x86/bugs: Add retbleed=force
authorPeter Zijlstra (Intel) <peterz@infradead.org>
Mon, 17 Oct 2022 14:41:20 +0000 (16:41 +0200)
committerPeter Zijlstra <peterz@infradead.org>
Mon, 17 Oct 2022 14:41:20 +0000 (16:41 +0200)
Debug aid, allows running retbleed=force,stuff on non-affected uarchs

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
arch/x86/kernel/cpu/bugs.c

index e6c23ead161702b961b78c371ba623d6da2ed819..b307b83e22befa4017b1479f9f24748452e1d204 100644 (file)
@@ -838,6 +838,8 @@ static int __init retbleed_parse_cmdline(char *str)
                        retbleed_cmd = RETBLEED_CMD_STUFF;
                } else if (!strcmp(str, "nosmt")) {
                        retbleed_nosmt = true;
+               } else if (!strcmp(str, "force")) {
+                       setup_force_cpu_bug(X86_BUG_RETBLEED);
                } else {
                        pr_err("Ignoring unknown retbleed option (%s).", str);
                }