Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

modsign: Fix documentation on module signing enforcement parameter.

Modify the documentation to match the actual parameter as implemented in
kernel/module.c:273.

Signed-off-by: James Johnston <johnstonj.public@codenest.com>
Reviewed-by: David Howells <dhowells@redhat.com>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>

authored by

James Johnston and committed by
Jonathan Corbet
abfa6cd8 0d6f3ebf

+1 -1
+1 -1
Documentation/module-signing.txt
··· 254 254 NON-VALID SIGNATURES AND UNSIGNED MODULES 255 255 ========================================= 256 256 257 - If CONFIG_MODULE_SIG_FORCE is enabled or enforcemodulesig=1 is supplied on 257 + If CONFIG_MODULE_SIG_FORCE is enabled or module.sig_enforce=1 is supplied on 258 258 the kernel command line, the kernel will only load validly signed modules 259 259 for which it has a public key. Otherwise, it will also load modules that are 260 260 unsigned. Any module for which the kernel has a key, but which proves to have