lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <aE0d0uuAxaeCE-9l@gmail.com>
Date: Sat, 14 Jun 2025 08:59:30 +0200
From: Ingo Molnar <mingo@...nel.org>
To: linux-kernel@...r.kernel.org, Thomas Gleixner <tglx@...utronix.de>
Cc: linux-tip-commits@...r.kernel.org, Dmitry Vyukov <dvyukov@...gle.com>,
	x86@...nel.org
Subject: [PATCH] syscall_user_dispatch: Fix grammar in
 task_set_syscall_user_dispatch()


* tip-bot2 for Dmitry Vyukov <tip-bot2@...utronix.de> wrote:

> +	/*
> +	 * access_ok() will clear memory tags for tagged addresses
> +	 * if current has memory tagging enabled.
> +	 *
> +	 * To enable a tracer to set a tracees selector the
> +	 * selector address must be untagged for access_ok(),
> +	 * otherwise an untagged tracer will always fail to set a
> +	 * tagged tracees selector.
> +	 */

Typo/grammar fixes below. (And feel free to squash this fixlet into the 
originator commit.)

Thanks,

	Ingo

==================================>

Signed-off-by: Ingo Molnar <mingo@...nel.org>

 kernel/entry/syscall_user_dispatch.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/kernel/entry/syscall_user_dispatch.c b/kernel/entry/syscall_user_dispatch.c
index a9055eccb27e..d5363bc768fe 100644
--- a/kernel/entry/syscall_user_dispatch.c
+++ b/kernel/entry/syscall_user_dispatch.c
@@ -106,10 +106,10 @@ static int task_set_syscall_user_dispatch(struct task_struct *task, unsigned lon
 	 * access_ok() will clear memory tags for tagged addresses
 	 * if current has memory tagging enabled.
 	 *
-	 * To enable a tracer to set a tracees selector the
+	 * To enable a tracer to set a tracee's selector, the
 	 * selector address must be untagged for access_ok(),
 	 * otherwise an untagged tracer will always fail to set a
-	 * tagged tracees selector.
+	 * tagged tracee's selector.
 	 */
 	if (mode != PR_SYS_DISPATCH_OFF && selector &&
 		!access_ok(untagged_addr(selector), sizeof(*selector)))

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ