The patch titled x86: fix a typo in a printk message has been added to the -mm tree. Its filename is x86-fix-a-typo-in-a-printk-message.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/SubmitChecklist when testing your code *** See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find out what to do about this The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/ ------------------------------------------------------ Subject: x86: fix a typo in a printk message From: Nikanth Karthikesan <knikanth@xxxxxxx> Signed-off-by: Nikanth Karthikesan <knikanth@xxxxxxx> Cc: Ingo Molnar <mingo@xxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- arch/x86/mm/srat_32.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff -puN arch/x86/mm/srat_32.c~x86-fix-a-typo-in-a-printk-message arch/x86/mm/srat_32.c --- a/arch/x86/mm/srat_32.c~x86-fix-a-typo-in-a-printk-message +++ a/arch/x86/mm/srat_32.c @@ -216,7 +216,7 @@ int __init get_memcfg_from_srat(void) if (num_memory_chunks == 0) { printk(KERN_WARNING - "could not finy any ACPI SRAT memory areas.\n"); + "could not find any ACPI SRAT memory areas.\n"); goto out_fail; } _ Patches currently in -mm which might be from knikanth@xxxxxxx are linux-next.patch x86-fix-a-typo-in-a-printk-message.patch block-prevent-possible-io_context-refcount-overflow.patch atomic-detect-and-warn-on-atomic_inc-atomic_dec-wrapping-around.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html