From: Yu Watanabe Date: Tue, 26 Nov 2024 13:29:36 +0000 (+0900) Subject: man: several more assorted fixes X-Git-Tag: v257-rc3~18 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=f29a07f3fce339a18883e6a8949c9181bf0e4e58;p=thirdparty%2Fsystemd.git man: several more assorted fixes Continuation of 4ebbb5bfe88ac3d793c395472648660c33251546. Closes #35307. --- diff --git a/man/importctl.xml b/man/importctl.xml index 2b2f717366d..8a7aecf5182 100644 --- a/man/importctl.xml +++ b/man/importctl.xml @@ -128,7 +128,8 @@ If is specified the image will be downloaded and stored in a read-only subvolume/directory in the image directory that is named after the specified URL and its - HTTP etag. A writable snapshot is then taken from this subvolume, and named after the specified local + HTTP etag (see HTTP ETag for more + information). A writable snapshot is then taken from this subvolume, and named after the specified local name. This behavior ensures that creating multiple instances of the same URL is efficient, as multiple downloads are not necessary. In order to create only the read-only image, and avoid creating its writable snapshot, specify - as local name. diff --git a/man/pam_systemd_loadkey.xml b/man/pam_systemd_loadkey.xml index 962a95bc5a1..c19ed9cd0dd 100644 --- a/man/pam_systemd_loadkey.xml +++ b/man/pam_systemd_loadkey.xml @@ -28,7 +28,9 @@ Description pam_systemd_loadkey reads a NUL-separated password list from the kernel keyring, - and sets the last password in the list as the PAM authtok. + and sets the last password in the list as the PAM authtok, which can be used by e.g. + pam_get_authtok3. + The password list is supposed to be stored in the "user" keyring of the root user, by an earlier call to diff --git a/man/run0.xml b/man/run0.xml index 6de84aa2b27..1c42d46baa9 100644 --- a/man/run0.xml +++ b/man/run0.xml @@ -61,7 +61,10 @@ systemd-run0 PAM stack. Note that run0 is implemented as an alternative multi-call invocation of - systemd-run1. + systemd-run1. That is, + run0 is a symbolic link to systemd-run executable file, and it + behaves as run0 if it is invoked through the symbolic link, otherwise behaves as + systemd-run. diff --git a/man/systemd-rfkill.service.xml b/man/systemd-rfkill.service.xml index 9074ddcf17a..84f6f2daba4 100644 --- a/man/systemd-rfkill.service.xml +++ b/man/systemd-rfkill.service.xml @@ -41,8 +41,10 @@ Kernel Command Line - systemd-rfkill understands the - following kernel command line parameter: + + systemd-rfkill understands the following kernel command line parameter. See also + kernel-command-line7. + diff --git a/man/ukify.xml b/man/ukify.xml index 2614e0de36f..c634e0bdee9 100644 --- a/man/ukify.xml +++ b/man/ukify.xml @@ -394,9 +394,9 @@ SBAT metadata associated with the UKI or addon. SBAT policies are useful to revoke whole groups of UKIs or addons with a single, static policy update that does not take space in DBX/MOKX. If not specified manually, a default metadata entry consisting of - uki,1,UKI,uki,1,https://uapi-group.org/specifications/specs/unified_kernel_image/ + uki,1,UKI,uki,1,https://uapi-group.org/specifications/specs/unified_kernel_image/ for UKIs and - uki-addon,1,UKI Addon,addon,1,https://www.freedesktop.org/software/systemd/man/latest/systemd-stub.html + uki-addon,1,UKI Addon,addon,1,https://www.freedesktop.org/software/systemd/man/latest/systemd-stub.html for addons will be used, to ensure it is always possible to revoke them. For more information on SBAT see Shim documentation.