* Dan Williams <dan.j.williams@xxxxxxxxx> wrote: > Reflect the presence of 'get_user', '__get_user', and 'syscall' > protections in sysfs. Keep the "Vulnerable" distinction given the > expectation that the places that have been identified for 'array_idx' > usage are likely incomplete. (The style problems/inconsistencies of the previous patches are repeated here too, please fix.) > > Cc: Thomas Gleixner <tglx@xxxxxxxxxxxxx> > Cc: Ingo Molnar <mingo@xxxxxxxxxx> > Cc: "H. Peter Anvin" <hpa@xxxxxxxxx> > Cc: x86@xxxxxxxxxx > Cc: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> > Reported-by: Jiri Slaby <jslaby@xxxxxxx> > Signed-off-by: Dan Williams <dan.j.williams@xxxxxxxxx> > --- > arch/x86/kernel/cpu/bugs.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c > index 390b3dc3d438..01d5ba48f745 100644 > --- a/arch/x86/kernel/cpu/bugs.c > +++ b/arch/x86/kernel/cpu/bugs.c > @@ -269,7 +269,7 @@ ssize_t cpu_show_spectre_v1(struct device *dev, > { > if (!boot_cpu_has_bug(X86_BUG_SPECTRE_V1)) > return sprintf(buf, "Not affected\n"); > - return sprintf(buf, "Vulnerable\n"); > + return sprintf(buf, "Vulnerable: Minimal user pointer sanitization\n"); Btw., I think this string is still somewhat passive-aggressive towards users, as it doesn't really give them any idea about what is missing from their system so that they can turn it into not vulnerable. What else is missing that would turn this into a "Mitigated" entry? Thanks, Ingo