From 75909cc7e48d6ebfa7c61bee1b089dd4e1ba0b5f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= Date: Thu, 28 Jan 2021 20:38:27 +0100 Subject: man: various typos and other small issues Fixes #18397. --- man/systemd-dissect.xml | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-) (limited to 'man/systemd-dissect.xml') diff --git a/man/systemd-dissect.xml b/man/systemd-dissect.xml index fd55fd0bfb..caaf68dcae 100644 --- a/man/systemd-dissect.xml +++ b/man/systemd-dissect.xml @@ -207,7 +207,7 @@ Takes one of disabled, loop, all, crypto. If disabled the image is - accessed with empty block discarding turned off. if loop discarding is enabled if + accessed with empty block discarding turned off. If loop discarding is enabled if operating on a regular file. If crypt discarding is enabled even on encrypted file systems. If all discarding is unconditionally enabled. @@ -217,15 +217,16 @@ - Configure various aspects of Verity data integrity for the OS - image. expects a hex-encoding top-level Verity hash to use for setting - up the Verity integrity protection. expects the path to a file - containing a PKCS#7 signature file for the hash. This signature is passed to the kernel during - activation, which will match it against signature keys available in the kernel - keyring. expects the path to a file with the Verity data to use for - the OS image, in case it is stored in a detached file. It is recommended to embed the Verity data - directly in the image, using the Verity mechanisms in the Discoverable Partitions Specification. + Configure various aspects of Verity data integrity for the OS image. Option + specifies a hex-encoded top-level Verity hash to use for setting up the + Verity integrity protection. Option specifies the path to a file + containing a PKCS#7 signature for the hash. This signature is passed to the kernel during activation, + which will match it against signature keys available in the kernel keyring. Option + specifies a path to a file with the Verity data to use for the OS + image, in case it is stored in a detached file. It is recommended to embed the Verity data directly + in the image, using the Verity mechanisms in the Discoverable Partitions Specification. + -- cgit v1.2.1