Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1189218ybn; Wed, 2 Oct 2019 12:10:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqwOBqECIR+irYTRs/oGj3KI5tA/x8jEOvuVegAF2PJ91IGCwblP0zKorlHfoIdmfX4RlYC5 X-Received: by 2002:a17:906:454c:: with SMTP id s12mr4442658ejq.69.1570043429807; Wed, 02 Oct 2019 12:10:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570043429; cv=none; d=google.com; s=arc-20160816; b=UtmsAp9PmFit91t5RCDouzp2uFuD1U1iNP2IXRQOkNV8J0M+LkaOH3PWhe/Yl8wop1 2wK1sKBZ5qbLZTjn4i8cNv4fNXyQHEOOVoQwki0+/mp6QMU5yZPvIPza1u7T8gx6Zd9M u5I4O2JbNhOX7BWZhH+WpkPQsy7FEkIETUIwz0Tw9kzKgDzkbRahw4C56Z3aELr5Q/wi ZYR4ncLHyY8URdoibCzE75xxNMc2Jq03KF29YzueXsWtzqLnWVq0GtvSAolAtqefE6Hz jdRWkAe/aZJiFQ7vCvVz5oNRCSToLuQWIuksMZA2hEsGHsNmUWBxsn2Qj5vxfENG/Y+s KTCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=u/QGPXDOhzGcA2yvO4XihAT+fhp2xfAR5fciizjaqY4=; b=UC1pFLDDeQXfnwy7GDY3I9K5STA2HbW5enlCedNtGvkk5jyr2WAXfzxZPrSt3maQjG TUp9RXAKs7Tb7+dtyIBJyS7Wpp9vP/68zYLuU0EeYrGYXcn/77z16Bf8vZ6SCUoNxsB2 8jTkO8Hdh55GXH+qNydWsY2catZhVqJzofjNQIsbTXMOzD6LzAnLWlyRL/xkCAffn1jO 3NdLRpzf4YI1TmmVYP5PP7Lvm8UqIzeVBuu86sjDpXPYpF5eRy5U6UrCEwSyutdnTjol QsnGu9bCKQGipr2s3jEx5UyULoGm2twcNAtHRIN2EBl1HsT6NrY7ZBLLTLbRn4LC8Lyw yhMA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h17si10562ejt.173.2019.10.02.12.10.05; Wed, 02 Oct 2019 12:10:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729574AbfJBTJK (ORCPT + 99 others); Wed, 2 Oct 2019 15:09:10 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:36114 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729383AbfJBTIW (ORCPT ); Wed, 2 Oct 2019 15:08:22 -0400 Received: from [192.168.4.242] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1iFjyu-000366-ES; Wed, 02 Oct 2019 20:08:12 +0100 Received: from ben by deadeye with local (Exim 4.92.1) (envelope-from ) id 1iFjyq-0003gC-6b; Wed, 02 Oct 2019 20:08:08 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, Denis Kirjanov , "Thomas Gleixner" , "Josh Poimboeuf" , "Jiri Kosina" , "Peter Zijlstra" , "Geert Uytterhoeven" , "Greg Kroah-Hartman" Date: Wed, 02 Oct 2019 20:06:51 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 79/87] cpu/speculation: Warn on unsupported mitigations= parameter In-Reply-To: X-SA-Exim-Connect-IP: 192.168.4.242 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.75-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Geert Uytterhoeven commit 1bf72720281770162c87990697eae1ba2f1d917a upstream. Currently, if the user specifies an unsupported mitigation strategy on the kernel command line, it will be ignored silently. The code will fall back to the default strategy, possibly leaving the system more vulnerable than expected. This may happen due to e.g. a simple typo, or, for a stable kernel release, because not all mitigation strategies have been backported. Inform the user by printing a message. Fixes: 98af8452945c5565 ("cpu/speculation: Add 'mitigations=' cmdline option") Signed-off-by: Geert Uytterhoeven Signed-off-by: Thomas Gleixner Acked-by: Josh Poimboeuf Cc: Peter Zijlstra Cc: Jiri Kosina Cc: Greg Kroah-Hartman Cc: Ben Hutchings Link: https://lkml.kernel.org/r/20190516070935.22546-1-geert@linux-m68k.org [bwh: Backported to 3.16: adjust context] Signed-off-by: Ben Hutchings --- kernel/cpu.c | 3 +++ 1 file changed, 3 insertions(+) --- a/kernel/cpu.c +++ b/kernel/cpu.c @@ -804,6 +804,9 @@ static int __init mitigations_parse_cmdl cpu_mitigations = CPU_MITIGATIONS_OFF; else if (!strcmp(arg, "auto")) cpu_mitigations = CPU_MITIGATIONS_AUTO; + else + pr_crit("Unsupported mitigations=%s, system may still be vulnerable\n", + arg); return 0; }