Message ID | 20180530113817.14784-5-juergh@canonical.com |
---|---|
State | New |
Headers | show |
Series | Fixups for CVE-2018-3639 (x86) | expand |
diff --git a/fs/proc/array.c b/fs/proc/array.c index 8930b068199d..93c664097cb9 100644 --- a/fs/proc/array.c +++ b/fs/proc/array.c @@ -334,7 +334,7 @@ static inline void task_seccomp(struct seq_file *m, struct task_struct *p) #ifdef CONFIG_SECCOMP seq_printf(m, "Seccomp:\t%d\n", p->seccomp.mode); #endif - seq_printf(m, "\nSpeculation_Store_Bypass:\t"); + seq_printf(m, "Speculation_Store_Bypass:\t"); switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) { case -EINVAL: seq_printf(m, "unknown");
CVE-2018-3639 (x86) Fixes: c2f3edf414c2 ("UBUNTU: SAUCE: proc: Provide details on speculation flaw mitigations") Signed-off-by: Juerg Haefliger <juergh@canonical.com> --- fs/proc/array.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)