From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pj1-f50.google.com (mail-pj1-f50.google.com [209.85.216.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5ACDE2D0C72; Fri, 29 Aug 2025 07:55:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.50 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756454146; cv=none; b=FLaQlBTUp3FRlA39YEA94ZagNaqyX5iTxQOk9rclLjhjIPxPtnsXV8YMvwGRAWG//fXESve6nKdMLjsoj6HxXhKyrTvQjMp8cNqXY1mpgCy+QRizr8MvsBNKxuVYoBqcrPbkla6MmMkxu8DnX9hakrEVvaCSX1Ng0cc83iUPwC0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756454146; c=relaxed/simple; bh=IiAjp2UiG4E4i0m+2wynqH3PCAcCcaK0of1KdBtx1KU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=hChWrloHiv0clVpcABUft64BHEUh5p87aWcpfl8WBvoOpzW286+PD1xZa7ryq4jHpgOIwtfxsFjQoWGTyKbnrFkREtpRXRb/jJH13iBYUDWoemApX8ceQZ6asUkoGwSDAP3wtYWEinopLbnX0WV3MH4nL4de7ijBdceLedumElM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=KeH5Lh2d; arc=none smtp.client-ip=209.85.216.50 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="KeH5Lh2d" Received: by mail-pj1-f50.google.com with SMTP id 98e67ed59e1d1-323267bc2eeso1366208a91.1; Fri, 29 Aug 2025 00:55:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1756454143; x=1757058943; darn=lists.linux.dev; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=rNDvUkQSM5YXWXIzm38SWG/hRRo/bsx6SYKE7k7lSmY=; b=KeH5Lh2dWn/XqVwZzjQFCD/o688rRwZz199ZvWMJoLpA5sWv4em9VvB0URXP4+18LG ZOHXyw4YqrkvFqNibPGfZa2pi01NPajn1XDfRLofmYVEjgmIVKXqY0I/qCi9gV5acLoW ycLAUPMEc/T5CC/htm+u4YF1jLsTuqSa5a4C8S3io/xBj6kgqAU9ywMVbSbKqLFLqVEM BXA+l2/3PV2ja59qUtv5rfIatuPfCEisu5VcEarv2dir8vLiwkCgNW5acH5gnzGhtuCJ v6uOW8L7d4CmBIRM709Oh1kPhR5yXgKWBG6Mi5gdf9er3y+O2IMD6np8OfDTBwFIlai8 OPGA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756454143; x=1757058943; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=rNDvUkQSM5YXWXIzm38SWG/hRRo/bsx6SYKE7k7lSmY=; b=DWyonC2xoUvToMRiJraj1MdDfJ1ECGumNHCo9qju1h/4tZwu+mccHT6rEpEfqRo2HG o6St27iNuatDlJkBxfegF7cpEkginE3kcTLzlah7hKKoNiPNFg37amwFO5hzEy8ruPcE zLKYe2ui/FVRUJO9eUPNmqsDk2lTbTP3G8XxqaMgETU+Z9N7e5FmQrlBMCndIrtHsxRg 42NcpON8QvQuJrl/o6UpHQfxllYiqR3n5EVryErikJvdhveg+PDyFl5qb8x/I2wBSf7q TXhO0vfrv/7d0w1LTsRiLPCpJHDmMugUi3XGmlxQeY33c+3TfvljBSm1FtuLbQ+l4mx8 Yl7A== X-Forwarded-Encrypted: i=1; AJvYcCVRyCMRZFIp1zJC9CZlvWzAd1CLiEyAgmE0GAjGJr3VIcIhtg4iH7pMOGc6qSIUTNtPx6N7i3psGp4=@lists.linux.dev, AJvYcCWqpEwWjjw9rXQ8RET6ANRqPLZDs323UDv055ILezikPuSGOwjwyEinEJjt6b67D9w8AvRIFw==@lists.linux.dev X-Gm-Message-State: AOJu0YwYStKsTp/C6oWCFFC7nD0uAn/rjTbmC4kfbCJpNd06eQgwlwLS UvThjCuvbGTdHJ7c12piJnDwZXXgFPIZvI595dyjkCuOrlohSxDPwZQWUJjE1qawBqQ= X-Gm-Gg: ASbGncuwMyrbhlMd50lN5IdQqeYvOw8cjDrXrXRYadzpq03FiSvRKoz9VZ79Cpr0jru T5WCU/dVnIjI4Pvg6JmBqatGF+oLM7wVwYx5OZU+okGcHHSjQ/pA4D23zihW5MYifNfukwItYan wYpl+lyBErH7+mssE0iOLOAttGrXitNvyPjzGoPZKFBzRsIySfTutsG3RnfyJmMlehw61Xk463f ZTHtVIZJVO+0508/nVqcMS7WgZHV14c8ghldw5Kn6rne9h7RT+rPEjtg3P8UOeH/53bZmimb770 RPlXRsLzp+HmuhpNDx5Br/g6v9ebeB/sVx10Jj3cpwrJniHnnsC9WBrCDIuLsXD5qubPfNM+Yzu 2SdbIn+ZcEQuLUjukxzZkHKb1I5/5Abt3X5Wn X-Google-Smtp-Source: AGHT+IG3+4PiXre8myZJXbMXtIyGoT2Zo+1v7SoTFErR1CQFe7OBynTDKWH1/q0UIz7vCvtEP71Wtg== X-Received: by 2002:a17:90b:4c02:b0:324:ece9:6afb with SMTP id 98e67ed59e1d1-32515eadfb6mr30884939a91.3.1756454142399; Fri, 29 Aug 2025 00:55:42 -0700 (PDT) Received: from archie.me ([103.124.138.155]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3276fcd48cesm7365898a91.19.2025.08.29.00.55.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Aug 2025 00:55:37 -0700 (PDT) Received: by archie.me (Postfix, from userid 1000) id 8D99044808FE; Fri, 29 Aug 2025 14:55:28 +0700 (WIB) From: Bagas Sanjaya To: Linux Kernel Mailing List , Linux Documentation , Linux DAMON , Linux Memory Management List , Linux Power Management , Linux Block Devices , Linux BPF , Linux Kernel Workflows , Linux KASAN , Linux Devicetree , Linux fsverity , Linux MTD , Linux DRI Development , Linux Kernel Build System , Linux Networking , Linux Sound Cc: Thomas Gleixner , Borislav Petkov , Peter Zijlstra , Josh Poimboeuf , Pawan Gupta , Jonathan Corbet , SeongJae Park , Andrew Morton , David Hildenbrand , Lorenzo Stoakes , "Liam R. Howlett" , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , Huang Rui , "Gautham R. Shenoy" , Mario Limonciello , Perry Yuan , Jens Axboe , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Dwaipayan Ray , Lukas Bulwahn , Joe Perches , Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Rob Herring , Krzysztof Kozlowski , Conor Dooley , Eric Biggers , tytso@mit.edu, Richard Weinberger , Zhihao Cheng , David Airlie , Simona Vetter , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , Nathan Chancellor , Nicolas Schier , Ingo Molnar , Will Deacon , Boqun Feng , Waiman Long , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shay Agroskin , Arthur Kiyanovski , David Arinzon , Saeed Bishara , Andrew Lunn , Liam Girdwood , Mark Brown , Jaroslav Kysela , Takashi Iwai , Alexandru Ciobotaru , The AWS Nitro Enclaves Team , Jesper Dangaard Brouer , Bagas Sanjaya , Laurent Pinchart , Steve French , Meetakshi Setiya , Greg Kroah-Hartman , "Martin K. Petersen" , Bart Van Assche , =?UTF-8?q?Thomas=20Wei=C3=9Fschuh?= , Masahiro Yamada Subject: [PATCH 06/14] Documentation: bpf: Convert external kernel docs link Date: Fri, 29 Aug 2025 14:55:16 +0700 Message-ID: <20250829075524.45635-7-bagasdotme@gmail.com> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20250829075524.45635-1-bagasdotme@gmail.com> References: <20250829075524.45635-1-bagasdotme@gmail.com> Precedence: bulk X-Mailing-List: fsverity@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=2744; i=bagasdotme@gmail.com; h=from:subject; bh=IiAjp2UiG4E4i0m+2wynqH3PCAcCcaK0of1KdBtx1KU=; b=owGbwMvMwCX2bWenZ2ig32LG02pJDBkbY162Whs7TnrT1LggM0BOd5LEqfAiXtc37zS3e5gl8 vnwGP7sKGVhEONikBVTZJmUyNd0epeRyIX2tY4wc1iZQIYwcHEKwES+TGNkWCZ94c28TXy5tQ2r bD/4zPoTU9D/g2m/U+vihV++Li1Y5MvI8PjMzk3qf6eEm+VfELaazHDuklKIXI/3z+ub9I0rLF5 X8QIA X-Developer-Key: i=bagasdotme@gmail.com; a=openpgp; fpr=701B806FDCA5D3A58FFB8F7D7C276C64A5E44A1D Content-Transfer-Encoding: 8bit Convert links to other docs pages that use external links into internal cross-references. Signed-off-by: Bagas Sanjaya --- Documentation/bpf/bpf_iterators.rst | 3 +-- Documentation/bpf/map_xskmap.rst | 5 ++--- 2 files changed, 3 insertions(+), 5 deletions(-) diff --git a/Documentation/bpf/bpf_iterators.rst b/Documentation/bpf/bpf_iterators.rst index 189e3ec1c6c8e0..c8e68268fb3e76 100644 --- a/Documentation/bpf/bpf_iterators.rst +++ b/Documentation/bpf/bpf_iterators.rst @@ -123,8 +123,7 @@ which often takes time to publish upstream and release. The same is true for pop tools like `ss `_ where any additional information needs a kernel patch. -To solve this problem, the `drgn -`_ tool is often used to +To solve this problem, the :doc:`drgn ` tool is often used to dig out the kernel data with no kernel change. However, the main drawback for drgn is performance, as it cannot do pointer tracing inside the kernel. In addition, drgn cannot validate a pointer value and may read invalid data if the diff --git a/Documentation/bpf/map_xskmap.rst b/Documentation/bpf/map_xskmap.rst index dc143edd923393..58562e37c16a01 100644 --- a/Documentation/bpf/map_xskmap.rst +++ b/Documentation/bpf/map_xskmap.rst @@ -10,7 +10,7 @@ BPF_MAP_TYPE_XSKMAP The ``BPF_MAP_TYPE_XSKMAP`` is used as a backend map for XDP BPF helper call ``bpf_redirect_map()`` and ``XDP_REDIRECT`` action, like 'devmap' and 'cpumap'. -This map type redirects raw XDP frames to `AF_XDP`_ sockets (XSKs), a new type of +This map type redirects raw XDP frames to AF_XDP sockets (XSKs), a new type of address family in the kernel that allows redirection of frames from a driver to user space without having to traverse the full network stack. An AF_XDP socket binds to a single netdev queue. A mapping of XSKs to queues is shown below: @@ -181,12 +181,11 @@ AF_XDP-forwarding programs in the `bpf-examples`_ directory in the `libxdp`_ rep For a detailed explanation of the AF_XDP interface please see: - `libxdp-readme`_. -- `AF_XDP`_ kernel documentation. +- Documentation/networking/af_xdp.rst. .. note:: The most comprehensive resource for using XSKMAPs and AF_XDP is `libxdp`_. .. _libxdp: https://github.com/xdp-project/xdp-tools/tree/master/lib/libxdp -.. _AF_XDP: https://www.kernel.org/doc/html/latest/networking/af_xdp.html .. _bpf-examples: https://github.com/xdp-project/bpf-examples .. _libxdp-readme: https://github.com/xdp-project/xdp-tools/tree/master/lib/libxdp#using-af_xdp-sockets -- An old man doll... just what I always wanted! - Clara