diff mbox series

doc/kernel-parameters.txt: Deprecate ima_appraise_tcb

Message ID 20190404182322.25646-1-pvorel@suse.cz (mailing list archive)
State New, archived
Headers show
Series doc/kernel-parameters.txt: Deprecate ima_appraise_tcb | expand

Commit Message

Petr Vorel April 4, 2019, 6:23 p.m. UTC
Signed-off-by: Petr Vorel <pvorel@suse.cz>
---
 Documentation/admin-guide/kernel-parameters.txt | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

Comments

Mimi Zohar April 4, 2019, 7:24 p.m. UTC | #1
On Thu, 2019-04-04 at 20:23 +0200, Petr Vorel wrote:
> Signed-off-by: Petr Vorel <pvorel@suse.cz>

Thanks!

> ---
>  Documentation/admin-guide/kernel-parameters.txt | 5 ++---
>  1 file changed, 2 insertions(+), 3 deletions(-)
> 
> diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
> index 2b8ee90bb644..45147fc40a57 100644
> --- a/Documentation/admin-guide/kernel-parameters.txt
> +++ b/Documentation/admin-guide/kernel-parameters.txt
> @@ -1585,7 +1585,7 @@
>  			Format: { "off" | "enforce" | "fix" | "log" }
>  			default: "enforce"
> 
> -	ima_appraise_tcb [IMA]
> +	ima_appraise_tcb [IMA] Deprecated.  Use ima_policy= instead.
>  			The builtin appraise policy appraises all files
>  			owned by uid=0.
> 
> @@ -1612,8 +1612,7 @@
>  			uid=0.
> 
>  			The "appraise_tcb" policy appraises the integrity of
> -			all files owned by root. (This is the equivalent
> -			of ima_appraise_tcb.)
> +			all files owned by root.
> 
>  			The "secure_boot" policy appraises the integrity
>  			of files (eg. kexec kernel image, kernel modules,
diff mbox series

Patch

diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
index 2b8ee90bb644..45147fc40a57 100644
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -1585,7 +1585,7 @@ 
 			Format: { "off" | "enforce" | "fix" | "log" }
 			default: "enforce"
 
-	ima_appraise_tcb [IMA]
+	ima_appraise_tcb [IMA] Deprecated.  Use ima_policy= instead.
 			The builtin appraise policy appraises all files
 			owned by uid=0.
 
@@ -1612,8 +1612,7 @@ 
 			uid=0.
 
 			The "appraise_tcb" policy appraises the integrity of
-			all files owned by root. (This is the equivalent
-			of ima_appraise_tcb.)
+			all files owned by root.
 
 			The "secure_boot" policy appraises the integrity
 			of files (eg. kexec kernel image, kernel modules,