@@ -38,14 +38,15 @@ func TestFS_CPUVulnerabilities(t *testing.T) {
38
38
want * Vulnerability
39
39
wantErr bool
40
40
}{
41
- {"Not affected" , "itlb_multihit" , & Vulnerability {CodeName : "itlb_multihit" , State : VulnerabilityStateNotAffected , Mitigation : "" }, false },
42
- {"Not affected with underscores" , "tsx_async_abort" , & Vulnerability {CodeName : "tsx_async_abort" , State : VulnerabilityStateNotAffected , Mitigation : "" }, false },
41
+ {"Not affected" , "tsx_async_abort" , & Vulnerability {CodeName : "tsx_async_abort" , State : VulnerabilityStateNotAffected , Mitigation : "" }, false },
43
42
{"Mitigation simple string" , "spec_store_bypass" , & Vulnerability {CodeName : "spec_store_bypass" , State : VulnerabilityStateMitigation , Mitigation : "Speculative Store Bypass disabled via prctl" }, false },
44
43
{"Mitigation special chars" , "retbleed" , & Vulnerability {CodeName : "retbleed" , State : VulnerabilityStateMitigation , Mitigation : "untrained return thunk; SMT enabled with STIBP protection" }, false },
45
44
{"Mitigation more special chars" , "spectre_v1" , & Vulnerability {CodeName : "spectre_v1" , State : VulnerabilityStateMitigation , Mitigation : "usercopy/swapgs barriers and __user pointer sanitization" }, false },
46
45
{"Mitigation with multiple subsections" , "spectre_v2" , & Vulnerability {CodeName : "spectre_v2" , State : VulnerabilityStateMitigation , Mitigation : "Retpolines, IBPB: conditional, STIBP: always-on, RSB filling, PBRSB-eIBRS: Not affected" }, false },
47
46
{"Vulnerable" , "mds" , & Vulnerability {CodeName : "mds" , State : VulnerabilityStateVulnerable , Mitigation : "" }, false },
48
47
{"Vulnerable with mitigation available" , "mmio_stale_data" , & Vulnerability {CodeName : "mmio_stale_data" , State : VulnerabilityStateVulnerable , Mitigation : "Clear CPU buffers attempted, no microcode" }, false },
48
+ {"Unknown" , "srbds" , & Vulnerability {CodeName : "srbds" , State : VulnerabilityStateUnknown , Mitigation : "Dependent on hypervisor status" }, false },
49
+ {"Unknown with unparseable mitigation" , "itlb_multihit" , & Vulnerability {CodeName : "itlb_multihit" , State : VulnerabilityStateUnknown , Mitigation : "KVM: Mitigation: VMX unsupported" }, false },
49
50
}
50
51
for _ , tt := range tests {
51
52
t .Run (tt .name , func (t * testing.T ) {
0 commit comments