public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Fix English in description of GCC_PLUGIN_STRUCTLEAK
@ 2017-04-24  6:52 Jean Delvare
  2017-04-24 20:41 ` Kees Cook
  0 siblings, 1 reply; 2+ messages in thread
From: Jean Delvare @ 2017-04-24  6:52 UTC (permalink / raw)
  To: Kees Cook; +Cc: LKML

Signed-off-by: Jean Delvare <jdelvare@suse.de>
Fixes: c61f13eaa1ee ("gcc-plugins: Add structleak for more stack initialization")
Cc: Kees Cook <keescook@chromium.org>
---
 arch/Kconfig |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

--- linux-4.11-rc8.orig/arch/Kconfig	2017-04-03 02:23:54.000000000 +0200
+++ linux-4.11-rc8/arch/Kconfig	2017-04-24 08:42:42.889766657 +0200
@@ -418,7 +418,7 @@ config GCC_PLUGIN_STRUCTLEAK
 	bool "Force initialization of variables containing userspace addresses"
 	depends on GCC_PLUGINS
 	help
-	  This plugin zero-initializes any structures that containing a
+	  This plugin zero-initializes any structures containing a
 	  __user attribute. This can prevent some classes of information
 	  exposures.
 


-- 
Jean Delvare
SUSE L3 Support

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: Fix English in description of GCC_PLUGIN_STRUCTLEAK
  2017-04-24  6:52 Fix English in description of GCC_PLUGIN_STRUCTLEAK Jean Delvare
@ 2017-04-24 20:41 ` Kees Cook
  0 siblings, 0 replies; 2+ messages in thread
From: Kees Cook @ 2017-04-24 20:41 UTC (permalink / raw)
  To: Jean Delvare; +Cc: LKML

On Sun, Apr 23, 2017 at 11:52 PM, Jean Delvare <jdelvare@suse.de> wrote:
> Signed-off-by: Jean Delvare <jdelvare@suse.de>
> Fixes: c61f13eaa1ee ("gcc-plugins: Add structleak for more stack initialization")
> Cc: Kees Cook <keescook@chromium.org>
> ---
>  arch/Kconfig |    2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> --- linux-4.11-rc8.orig/arch/Kconfig    2017-04-03 02:23:54.000000000 +0200
> +++ linux-4.11-rc8/arch/Kconfig 2017-04-24 08:42:42.889766657 +0200
> @@ -418,7 +418,7 @@ config GCC_PLUGIN_STRUCTLEAK
>         bool "Force initialization of variables containing userspace addresses"
>         depends on GCC_PLUGINS
>         help
> -         This plugin zero-initializes any structures that containing a
> +         This plugin zero-initializes any structures containing a
>           __user attribute. This can prevent some classes of information
>           exposures.

Thanks! I'll get this applied for -next. :)

-Kees

-- 
Kees Cook
Pixel Security

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2017-04-24 20:42 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-04-24  6:52 Fix English in description of GCC_PLUGIN_STRUCTLEAK Jean Delvare
2017-04-24 20:41 ` Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox