summaryrefslogtreecommitdiffstats
path: root/man
diff options
context:
space:
mode:
authorDavid Tardon <dtardon@redhat.com>2023-12-23 18:33:12 +0100
committerDavid Tardon <dtardon@redhat.com>2023-12-25 10:00:43 +0100
commitee5bf48f7df5b307c9803ad396df3ce2b491a84e (patch)
tree21cd1db994682476923a74dea134dfd9be8af317 /man
parentman: use better-fitting markup (diff)
downloadsystemd-ee5bf48f7df5b307c9803ad396df3ce2b491a84e.tar.xz
systemd-ee5bf48f7df5b307c9803ad396df3ce2b491a84e.zip
man: sprinkle some more markup around
Diffstat (limited to 'man')
-rw-r--r--man/veritytab.xml18
1 files changed, 9 insertions, 9 deletions
diff --git a/man/veritytab.xml b/man/veritytab.xml
index bdeaebe02c..317daec8ae 100644
--- a/man/veritytab.xml
+++ b/man/veritytab.xml
@@ -41,17 +41,17 @@ This is based on crypttab(5).
verity protected block device. Fields are delimited by
white space.</para>
- <para>Each line is in the form<programlisting><replaceable>volume-name</replaceable> <replaceable>data-device</replaceable> <replaceable>hash-device</replaceable> <replaceable>roothash</replaceable> <replaceable>options</replaceable></programlisting>
+ <para>Each line is in the form<programlisting><replaceable>volume-name</replaceable> <replaceable>data-device</replaceable> <replaceable>hash-device</replaceable> <replaceable>roothash</replaceable> <optional><replaceable>options</replaceable></optional></programlisting>
The first four fields are mandatory, the remaining one is optional.</para>
<para>The first field contains the name of the resulting verity volume; its block device is set up
below <filename>/dev/mapper/</filename>.</para>
<para>The second field contains a path to the underlying block data device, or a specification of a block device via
- <varname>UUID=</varname> followed by the UUID.</para>
+ <varname>UUID=</varname> followed by the <replaceable>UUID</replaceable>.</para>
<para>The third field contains a path to the underlying block hash device, or a specification of a block device via
- <varname>UUID=</varname> followed by the UUID.</para>
+ <varname>UUID=</varname> followed by the <replaceable>UUID</replaceable>.</para>
<para>The fourth field is the <replaceable>roothash</replaceable> in hexadecimal.</para>
@@ -71,7 +71,7 @@ This is based on crypttab(5).
<varlistentry>
<term><option>format=<replaceable>NUMBER</replaceable></option></term>
- <listitem><para>Specifies the hash version type. Format type 0 is original Chrome OS version. Format type 1 is
+ <listitem><para>Specifies the hash version type. Format type <literal>0</literal> is original Chrome OS version. Format type <literal>1</literal> is
modern version.</para>
<xi:include href="version-info.xml" xpointer="v254"/></listitem>
@@ -125,8 +125,8 @@ This is based on crypttab(5).
<varlistentry>
<term><option>uuid=<replaceable>UUID</replaceable></option></term>
- <listitem><para>Use the provided UUID for format command instead of generating new one. The UUID must be
- provided in standard UUID format, e.g. 12345678-1234-1234-1234-123456789abc.</para>
+ <listitem><para>Use the provided <replaceable>UUID</replaceable> for format command instead of generating new one. The <replaceable>UUID</replaceable> must be
+ provided in standard <acronym>UUID</acronym> format, e.g. <literal>12345678-1234-1234-1234-123456789abc</literal>.</para>
<xi:include href="version-info.xml" xpointer="v254"/></listitem>
</varlistentry>
@@ -137,7 +137,7 @@ This is based on crypttab(5).
<term><option>panic-on-corruption</option></term>
<listitem><para>Defines what to do if a data verity problem is detected (data corruption). Without these
- options kernel fails the IO operation with I/O error. With <option>--ignore-corruption</option> option the
+ options kernel fails the <acronym>IO</acronym> operation with <acronym>I/O</acronym> error. With <option>--ignore-corruption</option> option the
corruption is only logged. With <option>--restart-on-corruption</option> or
<option>--panic-on-corruption</option> the kernel is restarted (panicked) immediately.
@@ -183,7 +183,7 @@ This is based on crypttab(5).
<varlistentry>
<term><option>fec-device=<replaceable>PATH</replaceable></option></term>
- <listitem><para>Use forward error correction (FEC) to recover from corruption if hash verification fails. Use
+ <listitem><para>Use forward error correction (<acronym>FEC</acronym>) to recover from corruption if hash verification fails. Use
encoding data from the specified device. The fec device argument can be block device or file image. For format,
if fec device path doesn't exist, it will be created as file. Note: block sizes for data and hash devices must
match. Also, if the verity data_device is encrypted the fec_device should be too.</para>
@@ -194,7 +194,7 @@ This is based on crypttab(5).
<varlistentry>
<term><option>fec-offset=<replaceable>BYTES</replaceable></option></term>
- <listitem><para>This is the offset, in bytes, from the start of the FEC device to the beginning of the encoding
+ <listitem><para>This is the offset, in bytes, from the start of the <acronym>FEC</acronym> device to the beginning of the encoding
data. (Aligned on 512 bytes.)</para>
<xi:include href="version-info.xml" xpointer="v254"/></listitem>