{"id":35311,"date":"2020-06-02T12:19:20","date_gmt":"2020-06-02T12:19:20","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/"},"modified":"2020-06-02T12:19:20","modified_gmt":"2020-06-02T12:19:20","slug":"beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/","title":{"rendered":"&#8216;Beyond stupid&#8217;: Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/07\/09\/shutterstock_angry_teacher_sad_student.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Linus Torvalds has removed a patch in the next release of the Linux kernel intended to provide additional opt-in mitigation of attacks against the L1 data (L1D) CPU cache.<\/p>\n<p>The <a target=\"_blank\" href=\"https:\/\/lkml.kernel.org\/lkml\/87mu7akwdx.fsf@nanos.tec.linutronix.de\/T\/\" rel=\"noopener noreferrer\">patch<\/a> from AWS engineer Balbir Singh was to provide &#8220;an opt-in (prctl driven) mechanism to flush the L1D cache on context switch. The goal is to allow tasks that are paranoid due to the recent snoop assisted data sampling vulnerabilities, to flush their L1D on being switched out. This protects their data from being snooped or leaked via side channels after the task has context switched out.&#8221;<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/software.intel.com\/security-software-guidance\/software-guidance\/snoop-assisted-l1-data-sampling\" rel=\"noopener noreferrer\">Snoop-assisted L1 Data Sampling<\/a> is one of a family of vulnerabilities where malware may be able to infer data via inspecting the cache. &#8220;Snoop-assisted L1D sampling requires the snoop to hit a modified cache line in the exact same single core clock cycle window as the faulting\/assisting\/aborting load,&#8221; explains Intel.<\/p>\n<p>Clearing the cache whenever the active thread or process switches out attempts to mitigate this and other potential threats, but harms performance.<\/p>\n<p>The patch was added to the code for the 5.8 kernel, which will be the next release, but <a target=\"_blank\" href=\"https:\/\/lore.kernel.org\/lkml\/CAHk-=wgXf_wQ9zrJKv2Hy4EpEbLuqty-Cjbs2u00gm7XcYHBfw@mail.gmail.com\/\" rel=\"noopener noreferrer\">removed<\/a> after review by Torvalds. &#8220;It looks to me like this basically exports cache flushing instructions to user space, and gives processes a way to just say &#8216;slow down anybody else I schedule with too&#8217;,&#8221; he said. &#8220;In other words, from what I can tell, this takes the crazy &#8216;Intel ships buggy CPU&#8217;s and it causes problems for virtualization&#8217; code (which I didn&#8217;t much care about), and turns it into &#8216;anybody can opt in to this disease, and now it affects even people and CPUs that don&#8217;t need it and configurations where it&#8217;s completely pointless&#8217;.<\/p>\n<p>&#8220;I don&#8217;t want some application to go &#8216;Oh, I&#8217;m _soo_ special and pretty and such a delicate flower, that I want to flush the L1D on every task switch, regardless of what CPU I am on, and regardless of whether there are errata or not&#8217; \u2026 I do not want the kernel to do things that seem to be &#8220;beyond stupid&#8221;.<\/p>\n<p>There are plenty of nuances here. One of Torvald&#8217;s points is that if SMT (simultaneous multi-threading or &#8220;hyper threading&#8221;) is enabled then flushing the cache &#8220;is crazy, since an attacker would just sit on a sibling core and attack the L1 contents *before* the task switch happens,&#8221; he said. In this scenario, &#8220;it&#8217;s just an incredibly stupid waste of time and effort to do that, and I can see some poor hapless ssh developer saying &#8216;yes, I should enable this thing because ssh is very special&#8217;, and then ssh just starts wasting time on something that doesn&#8217;t actually help.&#8221; He added that the code is hard to follow, saying &#8220;some of the code scares me.&#8221;<\/p>\n<p>Another question is whether it makes sense to do this mitigation at a low level when it may not matter, because all the processes belong to the same user. &#8220;Context switch in itself isn&#8217;t really relevant as a security domain transfer, but it *is* relevant in the sense that switching from one user to another is a sign of &#8216;uhhuh, now maybe I should be careful when returning to user mode&#8217;,&#8221; said Torvalds.<\/p>\n<p>Singh replied: &#8220;I am not so sure. A user can host multiple tasks and if one of them was compromised, it would be bad to let it allow the leak to happen. For example if the plugin in a browser could leak a security key of a secure session, that would be bad.&#8221;<\/p>\n<p>The discussion reveals the frustration among the kernel maintainers over the difficulty of keeping Linux secure in the face of CPU bugs, and the fact that these cache-related attacks have so many variations. Referencing a past software fallback for clearing the data buffers to address am MDS (Microarchitectural Data Sampling) bug, Torvalds said: &#8220;That one turned out to be not only incredibly expensive, but it didn&#8217;t work reliably anyway, and was really only written for one microarchitecture.&#8221;<\/p>\n<p>Amazon as a public cloud provider is particularly sensitive to these data-stealing vulnerabilities because of the implications if one customer were able to spy on the data belonging to another, or data on a virtual machine host. Another AWS engineer, Benjamin Herrenschmidt, entered the <a target=\"_blank\" href=\"https:\/\/lore.kernel.org\/lkml\/b159ba4c53fcf04cc4eb747c45e1d4d2d83310a3.camel@kernel.crashing.org\/\" rel=\"noopener noreferrer\">discussion<\/a> to explain: &#8220;These patches aren&#8217;t trying to solve problems happening inside of a customer VM running SMT nor are they about protecting VMs against other VMs on the same system.&#8221; AWS has a vast range of services all of which need to be secure.<\/p>\n<p>Torvalds said that he is &#8220;more than happy to be educated on why I&#8217;m wrong&#8221; but that &#8220;for now I&#8217;m unpulling it for lack of data.&#8221; If AWS can convince him of the value of the patch, it may return. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.com\/tl\/1940\/-8722\/ransomware-has-gone-nuclear?td=wptl1940\">Ransomware has gone nuclear<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/06\/02\/linus_torvalds_unpulls_kernel_58\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AWS engineers given a dressing-down after proposing fix for &#8216;paranoid&#8217; tasks Linus Torvalds has removed a patch in the next release of the Linux kernel intended to provide additional opt-in mitigation of attacks against the L1 data (L1D) CPU cache.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35312,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-35311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&#039;Beyond stupid&#039;: Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&#039;Beyond stupid&#039;: Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-02T12:19:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"&#8216;Beyond stupid&#8217;: Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation\",\"datePublished\":\"2020-06-02T12:19:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/\"},\"wordCount\":831,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/\",\"name\":\"'Beyond stupid': Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg\",\"datePublished\":\"2020-06-02T12:19:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8216;Beyond stupid&#8217;: Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"'Beyond stupid': Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/","og_locale":"en_US","og_type":"article","og_title":"'Beyond stupid': Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-02T12:19:20+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"&#8216;Beyond stupid&#8217;: Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation","datePublished":"2020-06-02T12:19:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/"},"wordCount":831,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/","url":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/","name":"'Beyond stupid': Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg","datePublished":"2020-06-02T12:19:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/beyond-stupid-linus-torvalds-trashes-5-8-linux-kernel-patch-over-opt-in-intel-cpu-bug-mitigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"&#8216;Beyond stupid&#8217;: Linus Torvalds trashes 5.8 Linux kernel patch over opt-in Intel CPU bug mitigation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35311"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35312"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}