1 .. SPDX-License-Identifier: (GPL-2.0-only OR B << 2 << 3 =============== 1 =============== 4 bpftool-feature 2 bpftool-feature 5 =============== 3 =============== 6 ---------------------------------------------- 4 ------------------------------------------------------------------------------- 7 tool for inspection of eBPF-related parameters 5 tool for inspection of eBPF-related parameters for Linux kernel or net device 8 ---------------------------------------------- 6 ------------------------------------------------------------------------------- 9 7 10 :Manual section: 8 8 :Manual section: 8 11 9 12 .. include:: substitutions.rst << 13 << 14 SYNOPSIS 10 SYNOPSIS 15 ======== 11 ======== 16 12 17 **bpftool** [*OPTIONS*] **feature** *COMMAND* !! 13 **bpftool** [*OPTIONS*] **feature** *COMMAND* 18 14 19 *OPTIONS* := { |COMMON_OPTIONS| } !! 15 *OPTIONS* := { { **-j** | **--json** } [{ **-p** | **--pretty** }] } 20 16 21 *COMMANDS* := { **probe** | **help** } !! 17 *COMMANDS* := { **probe** | **help** } 22 18 23 FEATURE COMMANDS 19 FEATURE COMMANDS 24 ================ 20 ================ 25 21 26 | **bpftool** **feature probe** [*COMPONENT*] !! 22 | **bpftool** **feature probe** [*COMPONENT*] [**full**] [**unprivileged**] [**macros** [**prefix** *PREFIX*]] 27 | **bpftool** **feature list_builtins** *GROUP !! 23 | **bpftool** **feature help** 28 | **bpftool** **feature help** << 29 | 24 | 30 | *COMPONENT* := { **kernel** | **dev** *NAME* !! 25 | *COMPONENT* := { **kernel** | **dev** *NAME* } 31 | *GROUP* := { **prog_types** | **map_types** << 32 26 33 DESCRIPTION 27 DESCRIPTION 34 =========== 28 =========== 35 bpftool feature probe [kernel] [full] [macros !! 29 **bpftool feature probe** [**kernel**] [**full**] [**macros** [**prefix** *PREFIX*]] 36 Probe the running kernel and dump a number !! 30 Probe the running kernel and dump a number of eBPF-related 37 as availability of the **bpf**\ () system !! 31 parameters, such as availability of the **bpf**\ () system call, 38 types availability, eBPF helper functions !! 32 JIT status, eBPF program types availability, eBPF helper 39 !! 33 functions availability, and more. 40 By default, bpftool **does not run probes* !! 34 41 () and **bpf_trace_printk**\() helpers whi !! 35 By default, bpftool **does not run probes** for 42 To enable them and run all probes, the **f !! 36 **bpf_probe_write_user**\ () and **bpf_trace_printk**\() 43 !! 37 helpers which print warnings to kernel logs. To enable them 44 If the **macros** keyword (but not the **- !! 38 and run all probes, the **full** keyword should be used. 45 of the output is dumped as a list of **#de !! 39 46 be included in a C header file, for exampl !! 40 If the **macros** keyword (but not the **-j** option) is 47 is used to define a *PREFIX*, the provided !! 41 passed, a subset of the output is dumped as a list of 48 to the names of the macros: this can be us !! 42 **#define** macros that are ready to be included in a C 49 names when including the output of this co !! 43 header file, for example. If, additionally, **prefix** is 50 !! 44 used to define a *PREFIX*, the provided string will be used 51 Keyword **kernel** can be omitted. If no p !! 45 as a prefix to the names of the macros: this can be used to 52 the kernel is the default behaviour. !! 46 avoid conflicts on macro names when including the output of 53 !! 47 this command as a header file. 54 When the **unprivileged** keyword is used, !! 48 55 features available to a user who does not !! 49 Keyword **kernel** can be omitted. If no probe target is 56 capability set. The features available in !! 50 specified, probing the kernel is the default behaviour. 57 small subset of the parameters supported b !! 51 58 MUST use the **unprivileged** keyword: Thi !! 52 When the **unprivileged** keyword is used, bpftool will dump 59 bpftool is inadvertently run as non-root, !! 53 only the features available to a user who does not have the 60 unavailable if bpftool was compiled withou !! 54 **CAP_SYS_ADMIN** capability set. The features available in 61 !! 55 that case usually represent a small subset of the parameters 62 bpftool feature probe dev *NAME* [full] [macro !! 56 supported by the system. Unprivileged users MUST use the 63 Probe network device for supported eBPF fe !! 57 **unprivileged** keyword: This is to avoid misdetection if 64 console. !! 58 bpftool is inadvertently run as non-root, for example. This 65 !! 59 keyword is unavailable if bpftool was compiled without 66 The keywords **full**, **macros** and **pr !! 60 libcap. 67 probing the kernel. !! 61 68 !! 62 **bpftool feature probe dev** *NAME* [**full**] [**macros** [**prefix** *PREFIX*]] 69 bpftool feature list_builtins *GROUP* !! 63 Probe network device for supported eBPF features and dump 70 List items known to bpftool. These can be !! 64 results to the console. 71 (**prog_types**), BPF map types (**map_typ !! 65 72 (**attach_types**), link types (**link_typ !! 66 The keywords **full**, **macros** and **prefix** have the 73 (**helpers**). The command does not probe !! 67 same role as when probing the kernel. 74 elements that bpftool knows from compilati << 75 (for all object types) or from the BPF UAP << 76 can be used in scripts to iterate over BPF << 77 68 78 bpftool feature help !! 69 **bpftool feature help** 79 Print short help message. !! 70 Print short help message. 80 71 81 OPTIONS 72 OPTIONS 82 ======= 73 ======= 83 .. include:: common_options.rst !! 74 .. include:: common_options.rst
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.