Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

bpf, docs: Fix verifier references

Use normal RST file reference instead of linkage copied from the old filter.rst
document that does not actually work when using HTML output.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20211223101906.977624-2-hch@lst.de

authored by

Christoph Hellwig and committed by
Alexei Starovoitov
fa86aa77 35580f90

+2 -5
+2 -5
Documentation/bpf/instruction-set.rst
··· 203 203 bpf_exit 204 204 205 205 After the call the registers R1-R5 contain junk values and cannot be read. 206 - An in-kernel `eBPF verifier`_ is used to validate eBPF programs. 206 + An in-kernel verifier.rst is used to validate eBPF programs. 207 207 208 208 Also in the new design, eBPF is limited to 4096 insns, which means that any 209 209 program will terminate quickly and will only call a fixed number of kernel ··· 234 234 filters may use it as assembler to generate code from kernel. In kernel usage 235 235 may not be bounded by security considerations, since generated eBPF code 236 236 may be optimizing internal code path and not being exposed to the user space. 237 - Safety of eBPF can come from the `eBPF verifier`_. In such use cases as 237 + Safety of eBPF can come from the verifier.rst. In such use cases as 238 238 described, it may be used as safe instruction set. 239 239 240 240 Just like the original BPF, eBPF runs within a controlled environment, ··· 462 462 instruction that loads 64-bit immediate value into a dst_reg. 463 463 Classic BPF has similar instruction: ``BPF_LD | BPF_W | BPF_IMM`` which loads 464 464 32-bit immediate value into a register. 465 - 466 - .. Links: 467 - .. _eBPF verifier: verifiers.rst