The patch titled Subject: proc-provide-details-on-indirect-branch-speculation-v2 has been added to the -mm tree. Its filename is proc-provide-details-on-indirect-branch-speculation-v2.patch This patch should soon appear at https://ozlabs.org/~akpm/mmots/broken-out/proc-provide-details-on-indirect-branch-speculation-v2.patch and later at https://ozlabs.org/~akpm/mmotm/broken-out/proc-provide-details-on-indirect-branch-speculation-v2.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next and is updated there every 3-4 working days ------------------------------------------------------ From: Anand K Mistry <amistry@xxxxxxxxxx> Subject: proc-provide-details-on-indirect-branch-speculation-v2 remove underscores from field name to workaround documentation issue Link: https://lkml.kernel.org/r/20201106131015.v2.1.I7782b0cedb705384a634cfd8898eb7523562da99@changeid Signed-off-by: Anand K Mistry <amistry@xxxxxxxxxx> Cc: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- Documentation/filesystems/proc.rst | 4 ++-- fs/proc/array.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) --- a/Documentation/filesystems/proc.rst~proc-provide-details-on-indirect-branch-speculation-v2 +++ a/Documentation/filesystems/proc.rst @@ -210,7 +210,7 @@ read the file /proc/PID/status:: NoNewPrivs: 0 Seccomp: 0 Speculation_Store_Bypass: thread vulnerable - Speculation_Indirect_Branch: conditional enabled + SpeculationIndirectBranch: conditional enabled voluntary_ctxt_switches: 0 nonvoluntary_ctxt_switches: 1 @@ -293,7 +293,7 @@ It's slow but very precise. NoNewPrivs no_new_privs, like prctl(PR_GET_NO_NEW_PRIV, ...) Seccomp seccomp mode, like prctl(PR_GET_SECCOMP, ...) Speculation_Store_Bypass speculative store bypass mitigation status - Speculation_Indirect_Branch indirect branch speculation mode + SpeculationIndirectBranch indirect branch speculation mode Cpus_allowed mask of CPUs on which this process may run Cpus_allowed_list Same as previous, but in "list format" Mems_allowed mask of memory nodes allowed to this process --- a/fs/proc/array.c~proc-provide-details-on-indirect-branch-speculation-v2 +++ a/fs/proc/array.c @@ -369,7 +369,7 @@ static inline void task_seccomp(struct s break; } - seq_puts(m, "\nSpeculation_Indirect_Branch:\t"); + seq_puts(m, "\nSpeculationIndirectBranch:\t"); switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_INDIRECT_BRANCH)) { case -EINVAL: seq_puts(m, "unsupported"); _ Patches currently in -mm which might be from amistry@xxxxxxxxxx are proc-provide-details-on-indirect-branch-speculation.patch proc-provide-details-on-indirect-branch-speculation-v2.patch