Conversation

Replying to
yes, but when you enable some options, like CONFIG_BPF_SYSCALL, you have CONFIG_BPF_JIT=y automatically, and you can't get rid of it. and unfortunately, the bpf syscall is now a popular one for these new toys.
1
2
Once an attacker has developed a scripting framework for finding Spectre 2 gadgets, then this accomplishes very little. It's not a real barrier but rather at most an inconvenience: a well known and useful set of gadgets isn't available. It's security through obscurity at best.
3
3
Show replies
It was implemented as what I consider to be a misguided security mitigation. Most people are prone to following very subjective advice like this without questioning it. Attacker can simply use the same Spectre 2 vulnerability with different gadgets... CFI actually helps a lot.
1
1
Show replies