bpftool: Fix mixed indentation in documentation
authorQuentin Monnet <quentin@isovalent.com>
Wed, 10 Nov 2021 11:46:32 +0000 (11:46 +0000)
committerAndrii Nakryiko <andrii@kernel.org>
Mon, 15 Nov 2021 02:35:02 +0000 (18:35 -0800)
Some paragraphs in bpftool's documentation have a mix of tabs and spaces
for indentation. Let's make it consistent.

This patch brings no change to the text content.

Signed-off-by: Quentin Monnet <quentin@isovalent.com>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20211110114632.24537-7-quentin@isovalent.com
tools/bpf/bpftool/Documentation/bpftool-cgroup.rst
tools/bpf/bpftool/Documentation/bpftool-net.rst

index 13a217a..8069d37 100644 (file)
@@ -30,9 +30,9 @@ CGROUP COMMANDS
 |      *PROG* := { **id** *PROG_ID* | **pinned** *FILE* | **tag** *PROG_TAG* }
 |      *ATTACH_TYPE* := { **ingress** | **egress** | **sock_create** | **sock_ops** | **device** |
 |              **bind4** | **bind6** | **post_bind4** | **post_bind6** | **connect4** | **connect6** |
-|               **getpeername4** | **getpeername6** | **getsockname4** | **getsockname6** | **sendmsg4** |
-|               **sendmsg6** | **recvmsg4** | **recvmsg6** | **sysctl** | **getsockopt** | **setsockopt** |
-|               **sock_release** }
+|              **getpeername4** | **getpeername6** | **getsockname4** | **getsockname6** | **sendmsg4** |
+|              **sendmsg6** | **recvmsg4** | **recvmsg6** | **sysctl** | **getsockopt** | **setsockopt** |
+|              **sock_release** }
 |      *ATTACH_FLAGS* := { **multi** | **override** }
 
 DESCRIPTION
@@ -98,9 +98,9 @@ DESCRIPTION
                  **sendmsg6** call to sendto(2), sendmsg(2), sendmmsg(2) for an
                  unconnected udp6 socket (since 4.18);
                  **recvmsg4** call to recvfrom(2), recvmsg(2), recvmmsg(2) for
-                  an unconnected udp4 socket (since 5.2);
+                 an unconnected udp4 socket (since 5.2);
                  **recvmsg6** call to recvfrom(2), recvmsg(2), recvmmsg(2) for
-                  an unconnected udp6 socket (since 5.2);
+                 an unconnected udp6 socket (since 5.2);
                  **sysctl** sysctl access (since 5.2);
                  **getsockopt** call to getsockopt (since 5.3);
                  **setsockopt** call to setsockopt (since 5.3);
index 1ae0375..7ec5753 100644 (file)
@@ -31,44 +31,44 @@ NET COMMANDS
 DESCRIPTION
 ===========
        **bpftool net { show | list }** [ **dev** *NAME* ]
-                  List bpf program attachments in the kernel networking subsystem.
-
-                  Currently, only device driver xdp attachments and tc filter
-                  classification/action attachments are implemented, i.e., for
-                  program types **BPF_PROG_TYPE_SCHED_CLS**,
-                  **BPF_PROG_TYPE_SCHED_ACT** and **BPF_PROG_TYPE_XDP**.
-                  For programs attached to a particular cgroup, e.g.,
-                  **BPF_PROG_TYPE_CGROUP_SKB**, **BPF_PROG_TYPE_CGROUP_SOCK**,
-                  **BPF_PROG_TYPE_SOCK_OPS** and **BPF_PROG_TYPE_CGROUP_SOCK_ADDR**,
-                  users can use **bpftool cgroup** to dump cgroup attachments.
-                  For sk_{filter, skb, msg, reuseport} and lwt/seg6
-                  bpf programs, users should consult other tools, e.g., iproute2.
-
-                  The current output will start with all xdp program attachments, followed by
-                  all tc class/qdisc bpf program attachments. Both xdp programs and
-                  tc programs are ordered based on ifindex number. If multiple bpf
-                  programs attached to the same networking device through **tc filter**,
-                  the order will be first all bpf programs attached to tc classes, then
-                  all bpf programs attached to non clsact qdiscs, and finally all
-                  bpf programs attached to root and clsact qdisc.
+                 List bpf program attachments in the kernel networking subsystem.
+
+                 Currently, only device driver xdp attachments and tc filter
+                 classification/action attachments are implemented, i.e., for
+                 program types **BPF_PROG_TYPE_SCHED_CLS**,
+                 **BPF_PROG_TYPE_SCHED_ACT** and **BPF_PROG_TYPE_XDP**.
+                 For programs attached to a particular cgroup, e.g.,
+                 **BPF_PROG_TYPE_CGROUP_SKB**, **BPF_PROG_TYPE_CGROUP_SOCK**,
+                 **BPF_PROG_TYPE_SOCK_OPS** and **BPF_PROG_TYPE_CGROUP_SOCK_ADDR**,
+                 users can use **bpftool cgroup** to dump cgroup attachments.
+                 For sk_{filter, skb, msg, reuseport} and lwt/seg6
+                 bpf programs, users should consult other tools, e.g., iproute2.
+
+                 The current output will start with all xdp program attachments, followed by
+                 all tc class/qdisc bpf program attachments. Both xdp programs and
+                 tc programs are ordered based on ifindex number. If multiple bpf
+                 programs attached to the same networking device through **tc filter**,
+                 the order will be first all bpf programs attached to tc classes, then
+                 all bpf programs attached to non clsact qdiscs, and finally all
+                 bpf programs attached to root and clsact qdisc.
 
        **bpftool** **net attach** *ATTACH_TYPE* *PROG* **dev** *NAME* [ **overwrite** ]
-                  Attach bpf program *PROG* to network interface *NAME* with
-                  type specified by *ATTACH_TYPE*. Previously attached bpf program
-                  can be replaced by the command used with **overwrite** option.
-                  Currently, only XDP-related modes are supported for *ATTACH_TYPE*.
+                 Attach bpf program *PROG* to network interface *NAME* with
+                 type specified by *ATTACH_TYPE*. Previously attached bpf program
+                 can be replaced by the command used with **overwrite** option.
+                 Currently, only XDP-related modes are supported for *ATTACH_TYPE*.
 
-                  *ATTACH_TYPE* can be of:
-                  **xdp** - try native XDP and fallback to generic XDP if NIC driver does not support it;
-                  **xdpgeneric** - Generic XDP. runs at generic XDP hook when packet already enters receive path as skb;
-                  **xdpdrv** - Native XDP. runs earliest point in driver's receive path;
-                  **xdpoffload** - Offload XDP. runs directly on NIC on each packet reception;
+                 *ATTACH_TYPE* can be of:
+                 **xdp** - try native XDP and fallback to generic XDP if NIC driver does not support it;
+                 **xdpgeneric** - Generic XDP. runs at generic XDP hook when packet already enters receive path as skb;
+                 **xdpdrv** - Native XDP. runs earliest point in driver's receive path;
+                 **xdpoffload** - Offload XDP. runs directly on NIC on each packet reception;
 
        **bpftool** **net detach** *ATTACH_TYPE* **dev** *NAME*
-                  Detach bpf program attached to network interface *NAME* with
-                  type specified by *ATTACH_TYPE*. To detach bpf program, same
-                  *ATTACH_TYPE* previously used for attach must be specified.
-                  Currently, only XDP-related modes are supported for *ATTACH_TYPE*.
+                 Detach bpf program attached to network interface *NAME* with
+                 type specified by *ATTACH_TYPE*. To detach bpf program, same
+                 *ATTACH_TYPE* previously used for attach must be specified.
+                 Currently, only XDP-related modes are supported for *ATTACH_TYPE*.
 
        **bpftool net help**
                  Print short help message.