From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1165799AbdDXGws (ORCPT ); Mon, 24 Apr 2017 02:52:48 -0400 Received: from mx2.suse.de ([195.135.220.15]:51981 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1165730AbdDXGwk (ORCPT ); Mon, 24 Apr 2017 02:52:40 -0400 Date: Mon, 24 Apr 2017 08:52:37 +0200 From: Jean Delvare To: Kees Cook Cc: LKML Subject: Fix English in description of GCC_PLUGIN_STRUCTLEAK Message-ID: <20170424085237.7c561c06@endymion> Organization: SUSE Linux X-Mailer: Claws Mail 3.12.0 (GTK+ 2.24.31; x86_64-suse-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Signed-off-by: Jean Delvare Fixes: c61f13eaa1ee ("gcc-plugins: Add structleak for more stack initialization") Cc: Kees Cook --- arch/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- linux-4.11-rc8.orig/arch/Kconfig 2017-04-03 02:23:54.000000000 +0200 +++ linux-4.11-rc8/arch/Kconfig 2017-04-24 08:42:42.889766657 +0200 @@ -418,7 +418,7 @@ config GCC_PLUGIN_STRUCTLEAK bool "Force initialization of variables containing userspace addresses" depends on GCC_PLUGINS help - This plugin zero-initializes any structures that containing a + This plugin zero-initializes any structures containing a __user attribute. This can prevent some classes of information exposures. -- Jean Delvare SUSE L3 Support