···623623 * output parameter to the hypercall below and so it should be624624 * compatible with 'virt_to_phys'. Which means, it's address should be625625 * directly mapped. Use 'static' to keep it compatible; stack variables626626- * can be virtually mapped, making them imcompatible with626626+ * can be virtually mapped, making them incompatible with627627 * 'virt_to_phys'.628628 * Hypercall input/output addresses should also be 8-byte aligned.629629 */
+1-1
arch/x86/include/asm/sgx.h
···1313/*1414 * This file contains both data structures defined by SGX architecture and Linux1515 * defined software data structures and functions. The two should not be mixed1616- * together for better readibility. The architectural definitions come first.1616+ * together for better readability. The architectural definitions come first.1717 */18181919/* The SGX specific CPUID function. */
+1-1
arch/x86/include/asm/stackprotector.h
···1111 * The same segment is shared by percpu area and stack canary. On1212 * x86_64, percpu symbols are zero based and %gs (64-bit) points to the1313 * base of percpu area. The first occupant of the percpu area is always1414- * fixed_percpu_data which contains stack_canary at the approproate1414+ * fixed_percpu_data which contains stack_canary at the appropriate1515 * offset. On x86_32, the stack canary is just a regular percpu1616 * variable.1717 *
+1-1
arch/x86/kernel/kprobes/core.c
···674674 break;675675676676 if (insn->addr_bytes != sizeof(unsigned long))677677- return -EOPNOTSUPP; /* Don't support differnt size */677677+ return -EOPNOTSUPP; /* Don't support different size */678678 if (X86_MODRM_MOD(opcode) != 3)679679 return -EOPNOTSUPP; /* TODO: support memory addressing */680680
+1-1
arch/x86/kvm/mmu/mmu.c
···23742374 * page is available, while the caller may end up allocating as many as23752375 * four pages, e.g. for PAE roots or for 5-level paging. Temporarily23762376 * exceeding the (arbitrary by default) limit will not harm the host,23772377- * being too agressive may unnecessarily kill the guest, and getting an23772377+ * being too aggressive may unnecessarily kill the guest, and getting an23782378 * exact count is far more trouble than it's worth, especially in the23792379 * page fault paths.23802380 */
+1-1
arch/x86/kvm/mmu/tdp_mmu.c
···1017101710181018 if (!is_shadow_present_pte(iter.old_spte)) {10191019 /*10201020- * If SPTE has been forzen by another thread, just10201020+ * If SPTE has been frozen by another thread, just10211021 * give up and retry, avoiding unnecessary page table10221022 * allocation and free.10231023 */