* [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY @ 2022-11-09 17:46 Donald Hunter 2022-11-09 17:46 ` [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY Donald Hunter 2022-11-11 19:40 ` [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY patchwork-bot+netdevbpf 0 siblings, 2 replies; 7+ messages in thread From: Donald Hunter @ 2022-11-09 17:46 UTC (permalink / raw) To: bpf, linux-doc Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Jonathan Corbet, Donald Hunter Add documentation for BPF_MAP_TYPE_ARRAY and BPF_MAP_TYPE_PERCPU_ARRAY variant, including kernel version introduced, usage and examples. v9->v10: - Add missing Reviewed-by tag v8->v9: - Add "Kernel BPF" heading suggested by Jesper Brouer - Tidy up wording to clarify BPF vs userspace APIs v7->v8: - Fix alignment wording reported by Alexei Starovoitov - Avoid deprecated functions, reported by Alexei Starovoitov - Fix code sample formatting, reported by Alexei Starovoitov v6->v7: - Remove 2^32 reference and reword paragraph reported by Jiri Olsa and Daniel Borkmann v5->v6: - Rework sample code into individual snippets - Grammar mods suggested by Bagas Sanjaja v4->v5: - Use formatting consistent with *_TYPE_HASH docs - Dropped cgroup doc patch from this set - Fix grammar and typos reported by Bagas Sanjaya - Fix typo and version reported by Donald Hunter - Update examples to be libbpf v1 compatible v3->v4: - fix doctest failure due to missing newline v2->v3: - wrap text to 80 chars and add newline at end of file v1->v2: - point to selftests for functional examples - update examples to follow kernel style - add docs for BPF_F_MMAPABLE Dave Tucker (1): bpf, docs: document BPF_MAP_TYPE_ARRAY Documentation/bpf/map_array.rst | 250 ++++++++++++++++++++++++++++++++ 1 file changed, 250 insertions(+) create mode 100644 Documentation/bpf/map_array.rst -- 2.35.1 ^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY 2022-11-09 17:46 [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY Donald Hunter @ 2022-11-09 17:46 ` Donald Hunter 2022-11-11 1:52 ` Bagas Sanjaya 2022-11-11 19:39 ` Andrii Nakryiko 2022-11-11 19:40 ` [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY patchwork-bot+netdevbpf 1 sibling, 2 replies; 7+ messages in thread From: Donald Hunter @ 2022-11-09 17:46 UTC (permalink / raw) To: bpf, linux-doc Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Jonathan Corbet, Dave Tucker, Donald Hunter, Maryam Tahhan From: Dave Tucker <dave@dtucker.co.uk> Add documentation for the BPF_MAP_TYPE_ARRAY including kernel version introduced, usage and examples. Also document BPF_MAP_TYPE_PERCPU_ARRAY which is similar. Signed-off-by: Dave Tucker <dave@dtucker.co.uk> Co-developed-by: Donald Hunter <donald.hunter@gmail.com> Signed-off-by: Donald Hunter <donald.hunter@gmail.com> Reviewed-by: Maryam Tahhan <mtahhan@redhat.com> --- Documentation/bpf/map_array.rst | 250 ++++++++++++++++++++++++++++++++ 1 file changed, 250 insertions(+) create mode 100644 Documentation/bpf/map_array.rst diff --git a/Documentation/bpf/map_array.rst b/Documentation/bpf/map_array.rst new file mode 100644 index 000000000000..97bb80333254 --- /dev/null +++ b/Documentation/bpf/map_array.rst @@ -0,0 +1,250 @@ +.. SPDX-License-Identifier: GPL-2.0-only +.. Copyright (C) 2022 Red Hat, Inc. + +================================================ +BPF_MAP_TYPE_ARRAY and BPF_MAP_TYPE_PERCPU_ARRAY +================================================ + +.. note:: + - ``BPF_MAP_TYPE_ARRAY`` was introduced in kernel version 3.19 + - ``BPF_MAP_TYPE_PERCPU_ARRAY`` was introduced in version 4.6 + +``BPF_MAP_TYPE_ARRAY`` and ``BPF_MAP_TYPE_PERCPU_ARRAY`` provide generic array +storage. The key type is an unsigned 32-bit integer (4 bytes) and the map is +of constant size. The size of the array is defined in ``max_entries`` at +creation time. All array elements are pre-allocated and zero initialized when +created. ``BPF_MAP_TYPE_PERCPU_ARRAY`` uses a different memory region for each +CPU whereas ``BPF_MAP_TYPE_ARRAY`` uses the same memory region. The value +stored can be of any size, however, all array elements are aligned to 8 +bytes. + +Since kernel 5.5, memory mapping may be enabled for ``BPF_MAP_TYPE_ARRAY`` by +setting the flag ``BPF_F_MMAPABLE``. The map definition is page-aligned and +starts on the first page. Sufficient page-sized and page-aligned blocks of +memory are allocated to store all array values, starting on the second page, +which in some cases will result in over-allocation of memory. The benefit of +using this is increased performance and ease of use since userspace programs +would not be required to use helper functions to access and mutate data. + +Usage +===== + +Kernel BPF +---------- + +.. c:function:: + void *bpf_map_lookup_elem(struct bpf_map *map, const void *key) + +Array elements can be retrieved using the ``bpf_map_lookup_elem()`` helper. +This helper returns a pointer into the array element, so to avoid data races +with userspace reading the value, the user must use primitives like +``__sync_fetch_and_add()`` when updating the value in-place. + +.. c:function:: + long bpf_map_update_elem(struct bpf_map *map, const void *key, const void *value, u64 flags) + +Array elements can be updated using the ``bpf_map_update_elem()`` helper. + +``bpf_map_update_elem()`` returns 0 on success, or negative error in case of +failure. + +Since the array is of constant size, ``bpf_map_delete_elem()`` is not supported. +To clear an array element, you may use ``bpf_map_update_elem()`` to insert a +zero value to that index. + +Per CPU Array +~~~~~~~~~~~~~ + +Values stored in ``BPF_MAP_TYPE_ARRAY`` can be accessed by multiple programs +across different CPUs. To restrict storage to a single CPU, you may use a +``BPF_MAP_TYPE_PERCPU_ARRAY``. + +When using a ``BPF_MAP_TYPE_PERCPU_ARRAY`` the ``bpf_map_update_elem()`` and +``bpf_map_lookup_elem()`` helpers automatically access the slot for the current +CPU. + +.. c:function:: + void *bpf_map_lookup_percpu_elem(struct bpf_map *map, const void *key, u32 cpu) + +The ``bpf_map_lookup_percpu_elem()`` helper can be used to lookup the array +value for a specific CPU. Returns value on success , or ``NULL`` if no entry was +found or ``cpu`` is invalid. + +Concurrency +----------- + +Since kernel version 5.1, the BPF infrastructure provides ``struct bpf_spin_lock`` +to synchronize access. + +Userspace +--------- + +Access from userspace uses libbpf APIs with the same names as above, with +the map identified by its ``fd``. + +Examples +======== + +Please see the ``tools/testing/selftests/bpf`` directory for functional +examples. The code samples below demonstrate API usage. + +Kernel BPF +---------- + +This snippet shows how to declare an array in a BPF program. + +.. code-block:: c + + struct { + __uint(type, BPF_MAP_TYPE_ARRAY); + __type(key, u32); + __type(value, long); + __uint(max_entries, 256); + } my_map SEC(".maps"); + + +This example BPF program shows how to access an array element. + +.. code-block:: c + + int bpf_prog(struct __sk_buff *skb) + { + struct iphdr ip; + int index; + long *value; + + if (bpf_skb_load_bytes(skb, ETH_HLEN, &ip, sizeof(ip)) < 0) + return 0; + + index = ip.protocol; + value = bpf_map_lookup_elem(&my_map, &index); + if (value) + __sync_fetch_and_add(value, skb->len); + + return 0; + } + +Userspace +--------- + +BPF_MAP_TYPE_ARRAY +~~~~~~~~~~~~~~~~~~ + +This snippet shows how to create an array, using ``bpf_map_create_opts`` to +set flags. + +.. code-block:: c + + #include <bpf/libbpf.h> + #include <bpf/bpf.h> + + int create_array() + { + int fd; + LIBBPF_OPTS(bpf_map_create_opts, opts, .map_flags = BPF_F_MMAPABLE); + + fd = bpf_map_create(BPF_MAP_TYPE_ARRAY, + "example_array", /* name */ + sizeof(__u32), /* key size */ + sizeof(long), /* value size */ + 256, /* max entries */ + &opts); /* create opts */ + return fd; + } + +This snippet shows how to initialize the elements of an array. + +.. code-block:: c + + int initialize_array(int fd) + { + __u32 i; + long value; + int ret; + + for (i = 0; i < 256; i++) { + value = i; + ret = bpf_map_update_elem(fd, &i, &value, BPF_ANY); + if (ret < 0) + return ret; + } + + return ret; + } + +This snippet shows how to retrieve an element value from an array. + +.. code-block:: c + + int lookup(int fd) + { + __u32 index = 42; + long value; + int ret; + + ret = bpf_map_lookup_elem(fd, &index, &value); + if (ret < 0) + return ret; + + /* use value here */ + assert(value == 42); + + return ret; + } + +BPF_MAP_TYPE_PERCPU_ARRAY +~~~~~~~~~~~~~~~~~~~~~~~~~ + +This snippet shows how to initialize the elements of a per CPU array. + +.. code-block:: c + + int initialize_array(int fd) + { + int ncpus = libbpf_num_possible_cpus(); + long values[ncpus]; + __u32 i, j; + int ret; + + for (i = 0; i < 256 ; i++) { + for (j = 0; j < ncpus; j++) + values[j] = i; + ret = bpf_map_update_elem(fd, &i, &values, BPF_ANY); + if (ret < 0) + return ret; + } + + return ret; + } + +This snippet shows how to access the per CPU elements of an array value. + +.. code-block:: c + + int lookup(int fd) + { + int ncpus = libbpf_num_possible_cpus(); + __u32 index = 42, j; + long values[ncpus]; + int ret; + + ret = bpf_map_lookup_elem(fd, &index, &values); + if (ret < 0) + return ret; + + for (j = 0; j < ncpus; j++) { + /* Use per CPU value here */ + assert(values[j] == 42); + } + + return ret; + } + +Semantics +========= + +As shown in the example above, when accessing a ``BPF_MAP_TYPE_PERCPU_ARRAY`` +in userspace, each value is an array with ``ncpus`` elements. + +When calling ``bpf_map_update_elem()`` the flag ``BPF_NOEXIST`` can not be used +for these maps. -- 2.35.1 ^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY 2022-11-09 17:46 ` [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY Donald Hunter @ 2022-11-11 1:52 ` Bagas Sanjaya 2022-11-11 19:39 ` Andrii Nakryiko 1 sibling, 0 replies; 7+ messages in thread From: Bagas Sanjaya @ 2022-11-11 1:52 UTC (permalink / raw) To: Donald Hunter, bpf, linux-doc Cc: Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Jonathan Corbet, Dave Tucker, Maryam Tahhan On 11/10/22 00:46, Donald Hunter wrote: > From: Dave Tucker <dave@dtucker.co.uk> > > Add documentation for the BPF_MAP_TYPE_ARRAY including kernel version > introduced, usage and examples. Also document BPF_MAP_TYPE_PERCPU_ARRAY > which is similar. > > Signed-off-by: Dave Tucker <dave@dtucker.co.uk> > Co-developed-by: Donald Hunter <donald.hunter@gmail.com> > Signed-off-by: Donald Hunter <donald.hunter@gmail.com> > Reviewed-by: Maryam Tahhan <mtahhan@redhat.com> > --- > Documentation/bpf/map_array.rst | 250 ++++++++++++++++++++++++++++++++ > 1 file changed, 250 insertions(+) > create mode 100644 Documentation/bpf/map_array.rst > > diff --git a/Documentation/bpf/map_array.rst b/Documentation/bpf/map_array.rst > new file mode 100644 > index 000000000000..97bb80333254 > --- /dev/null > +++ b/Documentation/bpf/map_array.rst > @@ -0,0 +1,250 @@ > +.. SPDX-License-Identifier: GPL-2.0-only > +.. Copyright (C) 2022 Red Hat, Inc. > + > +================================================ > +BPF_MAP_TYPE_ARRAY and BPF_MAP_TYPE_PERCPU_ARRAY > +================================================ > + > +.. note:: > + - ``BPF_MAP_TYPE_ARRAY`` was introduced in kernel version 3.19 > + - ``BPF_MAP_TYPE_PERCPU_ARRAY`` was introduced in version 4.6 > + > +``BPF_MAP_TYPE_ARRAY`` and ``BPF_MAP_TYPE_PERCPU_ARRAY`` provide generic array > +storage. The key type is an unsigned 32-bit integer (4 bytes) and the map is > +of constant size. The size of the array is defined in ``max_entries`` at > +creation time. All array elements are pre-allocated and zero initialized when > +created. ``BPF_MAP_TYPE_PERCPU_ARRAY`` uses a different memory region for each > +CPU whereas ``BPF_MAP_TYPE_ARRAY`` uses the same memory region. The value > +stored can be of any size, however, all array elements are aligned to 8 > +bytes. > + > +Since kernel 5.5, memory mapping may be enabled for ``BPF_MAP_TYPE_ARRAY`` by > +setting the flag ``BPF_F_MMAPABLE``. The map definition is page-aligned and > +starts on the first page. Sufficient page-sized and page-aligned blocks of > +memory are allocated to store all array values, starting on the second page, > +which in some cases will result in over-allocation of memory. The benefit of > +using this is increased performance and ease of use since userspace programs > +would not be required to use helper functions to access and mutate data. > + > +Usage > +===== > + > +Kernel BPF > +---------- > + > +.. c:function:: > + void *bpf_map_lookup_elem(struct bpf_map *map, const void *key) > + > +Array elements can be retrieved using the ``bpf_map_lookup_elem()`` helper. > +This helper returns a pointer into the array element, so to avoid data races > +with userspace reading the value, the user must use primitives like > +``__sync_fetch_and_add()`` when updating the value in-place. > + > +.. c:function:: > + long bpf_map_update_elem(struct bpf_map *map, const void *key, const void *value, u64 flags) > + > +Array elements can be updated using the ``bpf_map_update_elem()`` helper. > + > +``bpf_map_update_elem()`` returns 0 on success, or negative error in case of > +failure. > + > +Since the array is of constant size, ``bpf_map_delete_elem()`` is not supported. > +To clear an array element, you may use ``bpf_map_update_elem()`` to insert a > +zero value to that index. > + > +Per CPU Array > +~~~~~~~~~~~~~ > + > +Values stored in ``BPF_MAP_TYPE_ARRAY`` can be accessed by multiple programs > +across different CPUs. To restrict storage to a single CPU, you may use a > +``BPF_MAP_TYPE_PERCPU_ARRAY``. > + > +When using a ``BPF_MAP_TYPE_PERCPU_ARRAY`` the ``bpf_map_update_elem()`` and > +``bpf_map_lookup_elem()`` helpers automatically access the slot for the current > +CPU. > + > +.. c:function:: > + void *bpf_map_lookup_percpu_elem(struct bpf_map *map, const void *key, u32 cpu) > + > +The ``bpf_map_lookup_percpu_elem()`` helper can be used to lookup the array > +value for a specific CPU. Returns value on success , or ``NULL`` if no entry was > +found or ``cpu`` is invalid. > + > +Concurrency > +----------- > + > +Since kernel version 5.1, the BPF infrastructure provides ``struct bpf_spin_lock`` > +to synchronize access. > + > +Userspace > +--------- > + > +Access from userspace uses libbpf APIs with the same names as above, with > +the map identified by its ``fd``. > + > +Examples > +======== > + > +Please see the ``tools/testing/selftests/bpf`` directory for functional > +examples. The code samples below demonstrate API usage. > + > +Kernel BPF > +---------- > + > +This snippet shows how to declare an array in a BPF program. > + > +.. code-block:: c > + > + struct { > + __uint(type, BPF_MAP_TYPE_ARRAY); > + __type(key, u32); > + __type(value, long); > + __uint(max_entries, 256); > + } my_map SEC(".maps"); > + > + > +This example BPF program shows how to access an array element. > + > +.. code-block:: c > + > + int bpf_prog(struct __sk_buff *skb) > + { > + struct iphdr ip; > + int index; > + long *value; > + > + if (bpf_skb_load_bytes(skb, ETH_HLEN, &ip, sizeof(ip)) < 0) > + return 0; > + > + index = ip.protocol; > + value = bpf_map_lookup_elem(&my_map, &index); > + if (value) > + __sync_fetch_and_add(value, skb->len); > + > + return 0; > + } > + > +Userspace > +--------- > + > +BPF_MAP_TYPE_ARRAY > +~~~~~~~~~~~~~~~~~~ > + > +This snippet shows how to create an array, using ``bpf_map_create_opts`` to > +set flags. > + > +.. code-block:: c > + > + #include <bpf/libbpf.h> > + #include <bpf/bpf.h> > + > + int create_array() > + { > + int fd; > + LIBBPF_OPTS(bpf_map_create_opts, opts, .map_flags = BPF_F_MMAPABLE); > + > + fd = bpf_map_create(BPF_MAP_TYPE_ARRAY, > + "example_array", /* name */ > + sizeof(__u32), /* key size */ > + sizeof(long), /* value size */ > + 256, /* max entries */ > + &opts); /* create opts */ > + return fd; > + } > + > +This snippet shows how to initialize the elements of an array. > + > +.. code-block:: c > + > + int initialize_array(int fd) > + { > + __u32 i; > + long value; > + int ret; > + > + for (i = 0; i < 256; i++) { > + value = i; > + ret = bpf_map_update_elem(fd, &i, &value, BPF_ANY); > + if (ret < 0) > + return ret; > + } > + > + return ret; > + } > + > +This snippet shows how to retrieve an element value from an array. > + > +.. code-block:: c > + > + int lookup(int fd) > + { > + __u32 index = 42; > + long value; > + int ret; > + > + ret = bpf_map_lookup_elem(fd, &index, &value); > + if (ret < 0) > + return ret; > + > + /* use value here */ > + assert(value == 42); > + > + return ret; > + } > + > +BPF_MAP_TYPE_PERCPU_ARRAY > +~~~~~~~~~~~~~~~~~~~~~~~~~ > + > +This snippet shows how to initialize the elements of a per CPU array. > + > +.. code-block:: c > + > + int initialize_array(int fd) > + { > + int ncpus = libbpf_num_possible_cpus(); > + long values[ncpus]; > + __u32 i, j; > + int ret; > + > + for (i = 0; i < 256 ; i++) { > + for (j = 0; j < ncpus; j++) > + values[j] = i; > + ret = bpf_map_update_elem(fd, &i, &values, BPF_ANY); > + if (ret < 0) > + return ret; > + } > + > + return ret; > + } > + > +This snippet shows how to access the per CPU elements of an array value. > + > +.. code-block:: c > + > + int lookup(int fd) > + { > + int ncpus = libbpf_num_possible_cpus(); > + __u32 index = 42, j; > + long values[ncpus]; > + int ret; > + > + ret = bpf_map_lookup_elem(fd, &index, &values); > + if (ret < 0) > + return ret; > + > + for (j = 0; j < ncpus; j++) { > + /* Use per CPU value here */ > + assert(values[j] == 42); > + } > + > + return ret; > + } > + > +Semantics > +========= > + > +As shown in the example above, when accessing a ``BPF_MAP_TYPE_PERCPU_ARRAY`` > +in userspace, each value is an array with ``ncpus`` elements. > + > +When calling ``bpf_map_update_elem()`` the flag ``BPF_NOEXIST`` can not be used > +for these maps. LGTM, thanks. Reviewed-by: Bagas Sanjaya <bagasdotme@gmail.com> -- An old man doll... just what I always wanted! - Clara ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY 2022-11-09 17:46 ` [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY Donald Hunter 2022-11-11 1:52 ` Bagas Sanjaya @ 2022-11-11 19:39 ` Andrii Nakryiko 2022-11-14 10:18 ` Donald Hunter 1 sibling, 1 reply; 7+ messages in thread From: Andrii Nakryiko @ 2022-11-11 19:39 UTC (permalink / raw) To: Donald Hunter Cc: bpf, linux-doc, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Jonathan Corbet, Dave Tucker, Maryam Tahhan On Wed, Nov 9, 2022 at 9:46 AM Donald Hunter <donald.hunter@gmail.com> wrote: > > From: Dave Tucker <dave@dtucker.co.uk> > > Add documentation for the BPF_MAP_TYPE_ARRAY including kernel version > introduced, usage and examples. Also document BPF_MAP_TYPE_PERCPU_ARRAY > which is similar. > > Signed-off-by: Dave Tucker <dave@dtucker.co.uk> > Co-developed-by: Donald Hunter <donald.hunter@gmail.com> > Signed-off-by: Donald Hunter <donald.hunter@gmail.com> > Reviewed-by: Maryam Tahhan <mtahhan@redhat.com> > --- > Documentation/bpf/map_array.rst | 250 ++++++++++++++++++++++++++++++++ > 1 file changed, 250 insertions(+) > create mode 100644 Documentation/bpf/map_array.rst > [...] > +This example BPF program shows how to access an array element. > + > +.. code-block:: c > + > + int bpf_prog(struct __sk_buff *skb) > + { > + struct iphdr ip; > + int index; > + long *value; > + > + if (bpf_skb_load_bytes(skb, ETH_HLEN, &ip, sizeof(ip)) < 0) > + return 0; > + > + index = ip.protocol; > + value = bpf_map_lookup_elem(&my_map, &index); > + if (value) > + __sync_fetch_and_add(value, skb->len); should be &value I fixed it up and applied to bpf-next, thanks. > + > + return 0; > + } > + > +Userspace > +--------- > + > +BPF_MAP_TYPE_ARRAY > +~~~~~~~~~~~~~~~~~~ > + > +This snippet shows how to create an array, using ``bpf_map_create_opts`` to > +set flags. > + [...] ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY 2022-11-11 19:39 ` Andrii Nakryiko @ 2022-11-14 10:18 ` Donald Hunter 2022-11-14 19:44 ` Andrii Nakryiko 0 siblings, 1 reply; 7+ messages in thread From: Donald Hunter @ 2022-11-14 10:18 UTC (permalink / raw) To: Andrii Nakryiko Cc: bpf, linux-doc, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Jonathan Corbet, Dave Tucker, Maryam Tahhan Andrii Nakryiko <andrii.nakryiko@gmail.com> writes: > On Wed, Nov 9, 2022 at 9:46 AM Donald Hunter <donald.hunter@gmail.com> wrote: >> >> +This example BPF program shows how to access an array element. >> + >> +.. code-block:: c >> + >> + int bpf_prog(struct __sk_buff *skb) >> + { >> + struct iphdr ip; >> + int index; >> + long *value; >> + >> + if (bpf_skb_load_bytes(skb, ETH_HLEN, &ip, sizeof(ip)) < 0) >> + return 0; >> + >> + index = ip.protocol; >> + value = bpf_map_lookup_elem(&my_map, &index); >> + if (value) >> + __sync_fetch_and_add(value, skb->len); > > should be &value > > I fixed it up and applied to bpf-next, thanks. I double checked and it really should be value, which is already a pointer. Do you want me to send a patch to fix it up? ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY 2022-11-14 10:18 ` Donald Hunter @ 2022-11-14 19:44 ` Andrii Nakryiko 0 siblings, 0 replies; 7+ messages in thread From: Andrii Nakryiko @ 2022-11-14 19:44 UTC (permalink / raw) To: Donald Hunter Cc: bpf, linux-doc, Alexei Starovoitov, Daniel Borkmann, Andrii Nakryiko, Jonathan Corbet, Dave Tucker, Maryam Tahhan On Mon, Nov 14, 2022 at 2:57 AM Donald Hunter <donald.hunter@gmail.com> wrote: > > Andrii Nakryiko <andrii.nakryiko@gmail.com> writes: > > > On Wed, Nov 9, 2022 at 9:46 AM Donald Hunter <donald.hunter@gmail.com> wrote: > >> > >> +This example BPF program shows how to access an array element. > >> + > >> +.. code-block:: c > >> + > >> + int bpf_prog(struct __sk_buff *skb) > >> + { > >> + struct iphdr ip; > >> + int index; > >> + long *value; > >> + > >> + if (bpf_skb_load_bytes(skb, ETH_HLEN, &ip, sizeof(ip)) < 0) > >> + return 0; > >> + > >> + index = ip.protocol; > >> + value = bpf_map_lookup_elem(&my_map, &index); > >> + if (value) > >> + __sync_fetch_and_add(value, skb->len); > > > > should be &value > > > > I fixed it up and applied to bpf-next, thanks. > > I double checked and it really should be value, which is already a > pointer. > > Do you want me to send a patch to fix it up? Oh, my bad, value is a pointer already and I was (wrongly) convinced that it's just a stack variable. Yes, please send a patch, thanks! ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY 2022-11-09 17:46 [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY Donald Hunter 2022-11-09 17:46 ` [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY Donald Hunter @ 2022-11-11 19:40 ` patchwork-bot+netdevbpf 1 sibling, 0 replies; 7+ messages in thread From: patchwork-bot+netdevbpf @ 2022-11-11 19:40 UTC (permalink / raw) To: Donald Hunter; +Cc: bpf, linux-doc, ast, daniel, andrii, corbet Hello: This patch was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@kernel.org>: On Wed, 9 Nov 2022 17:46:03 +0000 you wrote: > Add documentation for BPF_MAP_TYPE_ARRAY and BPF_MAP_TYPE_PERCPU_ARRAY > variant, including kernel version introduced, usage and examples. > > v9->v10: > - Add missing Reviewed-by tag > > v8->v9: > - Add "Kernel BPF" heading suggested by Jesper Brouer > - Tidy up wording to clarify BPF vs userspace APIs > > [...] Here is the summary with links: - [bpf-next,v10,1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY https://git.kernel.org/bpf/bpf-next/c/1cfa97b30c5a You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html ^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2022-11-14 19:45 UTC | newest] Thread overview: 7+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2022-11-09 17:46 [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY Donald Hunter 2022-11-09 17:46 ` [PATCH bpf-next v10 1/1] bpf, docs: document BPF_MAP_TYPE_ARRAY Donald Hunter 2022-11-11 1:52 ` Bagas Sanjaya 2022-11-11 19:39 ` Andrii Nakryiko 2022-11-14 10:18 ` Donald Hunter 2022-11-14 19:44 ` Andrii Nakryiko 2022-11-11 19:40 ` [PATCH bpf-next v10 0/1] Document BPF_MAP_TYPE_ARRAY patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).