From: Geert Uytterhoeven <geert@linux-m68k.org>
Date: Tue, 2 May 2017 18:27:41 +0000 (+0200)
Subject: security: Grammar s/allocates/allocated/
X-Git-Url: http://git.maquefel.me/?a=commitdiff_plain;h=99c55fb18fc48508ae5bba57146a556aacc4558c;p=linux.git

security: Grammar s/allocates/allocated/

Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
Signed-off-by: James Morris <james.l.morris@oracle.com>
---

diff --git a/security/Kconfig b/security/Kconfig
index 3ff1bf91080eb..823ca1aafd092 100644
--- a/security/Kconfig
+++ b/security/Kconfig
@@ -148,7 +148,7 @@ config HARDENED_USERCOPY
 	  copying memory to/from the kernel (via copy_to_user() and
 	  copy_from_user() functions) by rejecting memory ranges that
 	  are larger than the specified heap object, span multiple
-	  separately allocates pages, are not on the process stack,
+	  separately allocated pages, are not on the process stack,
 	  or are part of the kernel text. This kills entire classes
 	  of heap overflow exploits and similar kernel memory exposures.