Conversation

Once an attacker has developed a scripting framework for finding Spectre 2 gadgets, then this accomplishes very little. It's not a real barrier but rather at most an inconvenience: a well known and useful set of gadgets isn't available. It's security through obscurity at best.
3
3
Replying to and
It forces the JIT to always be enabled at compile-time in order to avoid compiling the interpreter into the kernel. You can build the kernel without it. If the kernel is built with it, then there's no option to use the interpreter. It's how most distributions build Linux now.
2
1
It was implemented as what I consider to be a misguided security mitigation. Most people are prone to following very subjective advice like this without questioning it. Attacker can simply use the same Spectre 2 vulnerability with different gadgets... CFI actually helps a lot.
1
1
In the case they're talking about, the attacker couldn't use eBPF. I doubt that it's ever going to be usable by an unprivileged process on AOSP. By the way, a real argument increasingly being used by upstream maintainers in these areas is that securing Linux is a lost cause...
1