aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJames Johnston <johnstonj.public@codenest.com>2016-03-09 22:38:48 -0500
committerJonathan Corbet <corbet@lwn.net>2016-03-12 03:48:11 -0500
commitabfa6cd8cda71b9071191e72711bd474e539b1b2 (patch)
tree103239aefbd997d52588d5157b1b49a097ec921e
parent0d6f3ebf9ebdf3d2047dbe63dda501990f095641 (diff)
modsign: Fix documentation on module signing enforcement parameter.
Modify the documentation to match the actual parameter as implemented in kernel/module.c:273. Signed-off-by: James Johnston <johnstonj.public@codenest.com> Reviewed-by: David Howells <dhowells@redhat.com> Signed-off-by: Jonathan Corbet <corbet@lwn.net>
-rw-r--r--Documentation/module-signing.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/Documentation/module-signing.txt b/Documentation/module-signing.txt
index a78bf1ffa68c..696d5caf4fd8 100644
--- a/Documentation/module-signing.txt
+++ b/Documentation/module-signing.txt
@@ -254,7 +254,7 @@ signature checking is all done within the kernel.
254NON-VALID SIGNATURES AND UNSIGNED MODULES 254NON-VALID SIGNATURES AND UNSIGNED MODULES
255========================================= 255=========================================
256 256
257If CONFIG_MODULE_SIG_FORCE is enabled or enforcemodulesig=1 is supplied on 257If CONFIG_MODULE_SIG_FORCE is enabled or module.sig_enforce=1 is supplied on
258the kernel command line, the kernel will only load validly signed modules 258the kernel command line, the kernel will only load validly signed modules
259for which it has a public key. Otherwise, it will also load modules that are 259for which it has a public key. Otherwise, it will also load modules that are
260unsigned. Any module for which the kernel has a key, but which proves to have 260unsigned. Any module for which the kernel has a key, but which proves to have