From: Geert Uytterhoeven Date: Tue, 2 May 2017 18:27:41 +0000 (+0200) Subject: security: Grammar s/allocates/allocated/ X-Git-Url: https://git.stricted.de/?a=commitdiff_plain;h=99c55fb18fc48508ae5bba57146a556aacc4558c;p=GitHub%2Fmoto-9609%2Fandroid_kernel_motorola_exynos9610.git security: Grammar s/allocates/allocated/ Signed-off-by: Geert Uytterhoeven Signed-off-by: James Morris --- diff --git a/security/Kconfig b/security/Kconfig index 3ff1bf91080e..823ca1aafd09 100644 --- a/security/Kconfig +++ b/security/Kconfig @@ -148,7 +148,7 @@ config HARDENED_USERCOPY copying memory to/from the kernel (via copy_to_user() and copy_from_user() functions) by rejecting memory ranges that are larger than the specified heap object, span multiple - separately allocates pages, are not on the process stack, + separately allocated pages, are not on the process stack, or are part of the kernel text. This kills entire classes of heap overflow exploits and similar kernel memory exposures.