All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] x86/cpu/bugs: fix spelling mistake: "vunerable"-> "vulnerable"
@ 2018-01-30 19:32 ` Colin King
  0 siblings, 0 replies; 3+ messages in thread
From: Colin King @ 2018-01-30 19:32 UTC (permalink / raw)
  To: Ingo Molnar, H . Peter Anvin, x86, David Woodhouse,
	Borislav Petkov, Greg Kroah-Hartman, Andy Lutomirski, Andi Kleen
  Cc: kernel-janitors, linux-kernel

From: Colin Ian King <colin.king@canonical.com>

Trivial fix to spelling mistake in pr_err error message text.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
---
 arch/x86/kernel/cpu/bugs.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c
index 3bfb2b23d79c..fa1aaf415253 100644
--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
@@ -103,7 +103,7 @@ bool retpoline_module_ok(bool has_retpoline)
 	if (spectre_v2_enabled == SPECTRE_V2_NONE || has_retpoline)
 		return true;
 
-	pr_err("System may be vunerable to spectre v2\n");
+	pr_err("System may be vulnerable to spectre v2\n");
 	spectre_v2_bad_module = true;
 	return false;
 }
-- 
2.15.1

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [PATCH] x86/cpu/bugs: fix spelling mistake: "vunerable"-> "vulnerable"
@ 2018-01-30 19:32 ` Colin King
  0 siblings, 0 replies; 3+ messages in thread
From: Colin King @ 2018-01-30 19:32 UTC (permalink / raw)
  To: Ingo Molnar, H . Peter Anvin, x86, David Woodhouse,
	Borislav Petkov, Greg Kroah-Hartman, Andy Lutomirski, Andi Kleen
  Cc: kernel-janitors, linux-kernel

From: Colin Ian King <colin.king@canonical.com>

Trivial fix to spelling mistake in pr_err error message text.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
---
 arch/x86/kernel/cpu/bugs.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c
index 3bfb2b23d79c..fa1aaf415253 100644
--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
@@ -103,7 +103,7 @@ bool retpoline_module_ok(bool has_retpoline)
 	if (spectre_v2_enabled = SPECTRE_V2_NONE || has_retpoline)
 		return true;
 
-	pr_err("System may be vunerable to spectre v2\n");
+	pr_err("System may be vulnerable to spectre v2\n");
 	spectre_v2_bad_module = true;
 	return false;
 }
-- 
2.15.1


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [tip:x86/pti] x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
  2018-01-30 19:32 ` Colin King
  (?)
@ 2018-01-30 22:38 ` tip-bot for Colin Ian King
  -1 siblings, 0 replies; 3+ messages in thread
From: tip-bot for Colin Ian King @ 2018-01-30 22:38 UTC (permalink / raw)
  To: linux-tip-commits
  Cc: ak, bp, luto, tglx, hpa, dwmw, mingo, colin.king, linux-kernel, gregkh

Commit-ID:  e698dcdfcda41efd0984de539767b4cddd235f1e
Gitweb:     https://git.kernel.org/tip/e698dcdfcda41efd0984de539767b4cddd235f1e
Author:     Colin Ian King <colin.king@canonical.com>
AuthorDate: Tue, 30 Jan 2018 19:32:18 +0000
Committer:  Thomas Gleixner <tglx@linutronix.de>
CommitDate: Tue, 30 Jan 2018 22:08:44 +0100

x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"

Trivial fix to spelling mistake in pr_err error message text.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: kernel-janitors@vger.kernel.org
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Borislav Petkov <bp@suse.de>
Cc: David Woodhouse <dwmw@amazon.co.uk>
Link: https://lkml.kernel.org/r/20180130193218.9271-1-colin.king@canonical.com
---
 arch/x86/kernel/cpu/bugs.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c
index fdb6068..dd3a3cc 100644
--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
@@ -103,7 +103,7 @@ bool retpoline_module_ok(bool has_retpoline)
 	if (spectre_v2_enabled == SPECTRE_V2_NONE || has_retpoline)
 		return true;
 
-	pr_err("System may be vunerable to spectre v2\n");
+	pr_err("System may be vulnerable to spectre v2\n");
 	spectre_v2_bad_module = true;
 	return false;
 }

^ permalink raw reply related	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2018-01-30 22:38 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-01-30 19:32 [PATCH] x86/cpu/bugs: fix spelling mistake: "vunerable"-> "vulnerable" Colin King
2018-01-30 19:32 ` Colin King
2018-01-30 22:38 ` [tip:x86/pti] x86/spectre: Fix " tip-bot for Colin Ian King

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.