The patch titled Subject: proc-provide-details-on-indirect-branch-speculation-v2 has been removed from the -mm tree. Its filename was proc-provide-details-on-indirect-branch-speculation-v2.patch This patch was dropped because it was folded into proc-provide-details-on-indirect-branch-speculation.patch ------------------------------------------------------ From: Anand K Mistry <amistry@xxxxxxxxxx> Subject: proc-provide-details-on-indirect-branch-speculation-v2 remove underscores from field name to workaround documentation issue Link: https://lkml.kernel.org/r/20201106131015.v2.1.I7782b0cedb705384a634cfd8898eb7523562da99@changeid Signed-off-by: Anand K Mistry <amistry@xxxxxxxxxx> Cc: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- Documentation/filesystems/proc.rst | 4 ++-- fs/proc/array.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) --- a/Documentation/filesystems/proc.rst~proc-provide-details-on-indirect-branch-speculation-v2 +++ a/Documentation/filesystems/proc.rst @@ -210,7 +210,7 @@ read the file /proc/PID/status:: NoNewPrivs: 0 Seccomp: 0 Speculation_Store_Bypass: thread vulnerable - Speculation_Indirect_Branch: conditional enabled + SpeculationIndirectBranch: conditional enabled voluntary_ctxt_switches: 0 nonvoluntary_ctxt_switches: 1 @@ -293,7 +293,7 @@ It's slow but very precise. NoNewPrivs no_new_privs, like prctl(PR_GET_NO_NEW_PRIV, ...) Seccomp seccomp mode, like prctl(PR_GET_SECCOMP, ...) Speculation_Store_Bypass speculative store bypass mitigation status - Speculation_Indirect_Branch indirect branch speculation mode + SpeculationIndirectBranch indirect branch speculation mode Cpus_allowed mask of CPUs on which this process may run Cpus_allowed_list Same as previous, but in "list format" Mems_allowed mask of memory nodes allowed to this process --- a/fs/proc/array.c~proc-provide-details-on-indirect-branch-speculation-v2 +++ a/fs/proc/array.c @@ -369,7 +369,7 @@ static inline void task_seccomp(struct s break; } - seq_puts(m, "\nSpeculation_Indirect_Branch:\t"); + seq_puts(m, "\nSpeculationIndirectBranch:\t"); switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_INDIRECT_BRANCH)) { case -EINVAL: seq_puts(m, "unsupported"); _ Patches currently in -mm which might be from amistry@xxxxxxxxxx are proc-provide-details-on-indirect-branch-speculation.patch