Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit abfa6cd8 authored by James Johnston's avatar James Johnston Committed by Jonathan Corbet
Browse files

modsign: Fix documentation on module signing enforcement parameter.



Modify the documentation to match the actual parameter as implemented in
kernel/module.c:273.

Signed-off-by: default avatarJames Johnston <johnstonj.public@codenest.com>
Reviewed-by: default avatarDavid Howells <dhowells@redhat.com>
Signed-off-by: default avatarJonathan Corbet <corbet@lwn.net>
parent 0d6f3ebf
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -254,7 +254,7 @@ signature checking is all done within the kernel.
NON-VALID SIGNATURES AND UNSIGNED MODULES
=========================================

If CONFIG_MODULE_SIG_FORCE is enabled or enforcemodulesig=1 is supplied on
If CONFIG_MODULE_SIG_FORCE is enabled or module.sig_enforce=1 is supplied on
the kernel command line, the kernel will only load validly signed modules
for which it has a public key.   Otherwise, it will also load modules that are
unsigned.   Any module for which the kernel has a key, but which proves to have