aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDan Williams <dan.j.williams@intel.com>2018-01-26 17:07:05 -0800
committerDan Williams <dan.j.williams@intel.com>2018-01-26 22:59:57 -0800
commite88c3b614e39cc474936c619ae287c1e05119f78 (patch)
treeb4393121d8515db80855bdec08a065042eeb1314
parent849d2269e080c4fa80f6b5ef680386da5fe19829 (diff)
downloadlinux-nospec-v5.tar.gz
x86/spectre: report get_user mitigation for spectre_v1nospec-v5
Reflect the presence of 'get_user', '__get_user', and 'syscall' protections in sysfs. Keep the "Vulnerable" distinction given the expectation that the places that have been identified for 'array_idx' usage are likely incomplete. Cc: Thomas Gleixner <tglx@linutronix.de> Cc: Ingo Molnar <mingo@redhat.com> Cc: "H. Peter Anvin" <hpa@zytor.com> Cc: x86@kernel.org Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Reported-by: Jiri Slaby <jslaby@suse.cz> Signed-off-by: Dan Williams <dan.j.williams@intel.com>
-rw-r--r--arch/x86/kernel/cpu/bugs.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c
index 390b3dc3d43827..01d5ba48f745d5 100644
--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
@@ -269,7 +269,7 @@ ssize_t cpu_show_spectre_v1(struct device *dev,
{
if (!boot_cpu_has_bug(X86_BUG_SPECTRE_V1))
return sprintf(buf, "Not affected\n");
- return sprintf(buf, "Vulnerable\n");
+ return sprintf(buf, "Vulnerable: Minimal user pointer sanitization\n");
}
ssize_t cpu_show_spectre_v2(struct device *dev,