summaryrefslogtreecommitdiffstats
path: root/Documentation/bpf
diff options
context:
space:
mode:
authorChristoph Hellwig <hch@lst.de>2021-12-23 11:19:03 +0100
committerAlexei Starovoitov <ast@kernel.org>2021-12-31 01:31:44 +0100
commitfa86aa77d4da211fc814325cdb3a572b1b851058 (patch)
tree8c1f0e7ff0e97cdb41a3838fa11ce39537813469 /Documentation/bpf
parentMerge branch 'lighten uapi/bpf.h rebuilds' (diff)
downloadlinux-fa86aa77d4da211fc814325cdb3a572b1b851058.tar.xz
linux-fa86aa77d4da211fc814325cdb3a572b1b851058.zip
bpf, docs: Fix verifier references
Use normal RST file reference instead of linkage copied from the old filter.rst document that does not actually work when using HTML output. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Link: https://lore.kernel.org/bpf/20211223101906.977624-2-hch@lst.de
Diffstat (limited to 'Documentation/bpf')
-rw-r--r--Documentation/bpf/instruction-set.rst7
1 files changed, 2 insertions, 5 deletions
diff --git a/Documentation/bpf/instruction-set.rst b/Documentation/bpf/instruction-set.rst
index fa7cba59031e..fa469078301b 100644
--- a/Documentation/bpf/instruction-set.rst
+++ b/Documentation/bpf/instruction-set.rst
@@ -203,7 +203,7 @@ Some core changes of the eBPF format from classic BPF:
bpf_exit
After the call the registers R1-R5 contain junk values and cannot be read.
- An in-kernel `eBPF verifier`_ is used to validate eBPF programs.
+ An in-kernel verifier.rst is used to validate eBPF programs.
Also in the new design, eBPF is limited to 4096 insns, which means that any
program will terminate quickly and will only call a fixed number of kernel
@@ -234,7 +234,7 @@ optimizations, socket filters and seccomp are using it as assembler. Tracing
filters may use it as assembler to generate code from kernel. In kernel usage
may not be bounded by security considerations, since generated eBPF code
may be optimizing internal code path and not being exposed to the user space.
-Safety of eBPF can come from the `eBPF verifier`_. In such use cases as
+Safety of eBPF can come from the verifier.rst. In such use cases as
described, it may be used as safe instruction set.
Just like the original BPF, eBPF runs within a controlled environment,
@@ -462,6 +462,3 @@ of two consecutive ``struct bpf_insn`` 8-byte blocks and interpreted as single
instruction that loads 64-bit immediate value into a dst_reg.
Classic BPF has similar instruction: ``BPF_LD | BPF_W | BPF_IMM`` which loads
32-bit immediate value into a register.
-
-.. Links:
-.. _eBPF verifier: verifiers.rst