCPAbortOnMemory 54 0.0 TcpExtTCPAbortOnMemory 54 0.0
Check orphane socket count on client:: Check orphaned socket count on client::
nstatuser@nstat-a:~$ ss -s nstatuser@nstat-a:~$ ss -s
Total: 131 (kernel 0) Total: 131 (kernel 0)
@ -1685,7 +1685,7 @@ Send 3 SYN repeatly to nstat-b::
nstatuser@nstat-a:~$ for i in {1..3}; do sudo tcpreplay -i ens3 /tmp/syn_fixcsum.pcap; done nstatuser@nstat-a:~$ for i in {1..3}; do sudo tcpreplay -i ens3 /tmp/syn_fixcsum.pcap; done
Check snmp cunter on nstat-b:: Check snmp counter on nstat-b::
nstatuser@nstat-b:~$ nstat | grep -i skip nstatuser@nstat-b:~$ nstat | grep -i skip
TcpExtTCPACKSkippedSynRecv 1 0.0 TcpExtTCPACKSkippedSynRecv 1 0.0
@ -1770,7 +1770,7 @@ string 'foo' in our example::
Connection from nstat-a 42132 received! Connection from nstat-a 42132 received!
foo foo
On nstat-a, the tcpdump should have caputred the ACK. We should check On nstat-a, the tcpdump should have captured the ACK. We should check
the source port numbers of the two nc clients:: the source port numbers of the two nc clients::
nstatuser@nstat-a:~$ ss -ta '( dport = :9000 || dport = :9001 )' | tee nstatuser@nstat-a:~$ ss -ta '( dport = :9000 || dport = :9001 )' | tee
@ -1778,7 +1778,7 @@ the source port numbers of the two nc clients::
ESTAB 0 0 192.168.122.250:50208 192.168.122.251:9000 ESTAB 0 0 192.168.122.250:50208 192.168.122.251:9000
ESTAB 0 0 192.168.122.250:42132 192.168.122.251:9001 ESTAB 0 0 192.168.122.250:42132 192.168.122.251:9001
Run tcprewrite, change port 9001 to port 9000, chagne port 42132 to Run tcprewrite, change port 9001 to port 9000, change port 42132 to
port 50208:: port 50208::
nstatuser@nstat-a:~$ tcprewrite --infile /tmp/seq_pre.pcap --outfile /tmp/seq.pcap -r 9001:9000 -r 42132:50208 --fixcsum nstatuser@nstat-a:~$ tcprewrite --infile /tmp/seq_pre.pcap --outfile /tmp/seq.pcap -r 9001:9000 -r 42132:50208 --fixcsum