]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
authorColin Ian King <colin.king@canonical.com>
Fri, 23 Feb 2018 10:42:08 +0000 (11:42 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 25 Feb 2018 10:03:54 +0000 (11:03 +0100)
(cherry picked from commit e698dcdfcda41efd0984de539767b4cddd235f1e)

Trivial fix to spelling mistake in pr_err error message text.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: kernel-janitors@vger.kernel.org
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Borislav Petkov <bp@suse.de>
Cc: David Woodhouse <dwmw@amazon.co.uk>
Link: https://lkml.kernel.org/r/20180130193218.9271-1-colin.king@canonical.com
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
[jwang: cherry pick to 4.4]
Signed-off-by: Jack Wang <jinpu.wang@profitbricks.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/bugs.c

index 812813e026a3a5e0ef00d6478d14f6b142c6ce7d..6272c207330d1f0df3b84f37b4d9040b7fc8017f 100644 (file)
@@ -103,7 +103,7 @@ bool retpoline_module_ok(bool has_retpoline)
        if (spectre_v2_enabled == SPECTRE_V2_NONE || has_retpoline)
                return true;
 
-       pr_err("System may be vunerable to spectre v2\n");
+       pr_err("System may be vulnerable to spectre v2\n");
        spectre_v2_bad_module = true;
        return false;
 }