[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAGXu5j+4tp722-ZZkYbyvXCB-mDC4Jer9fs5M08fSmSKvOwO7w@mail.gmail.com>
Date: Mon, 24 Apr 2017 13:41:48 -0700
From: Kees Cook <keescook@...omium.org>
To: Jean Delvare <jdelvare@...e.de>
Cc: LKML <linux-kernel@...r.kernel.org>
Subject: Re: Fix English in description of GCC_PLUGIN_STRUCTLEAK
On Sun, Apr 23, 2017 at 11:52 PM, Jean Delvare <jdelvare@...e.de> wrote:
> Signed-off-by: Jean Delvare <jdelvare@...e.de>
> Fixes: c61f13eaa1ee ("gcc-plugins: Add structleak for more stack initialization")
> Cc: Kees Cook <keescook@...omium.org>
> ---
> arch/Kconfig | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> --- linux-4.11-rc8.orig/arch/Kconfig 2017-04-03 02:23:54.000000000 +0200
> +++ linux-4.11-rc8/arch/Kconfig 2017-04-24 08:42:42.889766657 +0200
> @@ -418,7 +418,7 @@ config GCC_PLUGIN_STRUCTLEAK
> bool "Force initialization of variables containing userspace addresses"
> depends on GCC_PLUGINS
> help
> - This plugin zero-initializes any structures that containing a
> + This plugin zero-initializes any structures containing a
> __user attribute. This can prevent some classes of information
> exposures.
Thanks! I'll get this applied for -next. :)
-Kees
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists