Message ID | 20190401132907.24823-3-juergh@canonical.com |
---|---|
State | New |
Headers | show |
Series | Xenial: Sync to upstream v4.9 (LP: #1820872) | expand |
diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index 14bd3bcf0707..1ad86a8d68b8 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt @@ -3727,7 +3727,7 @@ bytes respectively. Such letter suffixes can also be entirely omitted. spec_store_bypass_disable= [HW] Control Speculative Store Bypass (SSB) Disable mitigation - (Seculative Store Bypass vulnerability) + (Speculative Store Bypass vulnerability) Certain CPUs are vulnerable to an exploit against a a common industry wide performance optimization known
BugLink: https://bugs.launchpad.net/bugs/1820872 Fixes: bb807b8430bc ("UBUNTU: SAUCE: x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation") Signed-off-by: Juerg Haefliger <juergh@canonical.com> --- Documentation/kernel-parameters.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)