Conversation

this is why eBPF is restricted to root in alpine. all distributions should do that.
Quote Tweet
[CVE-2021-29154] Linux kernel incorrect computation of branch displacements in BPF JIT compiler can be abused to execute arbitrary code in Kernel mode openwall.com/lists/oss-secu
5
24
Replying to
yes, but when you enable some options, like CONFIG_BPF_SYSCALL, you have CONFIG_BPF_JIT=y automatically, and you can't get rid of it. and unfortunately, the bpf syscall is now a popular one for these new toys.
1
2
Once an attacker has developed a scripting framework for finding Spectre 2 gadgets, then this accomplishes very little. It's not a real barrier but rather at most an inconvenience: a well known and useful set of gadgets isn't available. It's security through obscurity at best.
3
3
We don't have dynamically loaded kernel module support enabled in GrapheneOS primarily to improve Control Flow Integrity (CFI). BPF_JIT depends on having that enabled, so we don't even have the option. Also, CFI essentially acts as Spectre 2 mitigation. CPU won't predict failure.
1
3