Received: by 10.192.165.148 with SMTP id m20csp454036imm; Wed, 25 Apr 2018 02:14:18 -0700 (PDT) X-Google-Smtp-Source: AIpwx48LSkjxYdsMa+YPFIO6ADyK++B6wcisN5bhUt799v/Ut1N8wbM+wsHr//Kgmgpbla9eQgrV X-Received: by 2002:a17:902:b18c:: with SMTP id s12-v6mr29063887plr.178.1524647658546; Wed, 25 Apr 2018 02:14:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524647658; cv=none; d=google.com; s=arc-20160816; b=klF2ftdTYuOlKUWbAhoKw9wlKASsp4mX9vkyBGJQl7ltezHHfza150FBAbX7C5nzj2 jez9THyOSnDfWxXMnDaRYEAsHd5upubjrd78FjVLsaRO8eFdWFFtSprZVG7WZSMxK5aX UkPm1btkUhOWxRIp4hwR8wwzgSL4qjP3uyQSOCTMhU2ZPo/OoZWMWiMU+1WDf20NPjCW 1QRBRAdOqbK1wmxZHfBxBSi4dAoLhghSVb98vW8bdHw2DCZE0jcKPph407erCpnGtatW 9h1T4ZsUVgKV+rVwMeOXzMaLcSptPrvinRirFRKKkRLse2fT86seS7i3Km60hv6jT3JL O5Aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:arc-authentication-results; bh=MyFGwMsFhPaZUT2t/baDXDENPvV0blalN/iJYkqa6ZM=; b=hCZbvwbrm6nR2mIyielQylrxuCjVptchvyBrteQgxsD37/Qir0NqSH0xY3FO3QawUT /9JeyMqsLxaCHbX0iNzT12JVWklDWikICHGwwlq7l24ae3AWjPiv9po/Zgs0AfeY467Q WdRtRl2XSmcJBtqBiFApoCgJ7PSACwhiXHFP33oCpCbRPT+W+uSd/go9V7XA/YEva89a mewetcASvxWdrBI+TJFmaclVRitco9uS24rOBi+H37IZGhWS9j4se9MB/Cm7KcZRDAFC BYQug7qGjT7V2UQoMPlkUA2T0aBZQvZkgXO9+orqDxyZ/8RiADqIT+LuH07SjNA4CmdQ OEKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 99-v6si15924882plc.601.2018.04.25.02.14.04; Wed, 25 Apr 2018 02:14:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752090AbeDYJMn (ORCPT + 99 others); Wed, 25 Apr 2018 05:12:43 -0400 Received: from www62.your-server.de ([213.133.104.62]:34254 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751973AbeDYJM0 (ORCPT ); Wed, 25 Apr 2018 05:12:26 -0400 Received: from [62.202.221.10] (helo=linux.home) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-SHA:256) (Exim 4.85_2) (envelope-from ) id 1fBGTN-0004wM-Ke; Wed, 25 Apr 2018 11:12:21 +0200 Subject: Re: [PATCH bpf-next] bpf: Allow bpf_jit_enable = 2 with BPF_JIT_ALWAYS_ON config To: Leo Yan , "David S. Miller" , Alexei Starovoitov , Kirill Tkhai , netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: <1524644322-9263-1-git-send-email-leo.yan@linaro.org> From: Daniel Borkmann Message-ID: Date: Wed, 25 Apr 2018 11:12:21 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <1524644322-9263-1-git-send-email-leo.yan@linaro.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.99.3/24511/Wed Apr 25 06:25:51 2018) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/25/2018 10:18 AM, Leo Yan wrote: > After enabled BPF_JIT_ALWAYS_ON config, bpf_jit_enable always equals to > 1; it is impossible to set 'bpf_jit_enable = 2' and the kernel has no > chance to call bpf_jit_dump(). > > This patch relaxes bpf_jit_enable range to [1..2] when kernel config > BPF_JIT_ALWAYS_ON is enabled so can invoke jit dump. > > Signed-off-by: Leo Yan Is there a specific reason why you need this here instead of retrieving the dump from the newer interface available from bpftool (tools/bpf/bpftool/)? The bpf_jit_enable = 2 is not recommended these days since it dumps into the kernel log which is often readable from unpriv as well. bpftool makes use of the BPF_OBJ_GET_INFO_BY_FD interface via bpf syscall to get the JIT dump instead when bpf_jit_enable is set. > --- > net/core/sysctl_net_core.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/net/core/sysctl_net_core.c b/net/core/sysctl_net_core.c > index b1a2c5e..6a39b22 100644 > --- a/net/core/sysctl_net_core.c > +++ b/net/core/sysctl_net_core.c > @@ -371,7 +371,7 @@ static int proc_dointvec_minmax_bpf_enable(struct ctl_table *table, int write, > .proc_handler = proc_dointvec_minmax_bpf_enable, > # ifdef CONFIG_BPF_JIT_ALWAYS_ON > .extra1 = &one, > - .extra2 = &one, > + .extra2 = &two, > # else > .extra1 = &zero, > .extra2 = &two, >