diff options
Diffstat (limited to 'common/recipes-kernel/linux/linux-yocto-4.9.21/0058-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch')
-rw-r--r-- | common/recipes-kernel/linux/linux-yocto-4.9.21/0058-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch | 37 |
1 files changed, 0 insertions, 37 deletions
diff --git a/common/recipes-kernel/linux/linux-yocto-4.9.21/0058-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch b/common/recipes-kernel/linux/linux-yocto-4.9.21/0058-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch deleted file mode 100644 index 86259f27..00000000 --- a/common/recipes-kernel/linux/linux-yocto-4.9.21/0058-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch +++ /dev/null @@ -1,37 +0,0 @@ -From e7d0d7ecd8f7d78d7fb2b15324bb79fc5de42776 Mon Sep 17 00:00:00 2001 -From: David Woodhouse <dwmw@amazon.co.uk> -Date: Tue, 9 Jan 2018 15:02:51 +0000 -Subject: [PATCH 058/103] sysfs/cpu: Fix typos in vulnerability documentation - -commit 9ecccfaa7cb5249bd31bdceb93fcf5bedb8a24d8 upstream. - -Fixes: 87590ce6e ("sysfs/cpu: Add vulnerability folder") -Signed-off-by: David Woodhouse <dwmw@amazon.co.uk> -Signed-off-by: Thomas Gleixner <tglx@linutronix.de> -Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> ---- - Documentation/ABI/testing/sysfs-devices-system-cpu | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/Documentation/ABI/testing/sysfs-devices-system-cpu b/Documentation/ABI/testing/sysfs-devices-system-cpu -index 8b30a48..dfd56ec 100644 ---- a/Documentation/ABI/testing/sysfs-devices-system-cpu -+++ b/Documentation/ABI/testing/sysfs-devices-system-cpu -@@ -355,7 +355,7 @@ What: /sys/devices/system/cpu/vulnerabilities - /sys/devices/system/cpu/vulnerabilities/meltdown - /sys/devices/system/cpu/vulnerabilities/spectre_v1 - /sys/devices/system/cpu/vulnerabilities/spectre_v2 --Date: Januar 2018 -+Date: January 2018 - Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org> - Description: Information about CPU vulnerabilities - -@@ -365,4 +365,4 @@ Description: Information about CPU vulnerabilities - - "Not affected" CPU is not affected by the vulnerability - "Vulnerable" CPU is affected and no mitigation in effect -- "Mitigation: $M" CPU is affetcted and mitigation $M is in effect -+ "Mitigation: $M" CPU is affected and mitigation $M is in effect --- -2.7.4 - |