Received: by 2002:a05:7412:1703:b0:e2:908c:2ebd with SMTP id dm3csp814500rdb; Fri, 25 Aug 2023 01:41:30 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGRiU0CVEvIg9DxLQ3G4eeQ9qN5o+z27xyN84TqhhDm9xUio3Unzy5HyAyJy2PYDPx2PwOO X-Received: by 2002:a17:907:2be8:b0:9a1:b33a:e464 with SMTP id gv40-20020a1709072be800b009a1b33ae464mr12587568ejc.31.1692952889806; Fri, 25 Aug 2023 01:41:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692952889; cv=none; d=google.com; s=arc-20160816; b=zt++jiRfDktolZecSi8mazRocZfeQbjC7e9QSUcbuJurgUbTghDqp5NZB5exUt72SF IB5NdLC5LM5M3rnGxaf5mY8tlKDMmYTD0BzkG7/0Ycqw7noyWZkPjFxPMkGGIdcqhI2T XE5PdWIu7YaeHM5RV35JAUeCGLZlvF5PhjEpr0zv3vOpIhm2apcbfuslq7X4065VbohC 4kwwK6XJclx3lLW9C15ndMQsAK1POfkRZyVlx0SbAyiKA6dx4XORY6NdadncyPsOoxDI Ys9v9jzsWsdgph6gf12RtuPixQ4xL+6fKgGKdyD7f6mQU1BMVQOY3YD+YfH8gVmICMb6 zHvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=u5GSjqnPQboF6YxHBoI0qO9iNMqIZjrSaJYiN+4EDe8=; fh=ZwaEcDYNCnlh+U7YxZ1LCEcet9pcdhSkEX0cCEOksvY=; b=ZhdZbXG5tULs4tr4iEucWF1LoPA712PZ/+MxqnHrIjukehdCbWmp2YINuLBqdev4YE Xqnyoiopot0F/S1+f/qtkBRAgr5SIdzWJPTysiuiwfDVPvcAlKPFJRy066DE0J1Tqh4b CNi2IAamGwBnwnimwxZlBaQHMpvVpr2IrhjYppyBL+IVSsp3mejmkX5Ji3fSC8z8dlpU TNAhjVhYnFEmWHvDNADkvtMLM4CnvGeieOB/ie/7zzaCY+evEPW4E8kZq2KhXCJhZpf8 +W6hBmWsoF4EAMDPpjW0g7GYY5TVeO5yhvEbZDupPmGwmYGCbFOjiwZ+IQ3xk1bTJ1HD ixXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="SE/kOo6U"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id rl28-20020a170907217c00b0099cba8b8da8si740348ejb.188.2023.08.25.01.41.00; Fri, 25 Aug 2023 01:41:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="SE/kOo6U"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243115AbjHYHC7 (ORCPT + 99 others); Fri, 25 Aug 2023 03:02:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44602 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242703AbjHYHCO (ORCPT ); Fri, 25 Aug 2023 03:02:14 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 36CF6199E for ; Fri, 25 Aug 2023 00:02:12 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id CAC2766658 for ; Fri, 25 Aug 2023 07:02:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3806CC433C8; Fri, 25 Aug 2023 07:02:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692946931; bh=kJykmCoWXI54yCCaN5dwGUU6DK709wuUPkwcXktuY+A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SE/kOo6UrWZAZYPcclb5hqXnUB18+d8DeW5YfhArEp11HnibLUOHnrxuAvrmgXID9 vhz+hKfJ77/3Fx7JzCODvEQNE2nFBt/AQfh3qD5Nwrw7It4onwQDF075M4/WlRgiNf 4qgscFaIciIKCtA8qnfeIANLh9Hvv9UrpG9NyYYzesUvyN1PB320nAwX0rHDjjoUd1 FoavasVtbAz16indtXKViVONSSqgmElVxbBN1b707s17s0a+G+baedmVsHqXWJbAJA vmqqlgOjA58hK+SR8f92gQdghSexeGoHMQaVuaKlLFItRiERY4SNV9eEKGuoDVJ+e3 1PqyOW56X/Bzg== From: Josh Poimboeuf To: x86@kernel.org Cc: linux-kernel@vger.kernel.org, Borislav Petkov , Peter Zijlstra , Babu Moger , Paolo Bonzini , Sean Christopherson , David.Kaplan@amd.com, Andrew Cooper , Nikolay Borisov , gregkh@linuxfoundation.org, Thomas Gleixner Subject: [PATCH 16/23] x86/bugs: Remove default case for fully switched enums Date: Fri, 25 Aug 2023 00:01:47 -0700 Message-ID: <858e6f4ef71cd531e64db2903d8ac4763bec0af4.1692919072.git.jpoimboe@kernel.org> X-Mailer: git-send-email 2.41.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For enum switch statements which handle all possible cases, remove the default case so a compiler warning gets printed if one of the enums gets accidentally omitted from the switch statement. Signed-off-by: Josh Poimboeuf --- arch/x86/kernel/cpu/bugs.c | 17 +++++++---------- 1 file changed, 7 insertions(+), 10 deletions(-) diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index 3c7f634b6148..06216159d7fc 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -1019,7 +1019,6 @@ static void __init retbleed_select_mitigation(void) do_cmd_auto: case RETBLEED_CMD_AUTO: - default: if (boot_cpu_data.x86_vendor == X86_VENDOR_AMD || boot_cpu_data.x86_vendor == X86_VENDOR_HYGON) { if (IS_ENABLED(CONFIG_CPU_UNRET_ENTRY)) @@ -1290,6 +1289,8 @@ spectre_v2_user_select_mitigation(void) spectre_v2_user_ibpb = mode; switch (cmd) { + case SPECTRE_V2_USER_CMD_NONE: + break; case SPECTRE_V2_USER_CMD_FORCE: case SPECTRE_V2_USER_CMD_PRCTL_IBPB: case SPECTRE_V2_USER_CMD_SECCOMP_IBPB: @@ -1301,8 +1302,6 @@ spectre_v2_user_select_mitigation(void) case SPECTRE_V2_USER_CMD_SECCOMP: static_branch_enable(&switch_mm_cond_ibpb); break; - default: - break; } pr_info("mitigation: Enabling %s Indirect Branch Prediction Barrier\n", @@ -2160,6 +2159,10 @@ static int l1d_flush_prctl_get(struct task_struct *task) static int ssb_prctl_get(struct task_struct *task) { switch (ssb_mode) { + case SPEC_STORE_BYPASS_NONE: + if (boot_cpu_has_bug(X86_BUG_SPEC_STORE_BYPASS)) + return PR_SPEC_ENABLE; + return PR_SPEC_NOT_AFFECTED; case SPEC_STORE_BYPASS_DISABLE: return PR_SPEC_DISABLE; case SPEC_STORE_BYPASS_SECCOMP: @@ -2171,11 +2174,8 @@ static int ssb_prctl_get(struct task_struct *task) if (task_spec_ssb_disable(task)) return PR_SPEC_PRCTL | PR_SPEC_DISABLE; return PR_SPEC_PRCTL | PR_SPEC_ENABLE; - default: - if (boot_cpu_has_bug(X86_BUG_SPEC_STORE_BYPASS)) - return PR_SPEC_ENABLE; - return PR_SPEC_NOT_AFFECTED; } + BUG(); } static int ib_prctl_get(struct task_struct *task) @@ -2504,9 +2504,6 @@ static void __init srso_select_mitigation(void) pr_err("WARNING: kernel not compiled with CPU_SRSO.\n"); } break; - - default: - break; } out: -- 2.41.0