Get the latest tech news

New Linux Patch Lets You Force CPU Bugs/Mitigations Even When Not Vulnerable


While most users frown upon the increasing number of CPU security mitigations in part due to the additional overhead commonly introduced, a new Linux kernel patch by a Google engineer would allow users/developers to opt-in to forcing CPU bugs and their mitigations even if the system in use isn't known to be vulnerable.

Google engineer Brendan Jackman posted the patch today for introducing the Linux "force_cpu_bug=" command-line boot parameter for being able to force additional CPU security mitigations even if the processor indicates it's not vulnerable to a given bug like Spectre, Meltdown, Retbleed, and others. This force_cpu_bug could also be useful in the future if it's found that some existing processors aren't actually immune to a given vulnerability and rather than waiting on a kernel patch or BIOS/microcode update in production, this would allow quickly and easily forcing a given mitigation. Now for this patch to go through the typical Linux kernel review process while other upstream stakeholders determine if it works well enough and practical for mainlining.

Get the Android app

Or read this on Phoronix

Read more on:

Photo of New Linux

New Linux

Photo of mitigations

mitigations

Photo of new linux patch

new linux patch

Related news:

News photo

Intel Core Ultra 7 256V Lunar Lake With ASUS Zenbook Performing Better After New Linux Patch

News photo

AMD Zen 5 Not Affected By Inception/SRSO, mitigations=off Yields No Benefit On Ryzen 9000 Series

News photo

New Linux Patches Enable The Snapdragon X1 Elite Powered Lenovo ThinkPad T14s Gen 6