diff --git a/man/os-release.xml b/man/os-release.xml index 7e3e9a73a8..875ac946f0 100644 --- a/man/os-release.xml +++ b/man/os-release.xml @@ -117,7 +117,7 @@ change between the build and the deployment phases, it is possible to relax this check: if exactly one file whose name matches extension-release.* is present in this directory, and the file is tagged with a user.extension-release.strict - xattr7 set to the + xattr7 set to the string 0, it will be used instead. The rest of this document that talks about os-release should be understood @@ -499,14 +499,14 @@ VERSION_ID=32 Reading <filename>os-release</filename> in - <citerefentry><refentrytitle>sh</refentrytitle><manvolnum>1</manvolnum></citerefentry> + sh1 Reading <filename>os-release</filename> in - <citerefentry><refentrytitle>python</refentrytitle><manvolnum>1</manvolnum></citerefentry> (versions >= 3.10) + python1 (versions >= 3.10) @@ -517,7 +517,7 @@ VERSION_ID=32 Reading <filename>os-release</filename> in - <citerefentry><refentrytitle>python</refentrytitle><manvolnum>1</manvolnum></citerefentry> (any version) + python1 (any version) diff --git a/man/systemd-cryptenroll.xml b/man/systemd-cryptenroll.xml index 02f932edfb..3b235fd9c9 100644 --- a/man/systemd-cryptenroll.xml +++ b/man/systemd-cryptenroll.xml @@ -314,8 +314,8 @@ its configuration. The lockout mechanism is a global property of the TPM, systemd-cryptenroll does not control or configure the lockout mechanism. You may use tpm2-tss tools to inspect or configure the dictionary attack lockout, with - tpm2_getcap1 and - tpm2_dictionarylockout1 + tpm2_getcap1 and + tpm2_dictionarylockout1 commands, respectively. diff --git a/man/systemd-integritysetup@.service.xml b/man/systemd-integritysetup@.service.xml index ade5663c28..a47ee4af1a 100644 --- a/man/systemd-integritysetup@.service.xml +++ b/man/systemd-integritysetup@.service.xml @@ -33,8 +33,9 @@ protected block devices. It should be instantiated for each device that requires integrity protection. - At early boot and when the system manager configuration is reloaded, entries from /etc/integritytab are converted into - systemd-integritysetup@.service units by + At early boot and when the system manager configuration is reloaded, entries from + integritytab5 are + converted into systemd-integritysetup@.service units by systemd-integritysetup-generator8. systemd-integritysetup@.service calls systemd-integritysetup. @@ -57,7 +58,7 @@ Create a block device volume using device. See - systemd-integritytab5 + integritytab5 and Kernel dm-integrity documentation for details. diff --git a/man/systemd-run.xml b/man/systemd-run.xml index 66ac26c5f8..ab1fb82567 100644 --- a/man/systemd-run.xml +++ b/man/systemd-run.xml @@ -479,7 +479,7 @@ Dec 08 20:44:48 container systemd[1]: Started /bin/touch /tmp/foo. Allowing access to the tty - The following command invokes bash1 + The following command invokes bash1 as a service passing its standard input, output and error to the calling TTY. # systemd-run -t --send-sighup bash diff --git a/man/systemd-stub.xml b/man/systemd-stub.xml index f2d3b91e20..3a8fc925d7 100644 --- a/man/systemd-stub.xml +++ b/man/systemd-stub.xml @@ -178,7 +178,7 @@ Assembling Kernel Images In order to assemble an UEFI PE kernel image from various components as described above, use an - objcopy1 command line + objcopy1 command line like this: objcopy \ @@ -196,7 +196,7 @@ UEFI boot stub. To then sign the resulting image for UEFI SecureBoot use an - sbsign1 command like + sbsign1 command like the following: sbsign \ @@ -219,8 +219,8 @@ systemd-sysext8, Boot Loader Specification, Boot Loader Interface, - objcopy1, - sbsign1 + objcopy1, + sbsign1 diff --git a/man/systemd-sysusers.xml b/man/systemd-sysusers.xml index 3ad8135dcd..7da7b18dcf 100644 --- a/man/systemd-sysusers.xml +++ b/man/systemd-sysusers.xml @@ -184,7 +184,7 @@ for the first time, it may not be used for changing the password or shell of an account that already exists. - Use mkpasswd1 + Use mkpasswd1 for generating UNIX password hashes from the command line. @@ -202,7 +202,7 @@ sysusers.d5, Users, Groups, UIDs and GIDs on systemd systems, systemd.exec1, - mkpasswd1 + mkpasswd1 diff --git a/man/systemd.netdev.xml b/man/systemd.netdev.xml index 0ba3c85521..ace1dc6336 100644 --- a/man/systemd.netdev.xml +++ b/man/systemd.netdev.xml @@ -2134,7 +2134,7 @@ RoutingAlgorithm= This can be either batman-v or batman-iv and describes which routing_algo - of batctl8 to use. The algorithm + of batctl8 to use. The algorithm cannot be changed after interface creation. Defaults to batman-v. diff --git a/man/udevadm.xml b/man/udevadm.xml index 5994abde8e..b327a4ef7e 100644 --- a/man/udevadm.xml +++ b/man/udevadm.xml @@ -800,7 +800,7 @@ does not probe a block device while changes are made to it, for example partitions created or file systems formatted. Note that many tools that interface with block devices natively support taking relevant locks, see for example - sfdisk8's + sfdisk8's switch. The command expects at least one block device specified via or