ip: cleanup typos in documentation
Type: style
Change-Id: I7d44b7fab1b8b196e4934cb4832ee51084c5bf98
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
(cherry picked from commit 5b755e2f9f
)
This commit is contained in:

committed by
Andrew Yourtchenko

parent
eaec04895e
commit
0700f3c50e
@ -309,7 +309,7 @@ format_ip_dscp (u8 * s, va_list * va)
|
|||||||
#undef _
|
#undef _
|
||||||
}
|
}
|
||||||
|
|
||||||
return (format (s, "unknon"));
|
return (format (s, "unknown"));
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -73,14 +73,14 @@
|
|||||||
/* Spoofed packets in ip4-rewrite-local */ \
|
/* Spoofed packets in ip4-rewrite-local */ \
|
||||||
_ (SPOOFED_LOCAL_PACKETS, "ip4 spoofed local-address packet drops") \
|
_ (SPOOFED_LOCAL_PACKETS, "ip4 spoofed local-address packet drops") \
|
||||||
\
|
\
|
||||||
/* Errors singalled by ip4-inacl */ \
|
/* Errors signalled by ip4-inacl */ \
|
||||||
_ (INACL_TABLE_MISS, "input ACL table-miss drops") \
|
_ (INACL_TABLE_MISS, "input ACL table-miss drops") \
|
||||||
_ (INACL_SESSION_DENY, "input ACL session deny drops") \
|
_ (INACL_SESSION_DENY, "input ACL session deny drops") \
|
||||||
/* Errors singalled by ip4-outacl */ \
|
/* Errors singalled by ip4-outacl */ \
|
||||||
_ (OUTACL_TABLE_MISS, "output ACL table-miss drops") \
|
_ (OUTACL_TABLE_MISS, "output ACL table-miss drops") \
|
||||||
_ (OUTACL_SESSION_DENY, "output ACL session deny drops") \
|
_ (OUTACL_SESSION_DENY, "output ACL session deny drops") \
|
||||||
\
|
\
|
||||||
/* Erros from mfib-forward */ \
|
/* Errors from mfib-forward */ \
|
||||||
_ (RPF_FAILURE, "Multicast RPF check failed") \
|
_ (RPF_FAILURE, "Multicast RPF check failed") \
|
||||||
\
|
\
|
||||||
/* Errors signalled by ip4-reassembly */ \
|
/* Errors signalled by ip4-reassembly */ \
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* src/vnet/ip/ip_neighboor.c: ip neighbor generic handling
|
* src/vnet/ip/ip_neighbor.c: ip neighbor generic handling
|
||||||
*
|
*
|
||||||
* Copyright (c) 2018 Cisco and/or its affiliates.
|
* Copyright (c) 2018 Cisco and/or its affiliates.
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
@ -27,7 +27,7 @@
|
|||||||
* - Max processing allowed per run : 20 usec
|
* - Max processing allowed per run : 20 usec
|
||||||
* - Max probe/delete operations per run : 10
|
* - Max probe/delete operations per run : 10
|
||||||
* - Scan interrupt delay to resume scan : 1 msec
|
* - Scan interrupt delay to resume scan : 1 msec
|
||||||
* - Neighbor stale threashold : 4 x scan-interval
|
* - Neighbor stale threshold : 4 x scan-interval
|
||||||
*/
|
*/
|
||||||
#define IP_NEIGHBOR_DEF_SCAN_INTERVAL (60.0)
|
#define IP_NEIGHBOR_DEF_SCAN_INTERVAL (60.0)
|
||||||
#define IP_NEIGHBOR_DEF_MAX_PROC_TIME (20e-6)
|
#define IP_NEIGHBOR_DEF_MAX_PROC_TIME (20e-6)
|
||||||
@ -407,11 +407,11 @@ done:
|
|||||||
|
|
||||||
/*?
|
/*?
|
||||||
* The '<em>ip scan-neighbor</em>' command can be used to enable and disable
|
* The '<em>ip scan-neighbor</em>' command can be used to enable and disable
|
||||||
* periodic IP neighbor scan and change various scan parameneters.
|
* periodic IP neighbor scan and change various scan parameters.
|
||||||
*
|
*
|
||||||
* @note The default parameters used for IP neighbor scan should work fine
|
* @note The default parameters used for IP neighbor scan should work fine
|
||||||
* under normal conditions. They should not be changed from the default unless
|
* under normal conditions. They should not be changed from the default unless
|
||||||
* properly tested to work as desied.
|
* properly tested to work as desired.
|
||||||
*
|
*
|
||||||
* @cliexpar
|
* @cliexpar
|
||||||
* Example of enabling IP neighbor scan:
|
* Example of enabling IP neighbor scan:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* ip_neighboor.h: ip neighbor generic services
|
* ip_neighbor.h: ip neighbor generic services
|
||||||
*
|
*
|
||||||
* Copyright (c) 2018 Cisco and/or its affiliates.
|
* Copyright (c) 2018 Cisco and/or its affiliates.
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
@ -30,7 +30,7 @@ typedef struct
|
|||||||
u8 max_proc_time; /* max processing time per run, in usecs */
|
u8 max_proc_time; /* max processing time per run, in usecs */
|
||||||
u8 max_update; /* max probe/delete operations per run */
|
u8 max_update; /* max probe/delete operations per run */
|
||||||
u8 scan_int_delay; /* delay in msecs, to resume scan on max */
|
u8 scan_int_delay; /* delay in msecs, to resume scan on max */
|
||||||
u8 stale_threshold; /* Threashold in minutes to delete nei entry */
|
u8 stale_threshold; /* Threshold in minutes to delete nei entry */
|
||||||
} ip_neighbor_scan_arg_t;
|
} ip_neighbor_scan_arg_t;
|
||||||
|
|
||||||
void ip_neighbor_scan_enable_disable (ip_neighbor_scan_arg_t * arg);
|
void ip_neighbor_scan_enable_disable (ip_neighbor_scan_arg_t * arg);
|
||||||
|
@ -78,7 +78,7 @@ typedef struct
|
|||||||
*
|
*
|
||||||
* struct B {
|
* struct B {
|
||||||
* u16 n_ranges;
|
* u16 n_ranges;
|
||||||
* range_t *ragnes; // vector of ranges.
|
* range_t *ranges; // vector of ranges.
|
||||||
* }
|
* }
|
||||||
*
|
*
|
||||||
* so to read ranges[0] we would first d-cache miss on the address
|
* so to read ranges[0] we would first d-cache miss on the address
|
||||||
@ -88,7 +88,7 @@ typedef struct
|
|||||||
*
|
*
|
||||||
* struct B {
|
* struct B {
|
||||||
* u16 n_ranges;
|
* u16 n_ranges;
|
||||||
* range_t ragnes[N];
|
* range_t ranges[N];
|
||||||
* }
|
* }
|
||||||
*
|
*
|
||||||
* memory:
|
* memory:
|
||||||
@ -108,7 +108,7 @@ typedef struct protocol_port_range_dpo_t_
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* The number of blocks from the 'block' array below
|
* The number of blocks from the 'block' array below
|
||||||
* that have rnages configured. We keep this count so that in the data-path
|
* that have ranges configured. We keep this count so that in the data-path
|
||||||
* we can limit the loop to be only over the blocks we need
|
* we can limit the loop to be only over the blocks we need
|
||||||
*/
|
*/
|
||||||
u16 n_used_blocks;
|
u16 n_used_blocks;
|
||||||
|
@ -149,7 +149,7 @@ ip_address_union_decode (const vl_api_address_union_t * in,
|
|||||||
type = IP46_TYPE_IP6;
|
type = IP46_TYPE_IP6;
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
ASSERT (!"Unkown address family in API address type");
|
ASSERT (!"Unknown address family in API address type");
|
||||||
type = IP46_TYPE_ANY;
|
type = IP46_TYPE_ANY;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -34,7 +34,7 @@ struct _vl_api_prefix;
|
|||||||
struct _vl_api_mprefix;
|
struct _vl_api_mprefix;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* These enum decode/encodes use 'int' as the type for the enum becuase
|
* These enum decode/encodes use 'int' as the type for the enum because
|
||||||
* one cannot forward declare an enum
|
* one cannot forward declare an enum
|
||||||
*/
|
*/
|
||||||
extern int ip_address_family_decode (int _af, ip_address_family_t * out);
|
extern int ip_address_family_decode (int _af, ip_address_family_t * out);
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
* limitations under the License.
|
* limitations under the License.
|
||||||
*/
|
*/
|
||||||
/*
|
/*
|
||||||
* ip/ip_lookup.c: ip4/6 adjacency and lookup table managment
|
* ip/ip_lookup.c: ip4/6 adjacency and lookup table management
|
||||||
*
|
*
|
||||||
* Copyright (c) 2008 Eliot Dresselhaus
|
* Copyright (c) 2008 Eliot Dresselhaus
|
||||||
*
|
*
|
||||||
@ -55,7 +55,7 @@
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* @file
|
* @file
|
||||||
* @brief IPv4 and IPv6 adjacency and lookup table managment.
|
* @brief IPv4 and IPv6 adjacency and lookup table management.
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user