diff options
Diffstat (limited to 'src/plugins/abf')
-rw-r--r-- | src/plugins/abf/abf_api.c | 2 | ||||
-rw-r--r-- | src/plugins/abf/abf_itf_attach.c | 12 | ||||
-rw-r--r-- | src/plugins/abf/abf_policy.c | 8 |
3 files changed, 0 insertions, 22 deletions
diff --git a/src/plugins/abf/abf_api.c b/src/plugins/abf/abf_api.c index ffb32d582c5..2330e7b7d21 100644 --- a/src/plugins/abf/abf_api.c +++ b/src/plugins/abf/abf_api.c @@ -250,12 +250,10 @@ abf_api_init (vlib_main_t * vm) VLIB_INIT_FUNCTION (abf_api_init); -/* *INDENT-OFF* */ VLIB_PLUGIN_REGISTER () = { .version = VPP_BUILD_VER, .description = "Access Control List (ACL) Based Forwarding", }; -/* *INDENT-ON* */ /* * fd.io coding-style-patch-verification: ON diff --git a/src/plugins/abf/abf_itf_attach.c b/src/plugins/abf/abf_itf_attach.c index a14717e1999..04e5c4c40c2 100644 --- a/src/plugins/abf/abf_itf_attach.c +++ b/src/plugins/abf/abf_itf_attach.c @@ -399,7 +399,6 @@ abf_itf_attach_cmd (vlib_main_t * vm, return (NULL); } -/* *INDENT-OFF* */ /** * Attach an ABF policy to an interface. */ @@ -409,7 +408,6 @@ VLIB_CLI_COMMAND (abf_itf_attach_cmd_node, static) = { .short_help = "abf attach <ip4|ip6> [del] policy <value> <interface>", // this is not MP safe }; -/* *INDENT-ON* */ static clib_error_t * abf_show_attach_cmd (vlib_main_t * vm, @@ -438,7 +436,6 @@ abf_show_attach_cmd (vlib_main_t * vm, vlib_cli_output (vm, "specify an interface"); } - /* *INDENT-OFF* */ FOR_EACH_FIB_IP_PROTOCOL(fproto) { if (sw_if_index < vec_len(abf_per_itf[fproto])) @@ -453,31 +450,26 @@ abf_show_attach_cmd (vlib_main_t * vm, } } } - /* *INDENT-ON* */ return (NULL); } -/* *INDENT-OFF* */ VLIB_CLI_COMMAND (abf_show_attach_cmd_node, static) = { .path = "show abf attach", .function = abf_show_attach_cmd, .short_help = "show abf attach <interface>", .is_mp_safe = 1, }; -/* *INDENT-ON* */ void abf_itf_attach_walk (abf_itf_attach_walk_cb_t cb, void *ctx) { u32 aii; - /* *INDENT-OFF* */ pool_foreach_index (aii, abf_itf_attach_pool) { if (!cb(aii, ctx)) break; } - /* *INDENT-ON* */ } typedef enum abf_next_t_ @@ -657,7 +649,6 @@ static char *abf_error_strings[] = { #undef abf_error }; -/* *INDENT-OFF* */ VLIB_REGISTER_NODE (abf_ip4_node) = { .function = abf_input_ip4, @@ -703,7 +694,6 @@ VNET_FEATURE_INIT (abf_ip6_feat, static) = .node_name = "abf-input-ip6", .runs_after = VNET_FEATURES ("acl-plugin-in-ip6-fa"), }; -/* *INDENT-ON* */ static fib_node_t * abf_itf_attach_get_node (fib_node_index_t index) @@ -772,12 +762,10 @@ abf_itf_bond_init (vlib_main_t * vm) return (NULL); } -/* *INDENT-OFF* */ VLIB_INIT_FUNCTION (abf_itf_bond_init) = { .runs_after = VLIB_INITS("acl_init"), }; -/* *INDENT-ON* */ /* * fd.io coding-style-patch-verification: ON diff --git a/src/plugins/abf/abf_policy.c b/src/plugins/abf/abf_policy.c index 8f0fc116144..e6dfe4fff55 100644 --- a/src/plugins/abf/abf_policy.c +++ b/src/plugins/abf/abf_policy.c @@ -315,7 +315,6 @@ out: return (NULL); } -/* *INDENT-OFF* */ /** * Create an ABF policy. */ @@ -325,7 +324,6 @@ VLIB_CLI_COMMAND (abf_policy_cmd_node, static) = { .short_help = "abf policy [add|del] id <index> acl <index> via ...", .is_mp_safe = 1, }; -/* *INDENT-ON* */ static u8 * format_abf (u8 * s, va_list * args) @@ -352,13 +350,11 @@ abf_policy_walk (abf_policy_walk_cb_t cb, void *ctx) { u32 api; - /* *INDENT-OFF* */ pool_foreach_index (api, abf_policy_pool) { if (!cb(api, ctx)) break; } - /* *INDENT-ON* */ } static clib_error_t * @@ -381,12 +377,10 @@ abf_show_policy_cmd (vlib_main_t * vm, if (INDEX_INVALID == policy_id) { - /* *INDENT-OFF* */ pool_foreach (ap, abf_policy_pool) { vlib_cli_output(vm, "%U", format_abf, ap); } - /* *INDENT-ON* */ } else { @@ -401,14 +395,12 @@ abf_show_policy_cmd (vlib_main_t * vm, return (NULL); } -/* *INDENT-OFF* */ VLIB_CLI_COMMAND (abf_policy_show_policy_cmd_node, static) = { .path = "show abf policy", .function = abf_show_policy_cmd, .short_help = "show abf policy <value>", .is_mp_safe = 1, }; -/* *INDENT-ON* */ static fib_node_t * abf_policy_get_node (fib_node_index_t index) |