On Sat, Sep 28, 2019 at 04:48:14PM +0200, Stephen Kitt wrote:
> This switches zero-length arrays in variable-length structs to C99
> flexible array members. GCC will then ensure that the arrays are
> always the last element in the struct.
>
> Coccinelle:
> @@
> identifier S, fld;
> type T;
> @@
>
his documentation on the IOvisor mailing-list:
Alexander Alemayhu
Alexei Starovoitov
Daniel Borkmann
Quentin Monnet
---
Jesper Dangaard Brouer (4):
doc/bpf: start eBPF documentation tree bpf/
doc/bpf: document interacting with eBPF maps
doc/bpf: describes the differen
On 02/07/2017 10:19 PM, Jesper Dangaard Brouer wrote:
On Tue, 07 Feb 2017 17:43:38 +0100
Daniel Borkmann wrote:
Hi Jesper,
On 02/07/2017 03:30 PM, Jesper Dangaard Brouer wrote:
Question: What kernel tree should this go into???
If going through Jonathan Corbet, will it appear sooner here
On 04/06/2018 01:11 PM, Quentin Monnet wrote:
> eBPF helper functions can be called from within eBPF programs to perform
> a variety of tasks that would be otherwise hard or impossible to do with
> eBPF itself. There is a growing number of such helper functions in the
> kernel, but documentation is
On 04/09/2018 11:21 AM, Markus Heiser wrote:
[...]
> Do we really need another kernel-doc parser?
>
> ./scripts/kernel-doc include/uapi/linux/bpf.h
>
> should already do the job (producing .rst). For more infos, take a look at
This has absolutely zero to do with kernel-doc, but rather producin
On 04/09/2018 11:35 AM, Markus Heiser wrote:
>
>> Am 09.04.2018 um 11:25 schrieb Daniel Borkmann :
>>
>> On 04/09/2018 11:21 AM, Markus Heiser wrote:
>> [...]
>>> Do we really need another kernel-doc parser?
>>>
>>> ./scripts/kernel-doc incl
On 09/27/2017 12:45 PM, Jesper Dangaard Brouer wrote:
On Wed, 27 Sep 2017 00:02:08 +0100
Jakub Kicinski wrote:
On Tue, 26 Sep 2017 15:24:06 -0700, Alexei Starovoitov wrote:
On Tue, Sep 26, 2017 at 08:35:22AM -0700, Jakub Kicinski wrote:
Add a simple tool for querying and updating BPF objects
On 04/17/2018 04:34 PM, Quentin Monnet wrote:
> Add documentation for eBPF helper functions to bpf.h user header file.
> This documentation can be parsed with the Python script provided in
> another commit of the patch series, in order to provide a RST document
> that can later be converted into a
On 04/17/2018 04:34 PM, Quentin Monnet wrote:
> Add documentation for eBPF helper functions to bpf.h user header file.
> This documentation can be parsed with the Python script provided in
> another commit of the patch series, in order to provide a RST document
> that can later be converted into a
FIG_CGROUP_NET_CLASSID is
> required to use the helper. Add a reference to related documentation.
> State that placing a task in net_cls controller disables cgroup-bpf.
> - bpf_get_route_realm(): State that CONFIG_CGROUP_NET_CLASSID is
> required to use this helper.
> - bpf_skb_load_
On 04/17/2018 04:34 PM, Quentin Monnet wrote:
> Add documentation for eBPF helper functions to bpf.h user header file.
> This documentation can be parsed with the Python script provided in
> another commit of the patch series, in order to provide a RST document
> that can later be converted into a
On 04/17/2018 04:34 PM, Quentin Monnet wrote:
> Add documentation for eBPF helper functions to bpf.h user header file.
> This documentation can be parsed with the Python script provided in
> another commit of the patch series, in order to provide a RST document
> that can later be converted into a
ash_recalc()
> - bpf_skb_change_tail()
> - bpf_skb_pull_data()
> - bpf_csum_update()
> - bpf_set_hash_invalid()
> - bpf_get_numa_node_id()
> - bpf_set_hash()
> - bpf_skb_adjust_room()
> - bpf_xdp_adjust_meta()
>
> Cc: Daniel Borkmann
> S
On 04/20/2018 08:54 PM, Quentin Monnet wrote:
> 2018-04-19 13:16 UTC+0200 ~ Daniel Borkmann
>> On 04/17/2018 04:34 PM, Quentin Monnet wrote:
>>> Add documentation for eBPF helper functions to bpf.h user header file.
>>> This documentation can be parsed with th
On 04/25/2018 07:16 PM, Quentin Monnet wrote:
> eBPF helper functions can be called from within eBPF programs to perform
> a variety of tasks that would be otherwise hard or impossible to do with
> eBPF itself. There is a growing number of such helper functions in the
> kernel, but documentation is
On 04/26/2018 04:26 AM, Leo Yan wrote:
> When CONFIG_BPF_JIT_ALWAYS_ON is enabled, kernel has limitation for
> bpf_jit_enable, so it has fixed value 1 and we cannot set it to 2
> for JIT opcode dumping; this patch is to update the doc for it.
>
> Signed-off-by: Leo Yan
> ---
> Documentation/netw
On 04/27/2018 11:49 AM, Leo Yan wrote:
> On Fri, Apr 27, 2018 at 11:44:44AM +0200, Daniel Borkmann wrote:
>> On 04/26/2018 04:26 AM, Leo Yan wrote:
>>> When CONFIG_BPF_JIT_ALWAYS_ON is enabled, kernel has limitation for
>>> bpf_jit_enable, so it has fixed value 1 and we
On 04/27/2018 12:02 PM, Leo Yan wrote:
> When CONFIG_BPF_JIT_ALWAYS_ON is enabled, kernel has limitation for
> bpf_jit_enable, so it has fixed value 1 and we cannot set it to 2
> for JIT opcode dumping; this patch is to update the doc for it.
>
> Suggested-by: Daniel Borkmann
On 05/10/2018 05:09 AM, Wang YanQing wrote:
> For me, as a reader whose mother language isn't English, the
> old words bring a little difficulty to catch the meaning, this
> patch rewords the subsection in a more clarificatory way.
>
> This patch also add blank lines as separator at two places
> t
On 10/07/2018 10:45 AM, Arthur Fabre wrote:
> bpf_asm and the other classic BPF tools support jump conditions
> comparing register A to register X, in addition to comparing register A
> with constant K.
> Only the latter was documented in filter.txt, add two new addressing
> modes that describe the
On 03/28/2016 11:56 PM, Kees Cook wrote:
From: Dave Anderson
Fixes a copy-paste-o in the BPF opcode table: "neg" takes no arguments
and thus has no addressing modes.
Signed-off-by: Dave Anderson
Signed-off-by: Kees Cook
Acked-by: Daniel Borkmann
--
To unsubscribe from this list
On 09/04/2016 09:20 AM, SF Markus Elfring wrote:
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/Documentation/CodingStyle?id=865a1caa4b6b886babdd9d67e7c3608be4567a51
[ + Jonathan for above commit in linux-next ]
You seem to lack understanding of the difference between
On 09/04/2016 03:50 PM, SF Markus Elfring wrote:
I am just curious on how much further software development "fun" the recent
update
by a topic like "CodingStyle: Clarify and complete chapter 7" will trigger.
I don't want to drag this thread onwards for (way) too long, but clearly "it is
advise
On 1/14/25 4:27 PM, Song Yoong Siang wrote:
[...]
+ /* Add mqprio qdisc with TC and hardware queue one-to-one mapping */
+ char map[256] = {0};
+ char queues[256] = {0};
+
+ for (i = 0; i < rxq; i++) {
+ char buf[8];
+
+ snprintf(buf, sizeof(buf
On 7/4/25 11:58 AM, Jesper Dangaard Brouer wrote:
On 04/07/2025 03.17, Song, Yoong Siang wrote:
On Friday, July 4, 2025 1:05 AM, Jesper Dangaard Brouer wrote:
On 02/07/2025 18.57, Song Yoong Siang wrote:
Introduce the XDP_METADATA_SIZE macro as a conservative measure to
accommodate any metada
On 7/7/25 5:03 PM, Stanislav Fomichev wrote:
On 07/04, Daniel Borkmann wrote:
On 7/4/25 11:58 AM, Jesper Dangaard Brouer wrote:
On 04/07/2025 03.17, Song, Yoong Siang wrote:
On Friday, July 4, 2025 1:05 AM, Jesper Dangaard Brouer wrote:
On 02/07/2025 18.57, Song Yoong Siang wrote
On 7/2/25 6:57 PM, Song Yoong Siang wrote:
[...]
+It is important to note that some devices may utilize the ``data_meta`` area
for
+their own purposes. For example, the IGC device utilizes ``IGC_TS_HDR_LEN``
+bytes of the ``data_meta`` area for receiving hardware timestamps. Therefore,
+the XDP
27 matches
Mail list logo