diff options
author | Geert Uytterhoeven <geert@linux-m68k.org> | 2017-05-02 20:27:41 +0200 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2017-05-15 02:02:13 +0200 |
commit | 99c55fb18fc48508ae5bba57146a556aacc4558c (patch) | |
tree | 8f2b25bee284a774808f66e51ffc4ee81698fdca /security/Kconfig | |
parent | LSM: Enable multiple calls to security_add_hooks() for the same LSM (diff) | |
download | linux-99c55fb18fc48508ae5bba57146a556aacc4558c.tar.xz linux-99c55fb18fc48508ae5bba57146a556aacc4558c.zip |
security: Grammar s/allocates/allocated/
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'security/Kconfig')
-rw-r--r-- | security/Kconfig | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/Kconfig b/security/Kconfig index 3ff1bf91080e..823ca1aafd09 100644 --- a/security/Kconfig +++ b/security/Kconfig @@ -148,7 +148,7 @@ config HARDENED_USERCOPY copying memory to/from the kernel (via copy_to_user() and copy_from_user() functions) by rejecting memory ranges that are larger than the specified heap object, span multiple - separately allocates pages, are not on the process stack, + separately allocated pages, are not on the process stack, or are part of the kernel text. This kills entire classes of heap overflow exploits and similar kernel memory exposures. |