Received: by 10.223.176.5 with SMTP id f5csp713630wra; Fri, 9 Feb 2018 06:06:36 -0800 (PST) X-Google-Smtp-Source: AH8x224Ifpb4RWEwHv2bhtXuPsyYghUjtfkX8vSAv6PVAnni17HbCC6RQ/hsXqi79DLpWJclYvM9 X-Received: by 2002:a17:902:5814:: with SMTP id m20-v6mr856890pli.389.1518185196266; Fri, 09 Feb 2018 06:06:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518185196; cv=none; d=google.com; s=arc-20160816; b=iBkuOUgm7Qs98zuRav0at7h0w6iIVVBNST2TQiUHPBCgiDjnmVMc8BPHFiNiVtFyTC W7BqSYMzL8dmY//yisTp9Ta0IC6vqc92Q8XHIlspbBbq70HCF6keDeHF3+0aSdXNb/l4 LKeN6CD4ztw0cCacuupm/Pe/RvhROFWkbMCICD12GCxy+1CpN20M6pJ7uL2NCCGnKGPV dU8P69zXb0ukGZ5AXMKirVf2SrayNpewHeGv9C3JE/oJjOv9lyz1AXT4L57T6j+l8aCy x2x8pjcoaLHwXMVfGaZRdtzc9cLNoRSNTCLcwka/yvDMm6Unm1eDn/9GNg7qNP0h9pXx Qn/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Bf/XyguWH174hhryYAGg+muUyNazFfaEYxGyRv1mj9c=; b=jf4EI/PV+KgJ6fcDEsdFhbfl/rBoY8lEAzNE7eQaeTDRA9v5LQ8hytxVwIOCYyHegU 1VExX6itKoFRgWuM9ZepUAB0MGTEZ9tu0M9dvtun8f5bRpPL2kJeE+R79OMbj24hJBcG +JD1rG29ReEPrOVncuhNZdOrDsEnJzcGtiAG3ybsYLJaKE6Y3lxkAP+vYfzkYo0b1FEk c9Q+amSgC6CAbTWqCREDikdRy+qxcsbbmApR2PUsT4jtKII30gsVPBM0C1mzTQ+zCPSz QCLAa9C4IOo/ctyHPoj6io+BygRxADgvzUpaiYBhmDnRmHtCr+Ge88Z0tMUhlX7Sn5eT wV4Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p9-v6si1546045pls.317.2018.02.09.06.06.22; Fri, 09 Feb 2018 06:06:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753378AbeBIOET (ORCPT + 99 others); Fri, 9 Feb 2018 09:04:19 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:50924 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753245AbeBINng (ORCPT ); Fri, 9 Feb 2018 08:43:36 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 5706FF5E; Fri, 9 Feb 2018 13:43:24 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Thomas Gleixner , Andi Kleen , kernel-janitors@vger.kernel.org, Andy Lutomirski , Borislav Petkov , David Woodhouse Subject: [PATCH 4.9 68/92] x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" Date: Fri, 9 Feb 2018 14:39:37 +0100 Message-Id: <20180209133936.154403947@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180209133931.211869118@linuxfoundation.org> References: <20180209133931.211869118@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Colin Ian King (cherry picked from commit e698dcdfcda41efd0984de539767b4cddd235f1e) Trivial fix to spelling mistake in pr_err error message text. Signed-off-by: Colin Ian King Signed-off-by: Thomas Gleixner Cc: Andi Kleen Cc: Greg Kroah-Hartman Cc: kernel-janitors@vger.kernel.org Cc: Andy Lutomirski Cc: Borislav Petkov Cc: David Woodhouse Link: https://lkml.kernel.org/r/20180130193218.9271-1-colin.king@canonical.com Signed-off-by: David Woodhouse Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/bugs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -102,7 +102,7 @@ bool retpoline_module_ok(bool has_retpol if (spectre_v2_enabled == SPECTRE_V2_NONE || has_retpoline) return true; - pr_err("System may be vunerable to spectre v2\n"); + pr_err("System may be vulnerable to spectre v2\n"); spectre_v2_bad_module = true; return false; }