From patchwork Tue May 2 18:27:41 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Geert Uytterhoeven X-Patchwork-Id: 9708459 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id DA3806021C for ; Tue, 2 May 2017 18:27:46 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id CF4EC2848E for ; Tue, 2 May 2017 18:27:46 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id C1DDD284D4; Tue, 2 May 2017 18:27:46 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.4 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, RCVD_IN_SORBS_SPAM autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 4D7D02848E for ; Tue, 2 May 2017 18:27:46 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751220AbdEBS1p (ORCPT ); Tue, 2 May 2017 14:27:45 -0400 Received: from andre.telenet-ops.be ([195.130.132.53]:50224 "EHLO andre.telenet-ops.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750896AbdEBS1o (ORCPT ); Tue, 2 May 2017 14:27:44 -0400 Received: from ayla.of.borg ([84.193.137.253]) by andre.telenet-ops.be with bizsmtp id FWTi1v0095UCtCs01WTiaM; Tue, 02 May 2017 20:27:43 +0200 Received: from ramsan.of.borg ([192.168.97.29] helo=ramsan) by ayla.of.borg with esmtp (Exim 4.86_2) (envelope-from ) id 1d5cWU-0006KG-3G; Tue, 02 May 2017 20:27:42 +0200 Received: from geert by ramsan with local (Exim 4.86_2) (envelope-from ) id 1d5cWU-0005ub-1l; Tue, 02 May 2017 20:27:42 +0200 From: Geert Uytterhoeven To: Kees Cook , James Morris , "Serge E . Hallyn" , Jiri Kosina Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Geert Uytterhoeven Subject: [PATCH trivial] security: Grammar s/allocates/allocated/ Date: Tue, 2 May 2017 20:27:41 +0200 Message-Id: <1493749661-22686-1-git-send-email-geert@linux-m68k.org> X-Mailer: git-send-email 2.7.4 Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: X-Virus-Scanned: ClamAV using ClamSMTP Signed-off-by: Geert Uytterhoeven --- security/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/Kconfig b/security/Kconfig index 213df4d4f2c1527a..1bb0c5bc9caadf8c 100644 --- a/security/Kconfig +++ b/security/Kconfig @@ -134,7 +134,7 @@ config HARDENED_USERCOPY copying memory to/from the kernel (via copy_to_user() and copy_from_user() functions) by rejecting memory ranges that are larger than the specified heap object, span multiple - separately allocates pages, are not on the process stack, + separately allocated pages, are not on the process stack, or are part of the kernel text. This kills entire classes of heap overflow exploits and similar kernel memory exposures.