Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3470390imm; Tue, 29 May 2018 07:48:50 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqHXSV/d0zzNRqCO1vWfKsqc9fLXtP5ni7OhZbCjo335WEsPNytT7/u9RGTgl0dyeeys9tw X-Received: by 2002:a17:902:9304:: with SMTP id bc4-v6mr17952147plb.189.1527605330725; Tue, 29 May 2018 07:48:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527605330; cv=none; d=google.com; s=arc-20160816; b=nkmFEKUMuz2v5jcDB6w979uwbixsEr9h7Q89fn3IFRsc9OgbEmoov7o3lmK8DcIOrk sxItMoKScW4OUI8OO8Hh2WIK24k3nqkE4C8T+jYNWj9Bu5bmdDYE+kj95UczPO4ZUA+4 EZeXVvowV/xK/47mpl6yflaqU8WbCpHCTS0NZtQYtRxHlOCbPwhph7MtEtQA0j1VN4DP aQVSjBFHexezZZwp9UBFQgG/0DPH/y2uWEwpHgjLXKgxvyPuu8WP3PzGR2w7vJd0aNgk 8D2Vcnot8XF6BLgzR1zSRUCo/8tg6YTtCQ+qlgC1gvA4tcre8nsAlI4oIw5wraJ31Z10 DgXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=Tqm7DfWCdbC7Auq0befimez0+GB6/+sRt6RHc6pmbgQ=; b=O5PSngw604/vDFU9E1egcKSOgL6PGTW5geys4gHiPkOZK3veWGCLl5VZonYq84BwF7 g87cumV4XfoQo/xYcv8rnnl7TMncmdyIj3sf7YXnO2mF/Qa+X+nCddePUdrgVArmcbiz j1c5TBzuCGCxPpjdTFNo6g4Z+9Qb3DgYHQd2laNnC7+UiGts45J/yStV3VOZwbSubpxe PdjlUxOFLzz7xeCo22WYYCxXUn+Qq4H/RuTBlJgszRHfo6DSHEuz2qE2ctv3cccoOUG+ muwJSZPLcr00KfgBYMFK5ncTD6hzUD8rm+mAUGv7Ot7nWKdN6pI2Kc4SY7QlfJZW6U3q SD6g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e26-v6si31972200pfn.244.2018.05.29.07.48.36; Tue, 29 May 2018 07:48:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936720AbeE2OrN convert rfc822-to-8bit (ORCPT + 99 others); Tue, 29 May 2018 10:47:13 -0400 Received: from mx2.suse.de ([195.135.220.15]:54873 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S936654AbeE2Oqo (ORCPT ); Tue, 29 May 2018 10:46:44 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 84A6CB015; Tue, 29 May 2018 14:46:42 +0000 (UTC) Date: Tue, 29 May 2018 16:46:40 +0200 From: Michal =?UTF-8?B?U3VjaMOhbmVr?= To: Christophe LEROY Cc: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Mauricio Faria de Oliveira , Nicholas Piggin , Michael Neuling , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] powerpc/64s: Enhance the information in cpu_show_spectre_v1() Message-ID: <20180529164640.02faedcd@kitsune.suse.cz> In-Reply-To: <1b720765-faf1-719e-ab76-b3eafa559896@c-s.fr> References: <20180424041559.32410-1-mpe@ellerman.id.au> <20180528131914.32231-1-msuchanek@suse.de> <1b720765-faf1-719e-ab76-b3eafa559896@c-s.fr> Organization: SUSE Linux X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.31; x86_64-suse-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 29 May 2018 16:13:49 +0200 Christophe LEROY wrote: > Le 28/05/2018 à 15:19, Michal Suchanek a écrit : > > We now have barrier_nospec as mitigation so print it in > > cpu_show_spectre_v1 when enabled. > > > > Signed-off-by: Michal Suchanek > > --- > > arch/powerpc/kernel/security.c | 5 ++++- > > 1 file changed, 4 insertions(+), 1 deletion(-) > > > > diff --git a/arch/powerpc/kernel/security.c > > b/arch/powerpc/kernel/security.c index 0239383c7e4d..a0c32d53980b > > 100644 --- a/arch/powerpc/kernel/security.c > > +++ b/arch/powerpc/kernel/security.c > > @@ -120,7 +120,10 @@ ssize_t cpu_show_spectre_v1(struct device > > *dev, struct device_attribute *attr, c if > > (!security_ftr_enabled(SEC_FTR_BNDS_CHK_SPEC_BAR)) return > > sprintf(buf, "Not affected\n"); > > - return sprintf(buf, "Vulnerable\n"); > > + if (barrier_nospec_enabled) > > > + return sprintf(buf, "Mitigation: __user pointer > > sanitization\n"); > > + else > > + return sprintf(buf, "Vulnerable\n"); > > Checkpatch would tell you that an else is unneeded after a return. So > just leave it as it was before. Where did you get your copy of checkpatch? The one in Linux tree does not do that. Thanks Michal