diff options
author | James Johnston <johnstonj.public@codenest.com> | 2016-03-09 22:38:48 -0500 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2016-03-12 03:48:11 -0500 |
commit | abfa6cd8cda71b9071191e72711bd474e539b1b2 (patch) | |
tree | 103239aefbd997d52588d5157b1b49a097ec921e | |
parent | 0d6f3ebf9ebdf3d2047dbe63dda501990f095641 (diff) |
modsign: Fix documentation on module signing enforcement parameter.
Modify the documentation to match the actual parameter as implemented in
kernel/module.c:273.
Signed-off-by: James Johnston <johnstonj.public@codenest.com>
Reviewed-by: David Howells <dhowells@redhat.com>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
-rw-r--r-- | Documentation/module-signing.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Documentation/module-signing.txt b/Documentation/module-signing.txt index a78bf1ffa68c..696d5caf4fd8 100644 --- a/Documentation/module-signing.txt +++ b/Documentation/module-signing.txt | |||
@@ -254,7 +254,7 @@ signature checking is all done within the kernel. | |||
254 | NON-VALID SIGNATURES AND UNSIGNED MODULES | 254 | NON-VALID SIGNATURES AND UNSIGNED MODULES |
255 | ========================================= | 255 | ========================================= |
256 | 256 | ||
257 | If CONFIG_MODULE_SIG_FORCE is enabled or enforcemodulesig=1 is supplied on | 257 | If CONFIG_MODULE_SIG_FORCE is enabled or module.sig_enforce=1 is supplied on |
258 | the kernel command line, the kernel will only load validly signed modules | 258 | the kernel command line, the kernel will only load validly signed modules |
259 | for which it has a public key. Otherwise, it will also load modules that are | 259 | for which it has a public key. Otherwise, it will also load modules that are |
260 | unsigned. Any module for which the kernel has a key, but which proves to have | 260 | unsigned. Any module for which the kernel has a key, but which proves to have |