I don't see most use as a "protection"; rather it just makes throwing away & replacing a compromised environment easy.
Last I checked you could disable all that crap entirely at configure time, though.
-
-
Not as much can be disabled as you'd expect. It's not even possible to disable PERF_EVENTS on x86_64.
-
AFAIK, eBPF is essentially mandatory. JIT compiler is disabled by default with sysctl toggle though.
-
NET selects BPF, but BPF_JIT is optional, not even present on all archs, and BPF_SYSCALL is optional
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.