Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp4597008pxb; Tue, 22 Feb 2022 02:10:26 -0800 (PST) X-Google-Smtp-Source: ABdhPJxRIKKwNJge8/4IRogIpEXNOuXBmKngvVlVhcMHMdBetN8Tpln23MGPMWwiieapG47OSqwJ X-Received: by 2002:a05:6402:cac:b0:410:a920:4e90 with SMTP id cn12-20020a0564020cac00b00410a9204e90mr25147997edb.60.1645524625962; Tue, 22 Feb 2022 02:10:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645524625; cv=none; d=google.com; s=arc-20160816; b=UVXPJEdiaUZGMn8h9svpxu5pbER046MpxvBMWDQQYgkYAFuaOlZT+3/6Lrubzi4YHI MvDiYhYXxQV33+/4cJolgKz9FIBmNglJ46eYsFKgXGL4FTqx2E5oxFRJtvY1M1Z0PIUT +m26yl0zFEbe52I+qOvSGGqCKZOeNtg6h9miXYbaI4yf8Lm4BW8yQ2gx2G2JHnSPEcHW nUuzurvBc8mP4b7gAGnm9rJNIEmdgaKprASoEa6c7QWOBLtQg+0QH3bj4dRC3AbO8BHV ckWnAB25ehKQRcO7HhY6a8w9lcUU8Tt71swxtNA/+Wf2VvtGtsR5G7a3qRpA8RWgd7Kx wv2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=mLX0CuGE7QJTLwbbNybe7HYp1awNnEtwW/IZgVh8Xp4=; b=yhInlLj5wLrdxl1KCo9GiS4YLRzeN9EfRxdnuKc0Cq9jhbOoJryoC3jGhBmtFkHW7+ ozzosB33dzffdaHZdsb/QN1j0JeIeQMntOqx/tiHTpC0xXV4KbpoX3yKDp/jUlWwm6Sl Is6+FE3fhIGyH4gYGEWv3Q7CIhiPwdRMqSq0+4liF4S5cvFaxBACy+MCLDU7B5Fur9Eu A8/KHGmdjS2lZYiIlANPEYcgcIpP4tnJhnf1I5rV7st9wKdgNQXR4S3op16+StHjVPxc F0cAmkj7sdE55/AfXGHVcPZCaldj8ePGURRpBrV9m6NRM/Sp2DFwcN239/rlh0tlKwvY KZqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id di2si12013843ejc.796.2022.02.22.02.10.02; Tue, 22 Feb 2022 02:10:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230368AbiBVJ5s (ORCPT + 99 others); Tue, 22 Feb 2022 04:57:48 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54702 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230395AbiBVJ5l (ORCPT ); Tue, 22 Feb 2022 04:57:41 -0500 Received: from loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B125DD224C; Tue, 22 Feb 2022 01:57:14 -0800 (PST) Received: from linux.localdomain (unknown [113.200.148.30]) by mail.loongson.cn (Coremail) with SMTP id AQAAf9DxmMhzsxRiHa8EAA--.4515S2; Tue, 22 Feb 2022 17:57:07 +0800 (CST) From: Tiezhu Yang To: Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh Cc: Xuefeng Li , netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH bpf-next v3 0/2] Modify BPF_JIT_ALWAYS_ON and BPF_JIT_DEFAULT_ON Date: Tue, 22 Feb 2022 17:57:04 +0800 Message-Id: <1645523826-18149-1-git-send-email-yangtiezhu@loongson.cn> X-Mailer: git-send-email 2.1.0 X-CM-TRANSID: AQAAf9DxmMhzsxRiHa8EAA--.4515S2 X-Coremail-Antispam: 1UD129KBjDUn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7v73 VFW2AGmfu7bjvjm3AaLaJ3UjIYCTnIWjp_UUUYh7AC8VAFwI0_Gr0_Xr1l1xkIjI8I6I8E 6xAIw20EY4v20xvaj40_Wr0E3s1l1IIY67AEw4v_Jr0_Jr4l8cAvFVAK0II2c7xJM28Cjx kF64kEwVA0rcxSw2x7M28EF7xvwVC0I7IYx2IY67AKxVW8JVW5JwA2z4x0Y4vE2Ix0cI8I cVCY1x0267AKxVW8JVWxJwA2z4x0Y4vEx4A2jsIE14v26F4UJVW0owA2z4x0Y4vEx4A2js IEc7CjxVAFwI0_GcCE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE 5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_JrI_JrylYx0Ex4A2jsIE14v26r1j6r4UMcvjeV CFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwIxGrwACjI8F5VA0II8E6IAqYI8I648v4I1l FIxGxcIEc7CjxVA2Y2ka0xkIwI1lc2xSY4AK67AK6r4fMxAIw28IcxkI7VAKI48JMxC20s 026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_ JrI_JrWlx4CE17CEb7AF67AKxVWUtVW8ZwCIc40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14 v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwCI42IY6xAIw20EY4v20xva j40_WFyUJVCq3wCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87Iv6xkF7I0E14v26r 4j6r4UJbIYCTnIWIevJa73UjIFyTuYvjfUOOzVUUUUU X-CM-SenderInfo: p1dqw3xlh2x3gn0dqz5rrqw2lrqou0/ X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org v3: -- Use "return failure" instead of "return in failure". -- Use "Enable BPF JIT by default" for config BPF_JIT_DEFAULT_ON. v2: -- Use the full path /proc/sys/net/core/bpf_jit_enable in the help text. -- Update the commit message to make it clear in patch #2. Tiezhu Yang (2): bpf: Add some description about BPF_JIT_ALWAYS_ON in Kconfig bpf: Make BPF_JIT_DEFAULT_ON selectable in Kconfig kernel/bpf/Kconfig | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-) -- 2.1.0