From 9a311429977daab43aa97b702e8f59337ff29f9b Mon Sep 17 00:00:00 2001 From: Theo Ouzhinski Date: Sat, 8 Jun 2019 17:43:59 -0400 Subject: man/systemd-veritysetup-generator: Fix grammar --- man/systemd-veritysetup-generator.xml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'man/systemd-veritysetup-generator.xml') diff --git a/man/systemd-veritysetup-generator.xml b/man/systemd-veritysetup-generator.xml index 305dda4b8e..bcacd59cf9 100644 --- a/man/systemd-veritysetup-generator.xml +++ b/man/systemd-veritysetup-generator.xml @@ -28,12 +28,12 @@ Description systemd-veritysetup-generator is a generator that translates kernel command line options - configuring integrity protected block devices (verity) into native systemd units early at boot and when + configuring integrity-protected block devices (verity) into native systemd units early at boot and when configuration of the system manager is reloaded. This will create systemd-veritysetup@.service8 units as necessary. - Currently, only a single verity device may be se up with this generator, backing the root file system of the + Currently, only a single verity device may be set up with this generator, backing the root file system of the OS. systemd-veritysetup-generator implements @@ -61,7 +61,7 @@ roothash= Takes a root hash value for the root file system. Expects a hash value formatted in hexadecimal - characters, of the appropriate length (i.e. most likely 256 bit/64 characters, or longer). If not specified via + characters of the appropriate length (i.e. most likely 256 bit/64 characters, or longer). If not specified via systemd.verity_root_data= and systemd.verity_root_hash=, the hash and data devices to use are automatically derived from the specified hash value. Specifically, the data partition device is looked for under a GPT partition UUID derived from the first 128bit of the root hash, the hash @@ -75,8 +75,8 @@ systemd.verity_root_data= systemd.verity_root_hash= - These two settings take block device paths as arguments, and may be use to explicitly configure - the data partition and hash partition to use for setting up the integrity protection for the root file + These two settings take block device paths as arguments and may be used to explicitly + configure the data partition and hash partition to use for setting up the integrity protection for the root file system. If not specified, these paths are automatically derived from the roothash= argument (see above). -- cgit v1.2.1