• Quentin Monnet's avatar
    tools: bpftool: add probes for /proc/ eBPF parameters · 7a4522bb
    Quentin Monnet authored
    Add a set of probes to dump the eBPF-related parameters available from
    /proc/: availability of bpf() syscall for unprivileged users,
    JIT compiler status and hardening status, kallsyms exports status.
    
    Sample output:
    
        # bpftool feature probe kernel
        Scanning system configuration...
        bpf() syscall for unprivileged users is enabled
        JIT compiler is disabled
        JIT compiler hardening is disabled
        JIT compiler kallsyms exports are disabled
        Global memory limit for JIT compiler for unprivileged users \
                is 264241152 bytes
        ...
    
        # bpftool --json --pretty feature probe kernel
        {
            "system_config": {
                "unprivileged_bpf_disabled": 0,
                "bpf_jit_enable": 0,
                "bpf_jit_harden": 0,
                "bpf_jit_kallsyms": 0,
                "bpf_jit_limit": 264241152
            },
            ...
        }
    
    These probes are skipped if procfs is not mounted.
    
    v4:
    - Add bpf_jit_limit parameter.
    
    v2:
    - Remove C-style macros output from this patch.
    Signed-off-by: default avatarQuentin Monnet <quentin.monnet@netronome.com>
    Reviewed-by: default avatarJakub Kicinski <jakub.kicinski@netronome.com>
    Reviewed-by: default avatarStanislav Fomichev <sdf@google.com>
    Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
    7a4522bb
feature.c 6.27 KB