-- return sprintf(buf, "%s%s\n", spectre_v2_strings[spectre_v2_enabled],
-- ibpb_inuse ? ", IBPB (Intel v4)" : "");
-+ return sprintf(buf, "%s%s%s\n", spectre_v2_strings[spectre_v2_enabled],
-+ ibpb_inuse ? ", IBPB (Intel v4)" : "",
-+ spectre_v2_bad_module ? " - vulnerable module loaded" : "");
- }
- #endif
+ case X86_BUG_SPECTRE_V2:
+- return sprintf(buf, "%s%s\n", spectre_v2_strings[spectre_v2_enabled], ibpb_inuse ? ", IBPB (Intel v4)" : "");
++ return sprintf(buf, "%s%s%s\n", spectre_v2_strings[spectre_v2_enabled],
++ ibpb_inuse ? ",IBPB (Intel v4)" : "",
++ spectre_v2_bad_module ? " - vulnerable module loaded" : "");
+
+ case X86_BUG_SPEC_STORE_BYPASS:
+ return sprintf(buf, "%s\n", ssb_strings[ssb_mode]);