From: David Tardon Date: Sat, 23 Dec 2023 17:33:12 +0000 (+0100) Subject: man: sprinkle some more markup around X-Git-Tag: v256-rc1~1390^2~3 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ee5bf48f7df5b307c9803ad396df3ce2b491a84e;p=thirdparty%2Fsystemd.git man: sprinkle some more markup around --- diff --git a/man/veritytab.xml b/man/veritytab.xml index bdeaebe02c0..317daec8aed 100644 --- a/man/veritytab.xml +++ b/man/veritytab.xml @@ -41,17 +41,17 @@ This is based on crypttab(5). verity protected block device. Fields are delimited by white space. - Each line is in the formvolume-name data-device hash-device roothash options + Each line is in the formvolume-name data-device hash-device roothash options The first four fields are mandatory, the remaining one is optional. The first field contains the name of the resulting verity volume; its block device is set up below /dev/mapper/. The second field contains a path to the underlying block data device, or a specification of a block device via - UUID= followed by the UUID. + UUID= followed by the UUID. The third field contains a path to the underlying block hash device, or a specification of a block device via - UUID= followed by the UUID. + UUID= followed by the UUID. The fourth field is the roothash in hexadecimal. @@ -71,7 +71,7 @@ This is based on crypttab(5). - Specifies the hash version type. Format type 0 is original Chrome OS version. Format type 1 is + Specifies the hash version type. Format type 0 is original Chrome OS version. Format type 1 is modern version. @@ -125,8 +125,8 @@ This is based on crypttab(5). - Use the provided UUID for format command instead of generating new one. The UUID must be - provided in standard UUID format, e.g. 12345678-1234-1234-1234-123456789abc. + Use the provided UUID for format command instead of generating new one. The UUID must be + provided in standard UUID format, e.g. 12345678-1234-1234-1234-123456789abc. @@ -137,7 +137,7 @@ This is based on crypttab(5). Defines what to do if a data verity problem is detected (data corruption). Without these - options kernel fails the IO operation with I/O error. With option the + options kernel fails the IO operation with I/O error. With option the corruption is only logged. With or the kernel is restarted (panicked) immediately. @@ -183,7 +183,7 @@ This is based on crypttab(5). - Use forward error correction (FEC) to recover from corruption if hash verification fails. Use + Use forward error correction (FEC) to recover from corruption if hash verification fails. Use encoding data from the specified device. The fec device argument can be block device or file image. For format, if fec device path doesn't exist, it will be created as file. Note: block sizes for data and hash devices must match. Also, if the verity data_device is encrypted the fec_device should be too. @@ -194,7 +194,7 @@ This is based on crypttab(5). - This is the offset, in bytes, from the start of the FEC device to the beginning of the encoding + This is the offset, in bytes, from the start of the FEC device to the beginning of the encoding data. (Aligned on 512 bytes.)