Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp4592606pxb; Sat, 12 Feb 2022 10:24:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJzUfhQzlnzbsz4o0KieyZsgUbdaoc3DhE8Pml3KyoSGLqiI2bsAmMHGF4wRfLMVHfoWGFyv X-Received: by 2002:a05:6402:5307:: with SMTP id eo7mr2732164edb.205.1644690297058; Sat, 12 Feb 2022 10:24:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644690297; cv=none; d=google.com; s=arc-20160816; b=zGtG7Aj80wMxa3Q3Uxow0y7//AeXWHQUR2UGGyZJJVFuGVqZrobtc5YnBkx7wVLBeF tLJod20ZTxlv0Y5RzZqDcCTat2G+o9HWWRVCAkcvGYSuuXLXtXHZ9JCyCe9K+UqNLb7n cLsD44dBTfoGvtIqusECh/E9sdVSh+aMHjAYmEPYcpGLkIwPZ17sTMk3hwpz1g614XqG fPuyWHm/LgGCTpjJtQ0Wfnoho8Vz8s6189eQROAOiO8htrvUqjCdW59m899iwWLjyVO6 qvqDxfS39uktSFoPZ4xK4e5rIMuvWGrqRzp8S4Uv54iDc2DkUqbUPrsOT3PNuG6ue1cL /blw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=UZkNqj30xZs/Z2Mb9mZYpOg7adt6qH7nICGvlOXTsEc=; b=hOqqkRkFql2vGhZxYYzfsvj/W0dkg3w1y6BXNndbpc9ZZXHS5LuMnSPaS7qxDipqC5 B1MbW/ovoW4mytYwxD4yMS9n5WYebCI6i7mzeS4GjgmXU5zA5lsD01CQkSP7cVTWsik2 lYKNreUq0ixfFrjRAIYlswJ6+Yw/AOYlTf0htRllnHtx2t7oo5uoLOHEyDoShytnWVTF fGHgeu/9v6+XYkFW8gEyub1zD0jfo9+kuV5cXw36zGHIvikkQXREzGjoDrJztQtSLGFJ Ol3QlM4kPZNrsFS/sEWcFgVhw+DB9JPqxkxktTzI+IOIjm3wLntoPfrZ6CZVv4YKaWYQ cKOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 4si14899211ejl.790.2022.02.12.10.24.34; Sat, 12 Feb 2022 10:24:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348873AbiBKKYM (ORCPT + 94 others); Fri, 11 Feb 2022 05:24:12 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:51340 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346916AbiBKKYJ (ORCPT ); Fri, 11 Feb 2022 05:24:09 -0500 Received: from www62.your-server.de (www62.your-server.de [213.133.104.62]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 55885220; Fri, 11 Feb 2022 02:24:08 -0800 (PST) Received: from sslproxy06.your-server.de ([78.46.172.3]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1nIT5s-000AVF-Pf; Fri, 11 Feb 2022 11:24:00 +0100 Received: from [85.1.206.226] (helo=linux.home) by sslproxy06.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1nIT5s-000DIF-Dm; Fri, 11 Feb 2022 11:24:00 +0100 Subject: Re: [PATCH bpf-next 2/2] bpf: Make BPF_JIT_DEFAULT_ON selectable in Kconfig To: Tiezhu Yang , Alexei Starovoitov , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh Cc: Xuefeng Li , netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org References: <1644569851-20859-1-git-send-email-yangtiezhu@loongson.cn> <1644569851-20859-3-git-send-email-yangtiezhu@loongson.cn> From: Daniel Borkmann Message-ID: Date: Fri, 11 Feb 2022 11:23:59 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <1644569851-20859-3-git-send-email-yangtiezhu@loongson.cn> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.5/26450/Fri Feb 11 10:24:09 2022) X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/11/22 9:57 AM, Tiezhu Yang wrote: > Currently, it is not possible to set bpf_jit_enable to 1 by default > and the users can change it to 0 or 2, it seems bad for some users, > make BPF_JIT_DEFAULT_ON selectable to give them a chance. I'm not fully sure I follow the above, so you are saying that a kconfig of !BPF_JIT_ALWAYS_ON and ARCH_WANT_DEFAULT_BPF_JIT, enables BPF_JIT_DEFAULT_ON however in such setting you are not able to reset bpf_jit_enable back to 0 at runtime? Thanks, Daniel