Pārlūkot izejas kodu

modsign: Fix documentation on module signing enforcement parameter.

Modify the documentation to match the actual parameter as implemented in
kernel/module.c:273.

Signed-off-by: James Johnston <johnstonj.public@codenest.com>
Reviewed-by: David Howells <dhowells@redhat.com>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
James Johnston 9 gadi atpakaļ
vecāks
revīzija
abfa6cd8cd
1 mainītis faili ar 1 papildinājumiem un 1 dzēšanām
  1. 1 1
      Documentation/module-signing.txt

+ 1 - 1
Documentation/module-signing.txt

@@ -254,7 +254,7 @@ signature checking is all done within the kernel.
 NON-VALID SIGNATURES AND UNSIGNED MODULES
 NON-VALID SIGNATURES AND UNSIGNED MODULES
 =========================================
 =========================================
 
 
-If CONFIG_MODULE_SIG_FORCE is enabled or enforcemodulesig=1 is supplied on
+If CONFIG_MODULE_SIG_FORCE is enabled or module.sig_enforce=1 is supplied on
 the kernel command line, the kernel will only load validly signed modules
 the kernel command line, the kernel will only load validly signed modules
 for which it has a public key.   Otherwise, it will also load modules that are
 for which it has a public key.   Otherwise, it will also load modules that are
 unsigned.   Any module for which the kernel has a key, but which proves to have
 unsigned.   Any module for which the kernel has a key, but which proves to have