X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fsystemd-cryptsetup-generator.xml;h=c8753cef37dff7a88214fe98e25f9863750d2803;hb=dfd1520d3ab98cfa376f2d84ed1e7887d013720d;hp=49d4d5545b810a683c57e24481eca4b53cae72d2;hpb=bb31a4ac1997c189a344caf554f34c6aabc71aa7;p=elogind.git
diff --git a/man/systemd-cryptsetup-generator.xml b/man/systemd-cryptsetup-generator.xml
index 49d4d5545..c8753cef3 100644
--- a/man/systemd-cryptsetup-generator.xml
+++ b/man/systemd-cryptsetup-generator.xml
@@ -19,7 +19,7 @@
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see .
-->
-
+
systemd-cryptsetup-generator
@@ -72,7 +72,7 @@
systemd-cryptsetup-generator understands
the following kernel command line parameters:
-
+
luks=
rd.luks=
@@ -80,7 +80,7 @@
Takes a boolean
argument. Defaults to
yes. If
- no disables the
+ no, disables the
generator
entirely. rd.luks=
is honored only by initial RAM disk
@@ -97,7 +97,7 @@
Takes a boolean
argument. Defaults to
yes. If
- no causes the
+ no, causes the
generator to ignore any devices
configured in
/etc/crypttab
@@ -115,12 +115,12 @@
luks.uuid=
rd.luks.uuid=
- Takes a LUKS super
- block UUID as argument. This will
+ Takes a LUKS superblock
+ UUID as argument. This will
activate the specified device as part
of the boot process as if it was
listed in
- /etc/fstab. This
+ /etc/crypttab. This
option may be specified more than once
in order to set up multiple
devices. rd.luks.uuid=
@@ -128,7 +128,79 @@
(initrd) while
luks.uuid= is
honored by both the main system and
- the initrd.
+ the initrd.
+ If /etc/crypttab contains entries with
+ the same UUID, then the name, keyfile and options
+ specified there will be used. Otherwise the device
+ will have the name luks-UUID.
+ If /etc/crypttab exists, only those UUIDs
+ specified on the kernel command line
+ will be activated in the initrd or the real root.
+
+
+
+
+ luks.name=
+ rd.luks.name=
+
+ Takes a LUKS super
+ block UUID followed by an '=' and a name. This implies
+ rd.luks.uuid= or luks.uuid=
+ and will additionally make the LUKS device given by
+ the UUID appear under the provided name.
+
+ rd.luks.name=
+ is honored only by initial RAM disk
+ (initrd) while
+ luks.name= is
+ honored by both the main system and
+ the initrd.
+
+
+
+
+ luks.options=
+ rd.luks.options=
+
+ Takes a LUKS super
+ block UUID followed by an '=' and a string
+ of options separated by commas as argument.
+ This will override the options for the given
+ UUID.
+ If only a list of options, without an
+ UUID, is specified, they apply to any UUIDs not
+ specified elsewhere, and without an entry in
+ /etc/crypttab.
+ rd.luks.options=
+ is honored only by initial RAM disk
+ (initrd) while
+ luks.options= is
+ honored by both the main system and
+ the initrd.
+
+
+
+
+ luks.key=
+ rd.luks.key=
+
+ Takes a password file name as argument or
+ a LUKS super block UUID followed by a '=' and a password
+ file name.
+
+ For those entries specified with
+ rd.luks.uuid= or luks.uuid=,
+ the password file will be set to the one specified by
+ rd.luks.key= or luks.key=
+ of the corresponding UUID, or the password file that was specified
+ without a UUID.
+ rd.luks.key=
+ is honored only by initial RAM disk
+ (initrd) while
+ luks.key= is
+ honored by both the main system and
+ the initrd.
+