X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsystemd-cryptsetup-generator.xml;h=c8753cef37dff7a88214fe98e25f9863750d2803;hp=49d4d5545b810a683c57e24481eca4b53cae72d2;hb=baade8cc237c37bd8905d86ec6e9c7872d4abe03;hpb=bb31a4ac1997c189a344caf554f34c6aabc71aa7 diff --git a/man/systemd-cryptsetup-generator.xml b/man/systemd-cryptsetup-generator.xml index 49d4d5545..c8753cef3 100644 --- a/man/systemd-cryptsetup-generator.xml +++ b/man/systemd-cryptsetup-generator.xml @@ -19,7 +19,7 @@ You should have received a copy of the GNU Lesser General Public License along with systemd; If not, see . --> - + systemd-cryptsetup-generator @@ -72,7 +72,7 @@ systemd-cryptsetup-generator understands the following kernel command line parameters: - + luks= rd.luks= @@ -80,7 +80,7 @@ Takes a boolean argument. Defaults to yes. If - no disables the + no, disables the generator entirely. rd.luks= is honored only by initial RAM disk @@ -97,7 +97,7 @@ Takes a boolean argument. Defaults to yes. If - no causes the + no, causes the generator to ignore any devices configured in /etc/crypttab @@ -115,12 +115,12 @@ luks.uuid= rd.luks.uuid= - Takes a LUKS super - block UUID as argument. This will + Takes a LUKS superblock + UUID as argument. This will activate the specified device as part of the boot process as if it was listed in - /etc/fstab. This + /etc/crypttab. This option may be specified more than once in order to set up multiple devices. rd.luks.uuid= @@ -128,7 +128,79 @@ (initrd) while luks.uuid= is honored by both the main system and - the initrd. + the initrd. + If /etc/crypttab contains entries with + the same UUID, then the name, keyfile and options + specified there will be used. Otherwise the device + will have the name luks-UUID. + If /etc/crypttab exists, only those UUIDs + specified on the kernel command line + will be activated in the initrd or the real root. + + + + + luks.name= + rd.luks.name= + + Takes a LUKS super + block UUID followed by an '=' and a name. This implies + rd.luks.uuid= or luks.uuid= + and will additionally make the LUKS device given by + the UUID appear under the provided name. + + rd.luks.name= + is honored only by initial RAM disk + (initrd) while + luks.name= is + honored by both the main system and + the initrd. + + + + + luks.options= + rd.luks.options= + + Takes a LUKS super + block UUID followed by an '=' and a string + of options separated by commas as argument. + This will override the options for the given + UUID. + If only a list of options, without an + UUID, is specified, they apply to any UUIDs not + specified elsewhere, and without an entry in + /etc/crypttab. + rd.luks.options= + is honored only by initial RAM disk + (initrd) while + luks.options= is + honored by both the main system and + the initrd. + + + + + luks.key= + rd.luks.key= + + Takes a password file name as argument or + a LUKS super block UUID followed by a '=' and a password + file name. + + For those entries specified with + rd.luks.uuid= or luks.uuid=, + the password file will be set to the one specified by + rd.luks.key= or luks.key= + of the corresponding UUID, or the password file that was specified + without a UUID. + rd.luks.key= + is honored only by initial RAM disk + (initrd) while + luks.key= is + honored by both the main system and + the initrd. +