x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
authorColin Ian King <colin.king@canonical.com>
Tue, 30 Jan 2018 19:32:18 +0000 (19:32 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 7 Feb 2018 19:12:24 +0000 (11:12 -0800)
commit e698dcdfcda41efd0984de539767b4cddd235f1e

Trivial fix to spelling mistake in pr_err error message text.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: kernel-janitors@vger.kernel.org
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Borislav Petkov <bp@suse.de>
Cc: David Woodhouse <dwmw@amazon.co.uk>
Link: https://lkml.kernel.org/r/20180130193218.9271-1-colin.king@canonical.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/bugs.c

index fdb6068..dd3a3cc 100644 (file)
@@ -103,7 +103,7 @@ bool retpoline_module_ok(bool has_retpoline)
        if (spectre_v2_enabled == SPECTRE_V2_NONE || has_retpoline)
                return true;
 
-       pr_err("System may be vunerable to spectre v2\n");
+       pr_err("System may be vulnerable to spectre v2\n");
        spectre_v2_bad_module = true;
        return false;
 }