BPFTOOL-FEATURE(8) | System Manager's Manual | BPFTOOL-FEATURE(8) |
bpftool-feature - tool for inspection of eBPF-related parameters for Linux kernel or net device
bpftool [OPTIONS] feature COMMAND
OPTIONS := { { -j | --json } [{ -p | --pretty }] | { -d | --debug } }
COMMANDS := { probe | help }
bpftool feature probe [COMPONENT] [full] [unprivileged] [macros [prefix PREFIX]] bpftool feature list_builtins GROUP bpftool feature help COMPONENT := { kernel | dev NAME } GROUP := { prog_types | map_types | attach_types | link_types | helpers }
By default, bpftool does not run probes for bpf_probe_write_user() and bpf_trace_printk() helpers which print warnings to kernel logs. To enable them and run all probes, the full keyword should be used.
If the macros keyword (but not the -j option) is passed, a subset of the output is dumped as a list of #define macros that are ready to be included in a C header file, for example. If, additionally, prefix is used to define a PREFIX, the provided string will be used as a prefix to the names of the macros: this can be used to avoid conflicts on macro names when including the output of this command as a header file.
Keyword kernel can be omitted. If no probe target is specified, probing the kernel is the default behaviour.
When the unprivileged keyword is used, bpftool will dump only the features available to a user who does not have the CAP_SYS_ADMIN capability set. The features available in that case usually represent a small subset of the parameters supported by the system. Unprivileged users MUST use the unprivileged keyword: This is to avoid misdetection if bpftool is inadvertently run as non-root, for example. This keyword is unavailable if bpftool was compiled without libcap.
The keywords full, macros and prefix have the same role as when probing the kernel.
bpf(2), bpf-helpers(7), bpftool(8), bpftool-btf(8), bpftool-cgroup(8), bpftool-gen(8), bpftool-iter(8), bpftool-link(8), bpftool-map(8), bpftool-net(8), bpftool-perf(8), bpftool-prog(8), bpftool-struct_ops(8)