2019-01-03 22:32 UTC-0800 ~ Y Song <ys114...@gmail.com>
> On Thu, Jan 3, 2019 at 9:26 AM Quentin Monnet
> <quentin.mon...@netronome.com> wrote:
>>
>> Add a set of probes to dump the eBPF-related parameters available from
>> /proc/: availability of bpf() syscall for unprivileged users,
>> JIT compiler status and hardening status, kallsyms exports status.
>>
>> Sample output:
>>
>>     # bpftool feature probe kernel
>>     Scanning system configuration...
>>     bpf() syscall for unprivileged users is enabled
>>     JIT compiler is disabled
>>     JIT compiler hardening is disabled
>>     JIT compiler kallsyms exports are disabled
>>     ...
>>
>>     # bpftool --json --pretty feature probe kernel
>>     {
>>         "system_config": {
>>             "unprivileged_bpf_disabled": 0,
>>             "bpf_jit_enable": 0,
>>             "bpf_jit_harden": 0,
>>             "bpf_jit_kallsyms": 0
> 
> We have bpf_jit_limit as well to prevent excessive memory for
> unprivileged users.
> Do we want to add it here?

Yes, thanks!

Reply via email to