Received: by 2002:a05:7412:f584:b0:e2:908c:2ebd with SMTP id eh4csp2000089rdb; Tue, 5 Sep 2023 11:07:20 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFday7fsLhwTpGH26L4ZvugAycVRSWbR/C50vSorIPcry3Eh8T7mxX1VliPYBxqqvxasDEC X-Received: by 2002:a05:6a00:3983:b0:68c:3f2:5ff9 with SMTP id fi3-20020a056a00398300b0068c03f25ff9mr14740584pfb.7.1693937240439; Tue, 05 Sep 2023 11:07:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1693937240; cv=none; d=google.com; s=arc-20160816; b=KqLy/b4OT9MnpZnXEZ5eM3BJlFP4IPV1n6aJHMDd334Pzqr4CT2tLQ60LdXINNVYDb qQRMbGzvrGSYcWacG37jF5ofiRswMhg1CKgUR83HdtZW7Khxg6D3UW01NuSSIua2nK+x 6bUi/jSt3UR+p+oFc5CVOfiLA8p25AYo4zok7meiV0HgVVa2F8O5P1zL4pWc2YobVU+L S1fDzCLBs0N7M8GWb1ZzgpMp6rom5YXLfDLQ9TCK3VzvW0gizpgDHpqpD4zXKEydmcUj ECzrmvaSjd9HTL5hoUgmV2EKoGF2c+X+Nrr6NukZU5CgAWqhBNDtkySQjuiIsm7uSn0U R2lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Uc1r5GqhkXwE2jK7w9RHBBIJwvn6Qsqsca2hi7kX/Fo=; fh=ZwaEcDYNCnlh+U7YxZ1LCEcet9pcdhSkEX0cCEOksvY=; b=lw2Db+FMks5w6HyMbTKLqF2Hc+3dY44KiUeiZu4Ef+gQm0v0GbBCmW0uDWlUuMCcoV UMcTqjlP+F52nryA2e5O00cQYldd/Iv2e+JYh0SoZv29G4+w++SGee+xsmssLctlSG9F 2wob2DUWoUfvKIZlSiodQRfDHZ2i1w2NDXC6rMR90jyzgoPHfBZP4vgEhJhOUWOz8Sne W4VoA8HkM9Eu2Pjebg4g7IWSXNdWL3m6MC74AoF7Lbmh6yeK9bjGKHJ7S8k7Co8yAUnG HdypnT3QUfF+Qb4ruQ0eOEY/lXaJWARLx04FisoJmeN9M5thR06ekicYeVoXmtO+msFq V4dA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bDIKjPIf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t185-20020a6381c2000000b0056a750ed79csi9738531pgd.87.2023.09.05.11.07.07; Tue, 05 Sep 2023 11:07:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bDIKjPIf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240507AbjIEQxu (ORCPT + 99 others); Tue, 5 Sep 2023 12:53:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36994 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351018AbjIEFFU (ORCPT ); Tue, 5 Sep 2023 01:05:20 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 49B4B18C for ; Mon, 4 Sep 2023 22:05:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E23A3B810AF for ; Tue, 5 Sep 2023 05:05:16 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 29106C433C9; Tue, 5 Sep 2023 05:05:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1693890315; bh=ze2yNnGkWnKe6M0KCNjylk/VDkj/AaoQbnmCXJNlCHA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bDIKjPIfx4+OooTzPqnXC8DkO/lDgFSu62PUu7ZIaPs+AB3gh21PXKd9Wdi01AU2Y iSfvaSf8/k7NZaqeZ4ImOflmDkBo+6X3+yHuNTgNOCj6yh9EQYjehemTyv0cGdh4vK yo7jwdCs+8ZaOmoAV84M7693SbyG7SmCxz/sn4vzbw3HIRvRGa5EPdDjO2Of5wUNh1 i3bYKLuT4LF85yJCamueGyEfGDr+rbC95N3MO+4caN01DCeJ7VW81/v+AtOCZ0qEVF 5ZnsdMVDJy6rqvYkj6mVseDvbTZ0w/TEXZQv0KKI2RIbG5AEITguhQ8FUPAtswfpPz gh6h80V+mffEQ== From: Josh Poimboeuf To: x86@kernel.org Cc: linux-kernel@vger.kernel.org, Borislav Petkov , Peter Zijlstra , Babu Moger , Paolo Bonzini , Sean Christopherson , David.Kaplan@amd.com, Andrew Cooper , Nikolay Borisov , gregkh@linuxfoundation.org, Thomas Gleixner Subject: [PATCH v3 14/20] x86/bugs: Remove default case for fully switched enums Date: Mon, 4 Sep 2023 22:04:58 -0700 Message-ID: X-Mailer: git-send-email 2.41.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For enum switch statements which handle all possible cases, remove the default case so a compiler warning gets printed if one of the enums gets accidentally omitted from the switch statement. Signed-off-by: Josh Poimboeuf --- arch/x86/kernel/cpu/bugs.c | 17 +++++++---------- 1 file changed, 7 insertions(+), 10 deletions(-) diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index 4f1ad2350f49..941ac94ad0d4 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -1019,7 +1019,6 @@ static void __init retbleed_select_mitigation(void) do_cmd_auto: case RETBLEED_CMD_AUTO: - default: if (boot_cpu_data.x86_vendor == X86_VENDOR_AMD || boot_cpu_data.x86_vendor == X86_VENDOR_HYGON) { if (IS_ENABLED(CONFIG_CPU_UNRET_ENTRY)) @@ -1290,6 +1289,8 @@ spectre_v2_user_select_mitigation(void) spectre_v2_user_ibpb = mode; switch (cmd) { + case SPECTRE_V2_USER_CMD_NONE: + break; case SPECTRE_V2_USER_CMD_FORCE: case SPECTRE_V2_USER_CMD_PRCTL_IBPB: case SPECTRE_V2_USER_CMD_SECCOMP_IBPB: @@ -1301,8 +1302,6 @@ spectre_v2_user_select_mitigation(void) case SPECTRE_V2_USER_CMD_SECCOMP: static_branch_enable(&switch_mm_cond_ibpb); break; - default: - break; } pr_info("mitigation: Enabling %s Indirect Branch Prediction Barrier\n", @@ -2160,6 +2159,10 @@ static int l1d_flush_prctl_get(struct task_struct *task) static int ssb_prctl_get(struct task_struct *task) { switch (ssb_mode) { + case SPEC_STORE_BYPASS_NONE: + if (boot_cpu_has_bug(X86_BUG_SPEC_STORE_BYPASS)) + return PR_SPEC_ENABLE; + return PR_SPEC_NOT_AFFECTED; case SPEC_STORE_BYPASS_DISABLE: return PR_SPEC_DISABLE; case SPEC_STORE_BYPASS_SECCOMP: @@ -2171,11 +2174,8 @@ static int ssb_prctl_get(struct task_struct *task) if (task_spec_ssb_disable(task)) return PR_SPEC_PRCTL | PR_SPEC_DISABLE; return PR_SPEC_PRCTL | PR_SPEC_ENABLE; - default: - if (boot_cpu_has_bug(X86_BUG_SPEC_STORE_BYPASS)) - return PR_SPEC_ENABLE; - return PR_SPEC_NOT_AFFECTED; } + BUG(); } static int ib_prctl_get(struct task_struct *task) @@ -2504,9 +2504,6 @@ static void __init srso_select_mitigation(void) pr_err("WARNING: kernel not compiled with CPU_SRSO.\n"); } break; - - default: - break; } out: -- 2.41.0