Skip to content

Commit eac9cb5

Browse files
committed
src/: fix formatting via vmdfmt.
1 parent ee7ff82 commit eac9cb5

File tree

2 files changed

+15
-14
lines changed

2 files changed

+15
-14
lines changed

src/config/kernel.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -82,9 +82,10 @@ initramfs.
8282
## Kernel hardening
8383

8484
Void Linux ships with some kernel security options enabled by default. This was
85-
originally provided by kernel command line arguments `slub_debug=P page_poison=1`,
86-
but since kernel series 5.3, these have been replaced with `init_on_alloc` and
87-
`init_on_free` (see [this commit](https://github.com/torvalds/linux/commit/6471384af)).
85+
originally provided by kernel command line arguments `slub_debug=P
86+
page_poison=1`, but since kernel series 5.3, these have been replaced with
87+
`init_on_alloc` and `init_on_free` (see [this
88+
commit](https://github.com/torvalds/linux/commit/6471384af)).
8889

8990
Void's kernels come with the `init_on_alloc` option enabled by default where
9091
available (i.e. `linux5.4` and greater). In most cases you should usually not
@@ -97,8 +98,8 @@ need to disable `init_on_alloc`, you can do that similarly by passing
9798
There is a chance that your existing system still has the old options enabled.
9899
They still work in newer kernels, but have a performance impact more in line
99100
with `init_on_free=1`. On older hardware this can be quite noticeable. If you
100-
are running a kernel series older than 5.4, you can keep them (or add them)
101-
for extra security at the cost of speed; otherwise you should remove them.
101+
are running a kernel series older than 5.4, you can keep them (or add them) for
102+
extra security at the cost of speed; otherwise you should remove them.
102103

103104
## Kernel modules
104105

src/installation/index.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,19 +38,19 @@ date.
3838
### Verifying images
3939

4040
Each image release's directory contains two files used to verify the image(s)
41-
you download. First, there is a `sha256sum.txt` file containing image checksums to
42-
verify the integrity of the downloaded images. Second is the `sha256sum.sig` file,
43-
used to verify the authenticity of the checksums.
41+
you download. First, there is a `sha256sum.txt` file containing image checksums
42+
to verify the integrity of the downloaded images. Second is the `sha256sum.sig`
43+
file, used to verify the authenticity of the checksums.
4444

4545
It is necessary to verify both the image's integrity and authenticity. It is,
4646
therefore, recommended that you download both files.
4747

4848
#### Verifying image integrity
4949

5050
You can verify the integrity of a downloaded file using
51-
[sha256sum(1)](https://man.voidlinux.org/sha256sum.1) with the `sha256sum.txt` file
52-
downloaded above. The following command will check the integrity of only the
53-
image(s) you have downloaded:
51+
[sha256sum(1)](https://man.voidlinux.org/sha256sum.1) with the `sha256sum.txt`
52+
file downloaded above. The following command will check the integrity of only
53+
the image(s) you have downloaded:
5454

5555
```
5656
$ sha256sum -c --ignore-missing sha256sum.txt
@@ -104,9 +104,9 @@ use it! Please alert the Void Linux team of where you got the image and how you
104104
verified it, and we will follow up on it.
105105

106106
For verification with `minisign`, it is necessary to rename the `sha256sum.sig`
107-
file to `sha256sum.txt.minisig` and remove the first line from the `.pub` release
108-
key. The following example demonstrates the verification of the `sha256sum.txt`
109-
file from the 20191109 release:
107+
file to `sha256sum.txt.minisig` and remove the first line from the `.pub`
108+
release key. The following example demonstrates the verification of the
109+
`sha256sum.txt` file from the 20191109 release:
110110

111111
```
112112
$ minisign -Vm sha256sum.txt -f -p void-release-20191109.pub

0 commit comments

Comments
 (0)