and it also speeds up the time required for
.BR mke2fs (8)
to create the file system.
+.TP
+.B verity
+.br
+Enables support for verity protected files. Verity files are readonly,
+and their data is transparently verified against a Merkle tree hidden
+past the end of the file. Using the Merkle tree's root hash, a verity
+file can be efficiently authenticated, independent of the file's size.
+.IP
+This feature is most useful for authenticating important read-only files
+on read-write file systems. If the file system itself is read-only,
+then using dm-verity to authenticate the entire block device may provide
+much better security.
.SH MOUNT OPTIONS
This section describes mount options which are specific to ext2, ext3,
and ext4. Other generic mount options may be used as well; see
ext4, 4.13
.IP "\fBcasefold\fR" 2i
ext4, 5.2
+.IP "\fBverity\fR" 2i
+ext4, 5.4
.SH SEE ALSO
.BR mke2fs (8),
.BR mke2fs.conf (5),