path: root/security/Kconfig
diff options
authorGeert Uytterhoeven <>2017-05-02 20:27:41 +0200
committerJames Morris <>2017-05-15 10:02:13 +1000
commit99c55fb18fc48508ae5bba57146a556aacc4558c (patch)
tree8f2b25bee284a774808f66e51ffc4ee81698fdca /security/Kconfig
parent3bb857e47e49f72352249c938aa8b9159d636530 (diff)
security: Grammar s/allocates/allocated/
Signed-off-by: Geert Uytterhoeven <> Signed-off-by: James Morris <>
Diffstat (limited to 'security/Kconfig')
1 files changed, 1 insertions, 1 deletions
diff --git a/security/Kconfig b/security/Kconfig
index 3ff1bf91080e..823ca1aafd09 100644
--- a/security/Kconfig
+++ b/security/Kconfig
@@ -148,7 +148,7 @@ config HARDENED_USERCOPY
copying memory to/from the kernel (via copy_to_user() and
copy_from_user() functions) by rejecting memory ranges that
are larger than the specified heap object, span multiple
- separately allocates pages, are not on the process stack,
+ separately allocated pages, are not on the process stack,
or are part of the kernel text. This kills entire classes
of heap overflow exploits and similar kernel memory exposures.