From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 55CB2C38A02 for ; Mon, 31 Oct 2022 11:49:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=hypkVk9bdqVop66+8xiGX0DkIx+OM2sBic5FwsAr9xs=; b=4GZrxhMNf0sljR HzY6O3vv4XbcQPcmg8w1GpFDGN9qub9eEBafmne2WoyXnfgT6gWXUAOAJ0f5ExfGGF1kHcX4UvYSP 2dW5lup7kIrFg+4hwa6DebCqPyGshmkWOE69s4mvFS7YaVFC8iA+lYKT5Px7mCt2YY52D1/ACQOSt /5zQnlsbrNqrFBEhE/APCuzCS597y5b+8QEuMHmeQSca8Ncx5UJwro4FFdwrMhxmVcM3hfKB49Yq0 SXgXR4UMVAKwsJZFew8V+4okEPMnKkDO0yzNRL3bN4DAXE+NLEZu4CAIJy5ie+ro7qPSHUvD5aC+h LKAed++9ldsOcCPEWDQA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1opTHR-00BNuu-Pv; Mon, 31 Oct 2022 11:48:37 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1opTHO-00BNtg-Cx for linux-arm-kernel@lists.infradead.org; Mon, 31 Oct 2022 11:48:35 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1E8531FB; Mon, 31 Oct 2022 04:48:36 -0700 (PDT) Received: from FVFF77S0Q05N (unknown [10.57.5.37]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B3F9B3F5A1; Mon, 31 Oct 2022 04:48:28 -0700 (PDT) Date: Mon, 31 Oct 2022 11:48:19 +0000 From: Mark Rutland To: Mukesh Ojha Cc: catalin.marinas@arm.com, will@kernel.org, broonie@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH] arm64: entry: Fix typo Message-ID: References: <1667027268-1255-1-git-send-email-quic_mojha@quicinc.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <1667027268-1255-1-git-send-email-quic_mojha@quicinc.com> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20221031_044834_577785_C50896C6 X-CRM114-Status: GOOD ( 18.14 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Sat, Oct 29, 2022 at 12:37:48PM +0530, Mukesh Ojha wrote: > Fix the following typo in entry-common.c > intrumentable => instrumentable > > Signed-off-by: Mukesh Ojha Acked-by: Mark Rutland Thanks, Mark. > --- > arch/arm64/kernel/entry-common.c | 16 ++++++++-------- > 1 file changed, 8 insertions(+), 8 deletions(-) > > diff --git a/arch/arm64/kernel/entry-common.c b/arch/arm64/kernel/entry-common.c > index 9173fad..b694d8f 100644 > --- a/arch/arm64/kernel/entry-common.c > +++ b/arch/arm64/kernel/entry-common.c > @@ -30,7 +30,7 @@ > /* > * Handle IRQ/context state management when entering from kernel mode. > * Before this function is called it is not safe to call regular kernel code, > - * intrumentable code, or any code which may trigger an exception. > + * instrumentable code, or any code which may trigger an exception. > * > * This is intended to match the logic in irqentry_enter(), handling the kernel > * mode transitions only. > @@ -63,7 +63,7 @@ static void noinstr enter_from_kernel_mode(struct pt_regs *regs) > /* > * Handle IRQ/context state management when exiting to kernel mode. > * After this function returns it is not safe to call regular kernel code, > - * intrumentable code, or any code which may trigger an exception. > + * instrumentable code, or any code which may trigger an exception. > * > * This is intended to match the logic in irqentry_exit(), handling the kernel > * mode transitions only, and with preemption handled elsewhere. > @@ -97,7 +97,7 @@ static void noinstr exit_to_kernel_mode(struct pt_regs *regs) > /* > * Handle IRQ/context state management when entering from user mode. > * Before this function is called it is not safe to call regular kernel code, > - * intrumentable code, or any code which may trigger an exception. > + * instrumentable code, or any code which may trigger an exception. > */ > static __always_inline void __enter_from_user_mode(void) > { > @@ -116,7 +116,7 @@ static __always_inline void enter_from_user_mode(struct pt_regs *regs) > /* > * Handle IRQ/context state management when exiting to user mode. > * After this function returns it is not safe to call regular kernel code, > - * intrumentable code, or any code which may trigger an exception. > + * instrumentable code, or any code which may trigger an exception. > */ > static __always_inline void __exit_to_user_mode(void) > { > @@ -152,7 +152,7 @@ asmlinkage void noinstr asm_exit_to_user_mode(struct pt_regs *regs) > /* > * Handle IRQ/context state management when entering an NMI from user/kernel > * mode. Before this function is called it is not safe to call regular kernel > - * code, intrumentable code, or any code which may trigger an exception. > + * code, instrumentable code, or any code which may trigger an exception. > */ > static void noinstr arm64_enter_nmi(struct pt_regs *regs) > { > @@ -170,7 +170,7 @@ static void noinstr arm64_enter_nmi(struct pt_regs *regs) > /* > * Handle IRQ/context state management when exiting an NMI from user/kernel > * mode. After this function returns it is not safe to call regular kernel > - * code, intrumentable code, or any code which may trigger an exception. > + * code, instrumentable code, or any code which may trigger an exception. > */ > static void noinstr arm64_exit_nmi(struct pt_regs *regs) > { > @@ -192,7 +192,7 @@ static void noinstr arm64_exit_nmi(struct pt_regs *regs) > /* > * Handle IRQ/context state management when entering a debug exception from > * kernel mode. Before this function is called it is not safe to call regular > - * kernel code, intrumentable code, or any code which may trigger an exception. > + * kernel code, instrumentable code, or any code which may trigger an exception. > */ > static void noinstr arm64_enter_el1_dbg(struct pt_regs *regs) > { > @@ -207,7 +207,7 @@ static void noinstr arm64_enter_el1_dbg(struct pt_regs *regs) > /* > * Handle IRQ/context state management when exiting a debug exception from > * kernel mode. After this function returns it is not safe to call regular > - * kernel code, intrumentable code, or any code which may trigger an exception. > + * kernel code, instrumentable code, or any code which may trigger an exception. > */ > static void noinstr arm64_exit_el1_dbg(struct pt_regs *regs) > { > -- > 2.7.4 > _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel