diff options
author | Quentin Monnet <quentin.monnet@netronome.com> | 2019-01-17 15:27:51 +0000 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2019-01-22 22:15:40 -0800 |
commit | 7a4522bbef0c4c63a87b5363840460996aff97c3 (patch) | |
tree | 3cb83ff059ee37f90ce1853daa358d720067457e /crypto/seed.c | |
parent | 49eb7ab3b2b5a106307494d2a46248ecb1530578 (diff) |
tools: bpftool: add probes for /proc/ eBPF parameters
Add a set of probes to dump the eBPF-related parameters available from
/proc/: availability of bpf() syscall for unprivileged users,
JIT compiler status and hardening status, kallsyms exports status.
Sample output:
# bpftool feature probe kernel
Scanning system configuration...
bpf() syscall for unprivileged users is enabled
JIT compiler is disabled
JIT compiler hardening is disabled
JIT compiler kallsyms exports are disabled
Global memory limit for JIT compiler for unprivileged users \
is 264241152 bytes
...
# bpftool --json --pretty feature probe kernel
{
"system_config": {
"unprivileged_bpf_disabled": 0,
"bpf_jit_enable": 0,
"bpf_jit_harden": 0,
"bpf_jit_kallsyms": 0,
"bpf_jit_limit": 264241152
},
...
}
These probes are skipped if procfs is not mounted.
v4:
- Add bpf_jit_limit parameter.
v2:
- Remove C-style macros output from this patch.
Signed-off-by: Quentin Monnet <quentin.monnet@netronome.com>
Reviewed-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Reviewed-by: Stanislav Fomichev <sdf@google.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'crypto/seed.c')
0 files changed, 0 insertions, 0 deletions