[PATCH] modsign: Fix documentation on module signing enforcement parameter.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>From 033be2a07878841081a30408aecce3a6b6c8f677 Mon Sep 17 00:00:00 2001
From: James Johnston <johnstonj.public@xxxxxxxxxxxx>
Date: Sun, 6 Mar 2016 19:54:38 -0500
Subject: [PATCH] modsign: Fix documentation on module signing enforcement
 parameter.

Modify the documentation to match the actual parameter as implemented in
kernel/module.c:273.

Signed-off-by: James Johnston <johnstonj.public@xxxxxxxxxxxx>
---
 Documentation/module-signing.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/Documentation/module-signing.txt
b/Documentation/module-signing.txt
index a78bf1f..696d5ca 100644
--- a/Documentation/module-signing.txt
+++ b/Documentation/module-signing.txt
@@ -254,7 +254,7 @@ signature checking is all done within the kernel.
 NON-VALID SIGNATURES AND UNSIGNED MODULES
 =========================================
 
-If CONFIG_MODULE_SIG_FORCE is enabled or enforcemodulesig=1 is supplied on
+If CONFIG_MODULE_SIG_FORCE is enabled or module.sig_enforce=1 is supplied
on
 the kernel command line, the kernel will only load validly signed modules
 for which it has a public key.   Otherwise, it will also load modules that
are
 unsigned.   Any module for which the kernel has a key, but which proves to
have
-- 
2.5.0



--
To unsubscribe from this list: send the line "unsubscribe linux-doc" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]     [Linux Resources]

  Powered by Linux