2019-01-03 22:32 UTC-0800 ~ Y Song <ys114...@gmail.com> > On Thu, Jan 3, 2019 at 9:26 AM Quentin Monnet > <quentin.mon...@netronome.com> wrote: >> >> Add a set of probes to dump the eBPF-related parameters available from >> /proc/: availability of bpf() syscall for unprivileged users, >> JIT compiler status and hardening status, kallsyms exports status. >> >> Sample output: >> >> # bpftool feature probe kernel >> Scanning system configuration... >> bpf() syscall for unprivileged users is enabled >> JIT compiler is disabled >> JIT compiler hardening is disabled >> JIT compiler kallsyms exports are disabled >> ... >> >> # bpftool --json --pretty feature probe kernel >> { >> "system_config": { >> "unprivileged_bpf_disabled": 0, >> "bpf_jit_enable": 0, >> "bpf_jit_harden": 0, >> "bpf_jit_kallsyms": 0 > > We have bpf_jit_limit as well to prevent excessive memory for > unprivileged users. > Do we want to add it here?
Yes, thanks!