diff --git a/NEWS b/NEWS index 448260d07d..e01ab3e2d3 100644 --- a/NEWS +++ b/NEWS @@ -737,7 +737,7 @@ CHANGES WITH 250: unit skip/fail activation if the system's (or a slice's) memory/cpu/io pressure is above the configured threshold, using the kernel PSI feature. For more details see systemd.unit(5) and - https://www.kernel.org/doc/html/latest/accounting/psi.html + https://docs.kernel.org/accounting/psi.html * The combination of ProcSubset=pid and ProtectKernelTunables=yes and/or ProtectKernelLogs=yes can now be used. @@ -5332,7 +5332,7 @@ CHANGES WITH 240: a client with a Wi-Fi and Ethernet both connected to the internet). Consult the kernel documentation for details on this sysctl: - https://www.kernel.org/doc/html/latest/networking/ip-sysctl.html + https://docs.kernel.org/networking/ip-sysctl.html * The v239 change to turn on "net.ipv4.tcp_ecn" by default has been reverted. diff --git a/docs/CGROUP_DELEGATION.md b/docs/CGROUP_DELEGATION.md index 17b70fc6c0..1ead5e7906 100644 --- a/docs/CGROUP_DELEGATION.md +++ b/docs/CGROUP_DELEGATION.md @@ -24,7 +24,7 @@ container managers. Before you read on, please make sure you read the low-level kernel documentation about the -[unified cgroup hierarchy](https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html). +[unified cgroup hierarchy](https://docs.kernel.org/admin-guide/cgroup-v2.html). This document then adds in the higher-level view from systemd. This document augments the existing documentation we already have: diff --git a/hwdb.d/60-autosuspend.hwdb b/hwdb.d/60-autosuspend.hwdb index 07f7fa9344..cfb6084671 100644 --- a/hwdb.d/60-autosuspend.hwdb +++ b/hwdb.d/60-autosuspend.hwdb @@ -34,7 +34,7 @@ # the continued use of devices after a power loss (due to suspend). Disable it # if the device will loose state without a USB power session and the driver # is unable to recover the state when resuming. See -# https://www.kernel.org/doc/html/latest/driver-api/usb/persist.html +# https://docs.kernel.org/driver-api/usb/persist.html # Sort by brand, model diff --git a/man/binfmt.d.xml b/man/binfmt.d.xml index 5538b564d5..ab56460d3e 100644 --- a/man/binfmt.d.xml +++ b/man/binfmt.d.xml @@ -41,7 +41,7 @@ Configuration Format Each file contains a list of binfmt_misc kernel binary format rules. Consult the kernel's Kernel Support for + url="https://docs.kernel.org/admin-guide/binfmt-misc.html">Kernel Support for miscellaneous Binary Formats (binfmt_misc) documentation file for more information on registration of additional binary formats and how to write rules. diff --git a/man/kernel-command-line.xml b/man/kernel-command-line.xml index 96bdc72252..99464eb14a 100644 --- a/man/kernel-command-line.xml +++ b/man/kernel-command-line.xml @@ -36,7 +36,7 @@ For command line parameters understood by the kernel, please see - kernel-parameters.html + kernel-parameters.html and bootparam7. diff --git a/man/os-release.xml b/man/os-release.xml index bd2251d14b..90527228a2 100644 --- a/man/os-release.xml +++ b/man/os-release.xml @@ -87,7 +87,7 @@ <filename>/etc/initrd-release</filename> In the initrd, + url="https://docs.kernel.org/admin-guide/initrd.html">initrd, /etc/initrd-release plays the same role as os-release in the main system. Additionally, the presence of that file means that the system is in the initrd phase. /etc/os-release should be symlinked to /etc/initrd-release @@ -404,7 +404,7 @@ A lower-case string (mostly numeric, no spaces or other characters outside of 0–9, a–z, ".", "_" and "-") identifying the operating system extensions support level, to indicate which extension images are supported. See /usr/lib/extension-release.d/extension-release.IMAGE, - initrd and + initrd and systemd-sysext8) for more information. diff --git a/man/pstore.conf.xml b/man/pstore.conf.xml index ef3226c5a6..64e453b4d0 100644 --- a/man/pstore.conf.xml +++ b/man/pstore.conf.xml @@ -34,7 +34,7 @@ This file configures the behavior of systemd-pstore8, a tool for archiving the contents of the persistent storage filesystem, - pstore. + pstore. diff --git a/man/sd_bus_creds_get_pid.xml b/man/sd_bus_creds_get_pid.xml index c6468b71ef..48007f50bd 100644 --- a/man/sd_bus_creds_get_pid.xml +++ b/man/sd_bus_creds_get_pid.xml @@ -342,7 +342,7 @@ sd_bus_creds_get_cgroup() will retrieve the control group path. See Control Groups version 1. + url="https://docs.kernel.org/admin-guide/cgroup-v1/index.html">Control Groups version 1. sd_bus_creds_get_unit() will retrieve diff --git a/man/systemd-getty-generator.xml b/man/systemd-getty-generator.xml index a74d7075ef..038613d829 100644 --- a/man/systemd-getty-generator.xml +++ b/man/systemd-getty-generator.xml @@ -40,7 +40,7 @@ place, regardless of which environment the system is started in. For example, it is sufficient to redirect the kernel console with a kernel command line argument such as console= to get both kernel messages and a getty prompt on a serial TTY. See The kernel's command-line + url="https://docs.kernel.org/admin-guide/kernel-parameters.html">The kernel's command-line parameters for more information on the console= kernel parameter. systemd-getty-generator implements diff --git a/man/systemd-hibernate-resume@.service.xml b/man/systemd-hibernate-resume@.service.xml index feba12e76d..b6ae1f93de 100644 --- a/man/systemd-hibernate-resume@.service.xml +++ b/man/systemd-hibernate-resume@.service.xml @@ -35,7 +35,7 @@ systemd-hibernate-resume only supports the in-kernel hibernation implementation, see - Swap suspend. + Swap suspend. Internally, it works by writing the major:minor of specified device node to /sys/power/resume. diff --git a/man/systemd-integritysetup@.service.xml b/man/systemd-integritysetup@.service.xml index a47ee4af1a..3dca2c3b44 100644 --- a/man/systemd-integritysetup@.service.xml +++ b/man/systemd-integritysetup@.service.xml @@ -60,7 +60,7 @@ device. See integritytab5 and - + Kernel dm-integrity documentation for details. diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml index 3a390f2f25..e700864873 100644 --- a/man/systemd-nspawn.xml +++ b/man/systemd-nspawn.xml @@ -1492,7 +1492,7 @@ After=sys-subsystem-net-devices-ens1.device temporary directory on a read-only /var/ directory. For details about overlay file systems, see Overlay Filesystem. + url="https://docs.kernel.org/filesystems/overlayfs.html">Overlay Filesystem. Note that the semantics of overlay file systems are substantially different from normal file systems, in particular regarding reported device and inode information. Device and inode information may change for a file while it is being written to, and processes might see out-of-date versions of files diff --git a/man/systemd-system.conf.xml b/man/systemd-system.conf.xml index b104044cc2..3fe2cbfdea 100644 --- a/man/systemd-system.conf.xml +++ b/man/systemd-system.conf.xml @@ -263,7 +263,7 @@ on executables with setuid or setgid bits and will thus not function properly with this option enabled. Individual units cannot disable this option. - Also see No New Privileges Flag. + Also see No New Privileges Flag. diff --git a/man/systemd-veritysetup@.service.xml b/man/systemd-veritysetup@.service.xml index 0f21c2fbbf..423db91223 100644 --- a/man/systemd-veritysetup@.service.xml +++ b/man/systemd-veritysetup@.service.xml @@ -60,7 +60,7 @@ datadevice and hashdevice as the backing devices. roothash forms the root of the tree of hashes stored on hashdevice. See - + Kernel dm-verity documentation for details. diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index 557f881d9d..7e062313dc 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -293,7 +293,7 @@ /proc/. If ptraceable all processes that cannot be ptrace()'ed by a process are hidden to it. If default no restrictions on /proc/ access or visibility are made. For further details see - The /proc + The /proc Filesystem. It is generally recommended to run most system services with this option set to invisible. This option is implemented via file system namespacing, and thus cannot be used with services that shall be able to install mount points in the host file system @@ -318,7 +318,7 @@ introspection are made invisible in the /proc/ file system configured for the unit's processes. This controls the subset= mount option of the procfs instance for the unit. For further details see The /proc + url="https://docs.kernel.org/filesystems/proc.html#mount-options">The /proc Filesystem. Note that Linux exposes various kernel APIs via /proc/, which are made unavailable with this setting. Since these APIs are used frequently this option is useful only in a few, specific cases, and is not suitable for most non-trivial programs. @@ -725,7 +725,7 @@ CapabilityBoundingSet=~CAP_B CAP_C by them, systemctl show shows the original value of this setting. In case the service will be run in a new mount namespace anyway and SELinux is disabled, all file systems are mounted with MS_NOSUID flag. Also see - No New + No New Privileges Flag. @@ -1042,7 +1042,7 @@ CapabilityBoundingSet=~CAP_B CAP_C Sets the adjustment value for the Linux kernel's Out-Of-Memory (OOM) killer score for executed processes. Takes an integer between -1000 (to disable OOM killing of processes of this unit) and 1000 (to make killing of processes of this unit under memory pressure very likely). See The /proc Filesystem for + url="https://docs.kernel.org/filesystems/proc.html">The /proc Filesystem for details. If not specified defaults to the OOM score adjustment level of the service manager itself, which is normally at 0. diff --git a/man/systemd.netdev.xml b/man/systemd.netdev.xml index c6f73cfb59..7d3a4f95c8 100644 --- a/man/systemd.netdev.xml +++ b/man/systemd.netdev.xml @@ -90,7 +90,7 @@ bond - A bond device is an aggregation of all its slave devices. See Linux Ethernet Bonding Driver HOWTO for details. + A bond device is an aggregation of all its slave devices. See Linux Ethernet Bonding Driver HOWTO for details. bridge A bridge device is a software switch, and each of its slave devices and the bridge itself are ports of the switch. @@ -165,7 +165,7 @@ Media Access Control Security (MACsec) is an 802.1AE IEEE industry-standard security technology that provides secure communication for all traffic on Ethernet links. MACsec provides point-to-point security on Ethernet links between directly connected nodes and is capable of identifying and preventing most security threats. vrf - A Virtual Routing and Forwarding (VRF) interface to create separate routing and forwarding domains. + A Virtual Routing and Forwarding (VRF) interface to create separate routing and forwarding domains. vcan The virtual CAN driver (vcan). Similar to the network loopback devices, vcan offers a virtual local CAN interface. @@ -2021,7 +2021,7 @@ For more detail information see - + Linux Ethernet Bonding Driver HOWTO diff --git a/man/systemd.network.xml b/man/systemd.network.xml index 92faf1a289..eae27389ed 100644 --- a/man/systemd.network.xml +++ b/man/systemd.network.xml @@ -670,7 +670,7 @@ Table=1234 enable IP packet forwarding for the specified address family. This controls the net.ipv4.ip_forward and net.ipv6.conf.all.forwarding sysctl options of the network interface (see - IP Sysctl + IP Sysctl for details about sysctl options). Defaults to no. Note: this setting controls a global kernel option, and does so one way only: if a @@ -726,7 +726,7 @@ Table=1234 section, see below. Also see - IP Sysctl + IP Sysctl in the kernel documentation regarding accept_ra, but note that systemd's setting of 1 (i.e. true) corresponds to kernel's setting of 2. diff --git a/man/systemd.resource-control.xml b/man/systemd.resource-control.xml index 0eab70b9cb..2b545e4d93 100644 --- a/man/systemd.resource-control.xml +++ b/man/systemd.resource-control.xml @@ -102,7 +102,7 @@ Unified and Legacy Control Group Hierarchies The unified control group hierarchy is the new version of kernel control group interface, see - Control Groups v2. + Control Groups v2. Depending on the resource type, there are differences in resource control capabilities. Also, because of interface changes, some resource types have separate set of options on the unified hierarchy. @@ -145,7 +145,7 @@ application. Legacy control group hierarchy (see Control Groups version 1), + url="https://docs.kernel.org/admin-guide/cgroup-v1/">Control Groups version 1), also called cgroup-v1, doesn't allow safe delegation of controllers to unprivileged processes. If the system uses the legacy control group hierarchy, resource control is disabled for the systemd user instance, see @@ -184,8 +184,8 @@ hierarchy is used on the system. These options take an integer value and control the cpu.weight control group attribute. The allowed range is 1 to 10000. Defaults to 100. For details about this control group attribute, see Control Groups v2 - and CFS + url="https://docs.kernel.org/admin-guide/cgroup-v2.html">Control Groups v2 + and CFS Scheduler. The available CPU time is split up among all units within one slice relative to their CPU time weight. A higher weight means more CPU time, a lower weight means less. @@ -207,8 +207,8 @@ available on one CPU. Use values > 100% for allotting CPU time on more than one CPU. This controls the cpu.max attribute on the unified control group hierarchy and cpu.cfs_quota_us on legacy. For details about these control group attributes, see Control Groups v2 and CFS Bandwidth Control. + url="https://docs.kernel.org/admin-guide/cgroup-v2.html">Control Groups v2 and CFS Bandwidth Control. Setting CPUQuota= to an empty value unsets the quota. Example: CPUQuota=20% ensures that the executed processes will never get more than @@ -229,8 +229,8 @@ This controls the second field of cpu.max attribute on the unified control group hierarchy and cpu.cfs_period_us on legacy. For details about these control group attributes, see - Control Groups v2 and - CFS Scheduler. + Control Groups v2 and + CFS Scheduler. Example: CPUQuotaPeriodSec=10ms to request that the CPU quota is measured in periods of 10ms. @@ -318,7 +318,7 @@ useful in order to always inherit all of the protection afforded by ancestors. This controls the memory.min or memory.low control group attribute. For details about this control group attribute, see Memory Interface Files. + url="https://docs.kernel.org/admin-guide/cgroup-v2.html#memory-interface-files">Memory Interface Files. This setting is supported only if the unified control group hierarchy is used and disables MemoryLimit=. @@ -348,7 +348,7 @@ system. If assigned the special value infinity, no memory throttling is applied. This controls the memory.high control group attribute. For details about this control group attribute, see - Memory Interface Files. + Memory Interface Files. This setting is supported only if the unified control group hierarchy is used and disables MemoryLimit=. @@ -369,7 +369,7 @@ percentage value may be specified, which is taken relative to the installed physical memory on the system. If assigned the special value infinity, no memory limit is applied. This controls the memory.max control group attribute. For details about this control group attribute, see - Memory Interface Files. + Memory Interface Files. This setting replaces MemoryLimit=. @@ -385,7 +385,7 @@ parsed as Kilobytes, Megabytes, Gigabytes, or Terabytes (with the base 1024), respectively. If assigned the special value infinity, no swap limit is applied. This controls the memory.swap.max control group attribute. For details about this control group attribute, - see Memory Interface Files. + see Memory Interface Files. This setting is supported only if the unified control group hierarchy is used and disables MemoryLimit=. @@ -420,7 +420,7 @@ of tasks or a percentage value that is taken relative to the configured maximum number of tasks on the system. If assigned the special value infinity, no tasks limit is applied. This controls the pids.max control group attribute. For details about this control group attribute, see - Process Number Controller. + Process Number Controller. The system default for this setting may be controlled with @@ -454,7 +454,7 @@ group hierarchy is used on the system. Takes a single weight value (between 1 and 10000) to set the default block I/O weight. This controls the io.weight control group attribute, which defaults to 100. For details about this control group attribute, see IO + url="https://docs.kernel.org/admin-guide/cgroup-v2.html#io-interface-files">IO Interface Files. The available I/O bandwidth is split up among all units within one slice relative to their block I/O weight. A higher weight means more I/O bandwidth, a lower weight means less. @@ -482,7 +482,7 @@ device of the file system of the file is determined. This controls the io.weight control group attribute, which defaults to 100. Use this option multiple times to set weights for multiple devices. For details about this control group attribute, see IO Interface Files. + url="https://docs.kernel.org/admin-guide/cgroup-v2.html#io-interface-files">IO Interface Files. This setting replaces BlockIODeviceWeight= and disables settings prefixed with BlockIO or StartupBlockIO. @@ -512,7 +512,7 @@ "/dev/disk/by-path/pci-0000:00:1f.2-scsi-0:0:0:0 5M"). This controls the io.max control group attributes. Use this option multiple times to set bandwidth limits for multiple devices. For details about this control group attribute, see IO Interface Files. + url="https://docs.kernel.org/admin-guide/cgroup-v2.html#io-interface-files">IO Interface Files. These settings replace BlockIOReadBandwidth= and @@ -538,7 +538,7 @@ "/dev/disk/by-path/pci-0000:00:1f.2-scsi-0:0:0:0 1K"). This controls the io.max control group attributes. Use this option multiple times to set IOPS limits for multiple devices. For details about this control group attribute, see IO Interface Files. + url="https://docs.kernel.org/admin-guide/cgroup-v2.html#io-interface-files">IO Interface Files. These settings are supported only if the unified control group hierarchy is used and disable settings @@ -559,7 +559,7 @@ system of the file is determined. This controls the io.latency control group attribute. Use this option multiple times to set latency target for multiple devices. For details about this control group attribute, see IO Interface Files. + url="https://docs.kernel.org/admin-guide/cgroup-v2.html#io-interface-files">IO Interface Files. Implies IOAccounting=yes. @@ -743,7 +743,7 @@ Cgroup-bpf hooks in the form of BPF programs loaded to the BPF filesystem are attached with cgroup-bpf attach flags determined by the unit. For details about attachment types and flags see . - For general BPF documentation please refer to . + For general BPF documentation please refer to . The specification of BPF program consists of a type followed by a program-path with : as the separator: @@ -926,7 +926,7 @@ RestrictNetworkInterfaces=~eth1 (mknod), respectively. On cgroup-v1 this controls the devices.allow control group attribute. For details about this control group attribute, see Device Whitelist Controller. + url="https://docs.kernel.org/admin-guide/cgroup-v1/devices.html">Device Whitelist Controller. In the unified cgroup hierarchy this functionality is implemented using eBPF filtering. When access to all physical devices should be disallowed, @@ -1191,7 +1191,7 @@ DeviceAllow=/dev/loop-control Assign the specified CPU time share weight to the processes executed. These options take an integer value and control the cpu.shares control group attribute. The allowed range is 2 to 262144. Defaults to 1024. For details about this control group attribute, see CFS Scheduler. + url="https://docs.kernel.org/scheduler/sched-design-CFS.html">CFS Scheduler. The available CPU time is split up among all units within one slice relative to their CPU time share weight. @@ -1219,7 +1219,7 @@ DeviceAllow=/dev/loop-control infinity, no memory limit is applied. This controls the memory.limit_in_bytes control group attribute. For details about this control group attribute, see Memory Resource Controller. + url="https://docs.kernel.org/admin-guide/cgroup-v1/memory.html">Memory Resource Controller. Implies MemoryAccounting=yes. @@ -1250,7 +1250,7 @@ DeviceAllow=/dev/loop-control group hierarchy is used on the system. Takes a single weight value (between 10 and 1000) to set the default block I/O weight. This controls the blkio.weight control group attribute, which defaults to 500. For details about this control group attribute, see Block IO Controller. + url="https://docs.kernel.org/admin-guide/cgroup-v1/blkio-controller.html">Block IO Controller. The available I/O bandwidth is split up among all units within one slice relative to their block I/O weight. @@ -1281,7 +1281,7 @@ DeviceAllow=/dev/loop-control file system of the file is determined. This controls the blkio.weight_device control group attribute, which defaults to 1000. Use this option multiple times to set weights for multiple devices. For details about this control group attribute, see Block IO Controller. + url="https://docs.kernel.org/admin-guide/cgroup-v1/blkio-controller.html">Block IO Controller. Implies BlockIOAccounting=yes. @@ -1305,7 +1305,7 @@ DeviceAllow=/dev/loop-control blkio.throttle.read_bps_device and blkio.throttle.write_bps_device control group attributes. Use this option multiple times to set bandwidth limits for multiple devices. For details about these control group attributes, see Block IO Controller. + url="https://docs.kernel.org/admin-guide/cgroup-v1/blkio-controller.html">Block IO Controller. Implies @@ -1336,7 +1336,7 @@ DeviceAllow=/dev/loop-control systemd.special7, systemd-oomd.service8, The documentation for control groups and specific controllers in the Linux kernel: - Control Groups v2. + Control Groups v2. diff --git a/man/systemd.service.xml b/man/systemd.service.xml index b1a0501827..2c36e390f6 100644 --- a/man/systemd.service.xml +++ b/man/systemd.service.xml @@ -1103,7 +1103,7 @@ USBFunctionDescriptors= Configure the location of a file containing USB + url="https://docs.kernel.org/usb/functionfs.html">USB FunctionFS descriptors, for implementation of USB gadget functions. This is used only in conjunction with a socket unit with ListenUSBFunction= @@ -1138,7 +1138,7 @@ manager. If set to kill and one of the service's processes is killed by the OOM killer the kernel is instructed to kill all remaining processes of the service too, by setting the memory.oom.group attribute to 1; also see kernel documentation. + url="https://docs.kernel.org/admin-guide/cgroup-v2.html">kernel documentation. Defaults to the setting DefaultOOMPolicy= in diff --git a/man/systemd.socket.xml b/man/systemd.socket.xml index 749ee4102d..1f1f99800f 100644 --- a/man/systemd.socket.xml +++ b/man/systemd.socket.xml @@ -299,7 +299,7 @@ ListenUSBFunction= Specifies a USB + url="https://docs.kernel.org/usb/functionfs.html">USB FunctionFS endpoints location to listen on, for implementation of USB gadget functions. This expects an absolute file system path of a FunctionFS mount point as the argument. @@ -615,7 +615,7 @@ the security label of the FIFO, or the security label for the incoming or outgoing connections of the socket, respectively. See Smack + url="https://docs.kernel.org/admin-guide/LSM/Smack.html">Smack for details. diff --git a/man/systemd.unit.xml b/man/systemd.unit.xml index 279e6a09df..55f32f3272 100644 --- a/man/systemd.unit.xml +++ b/man/systemd.unit.xml @@ -1698,7 +1698,7 @@ limited to 10sec, 1min and 5min. The full PSI will be checked first, and if not found some will be checked. For more details, see the documentation on PSI (Pressure Stall Information) + url="https://docs.kernel.org/accounting/psi.html">PSI (Pressure Stall Information) . Optionally, the threshold value can be prefixed with the slice unit under which the pressure will be checked, diff --git a/man/systemd.xml b/man/systemd.xml index f172dcabd1..e526a1caea 100644 --- a/man/systemd.xml +++ b/man/systemd.xml @@ -210,7 +210,7 @@ Processes systemd spawns are placed in individual Linux control groups named after the unit which they belong to in the private systemd hierarchy. (see Control Groups version 1 + url="https://docs.kernel.org/admin-guide/cgroup-v1/index.html">Control Groups version 1 for more information about control groups, or short "cgroups"). systemd uses this to effectively keep track of processes. Control group information is maintained in the kernel, and is accessible @@ -915,7 +915,7 @@ When specified without an argument or with a true argument, enables the usage of - unified cgroup hierarchy + unified cgroup hierarchy (a.k.a. cgroups-v2). When specified with a false argument, fall back to hybrid or full legacy cgroup hierarchy. @@ -933,7 +933,7 @@ (see previous option). When specified without an argument or with a true argument, disables the use of "hybrid" cgroup hierarchy (i.e. a cgroups-v2 tree used for systemd, and - legacy + legacy cgroup hierarchy, a.k.a. cgroups-v1, for other controllers), and forces a full "legacy" mode. When specified with a false argument, enables the use of "hybrid" hierarchy. diff --git a/src/boot/efi/cpio.c b/src/boot/efi/cpio.c index d680b7e151..5f0f0cf686 100644 --- a/src/boot/efi/cpio.c +++ b/src/boot/efi/cpio.c @@ -71,7 +71,7 @@ static EFI_STATUS pack_cpio_one( /* Serializes one file in the cpio format understood by the kernel initrd logic. * - * See: https://www.kernel.org/doc/html/latest/driver-api/early-userspace/buffer-format.html */ + * See: https://docs.kernel.org/driver-api/early-userspace/buffer-format.html */ if (contents_size > UINT32_MAX) /* cpio cannot deal with > 32bit file sizes */ return EFI_LOAD_ERROR; diff --git a/src/boot/efi/linux_x86.c b/src/boot/efi/linux_x86.c index 358183e76d..d506070926 100644 --- a/src/boot/efi/linux_x86.c +++ b/src/boot/efi/linux_x86.c @@ -7,7 +7,7 @@ * this x86 specific linux_exec function passes the initrd by setting the * corresponding fields in the setup_header struct. * - * see https://www.kernel.org/doc/html/latest/x86/boot.html + * see https://docs.kernel.org/x86/boot.html */ #include diff --git a/src/core/dbus-unit.c b/src/core/dbus-unit.c index 34608fc091..aaa72cec80 100644 --- a/src/core/dbus-unit.c +++ b/src/core/dbus-unit.c @@ -1284,7 +1284,7 @@ static int append_cgroup(sd_bus_message *reply, const char *p, Set *pids) { pid_t pid; /* libvirt / qemu uses threaded mode and cgroup.procs cannot be read at the lower levels. - * From https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html#threads, + * From https://docs.kernel.org/admin-guide/cgroup-v2.html#threads, * “cgroup.procs” in a threaded domain cgroup contains the PIDs of all processes in * the subtree and is not readable in the subtree proper. */ r = cg_read_pid(f, &pid); diff --git a/src/home/homework.c b/src/home/homework.c index 5ba6703341..c41866cd41 100644 --- a/src/home/homework.c +++ b/src/home/homework.c @@ -274,7 +274,7 @@ int user_record_authenticate( static void drop_caches_now(void) { int r; - /* Drop file system caches now. See https://www.kernel.org/doc/html/latest/admin-guide/sysctl/vm.html + /* Drop file system caches now. See https://docs.kernel.org/admin-guide/sysctl/vm.html * for details. We write "2" into /proc/sys/vm/drop_caches to ensure dentries/inodes are flushed, but * not more. */ diff --git a/src/shared/cgroup-show.c b/src/shared/cgroup-show.c index fc1e631464..f3f97f6cac 100644 --- a/src/shared/cgroup-show.c +++ b/src/shared/cgroup-show.c @@ -105,7 +105,7 @@ static int show_cgroup_one_by_path( pid_t pid; /* libvirt / qemu uses threaded mode and cgroup.procs cannot be read at the lower levels. - * From https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html#threads, + * From https://docs.kernel.org/admin-guide/cgroup-v2.html#threads, * “cgroup.procs” in a threaded domain cgroup contains the PIDs of all processes in * the subtree and is not readable in the subtree proper. */ r = cg_read_pid(f, &pid); diff --git a/src/shared/linux/bpf.h b/src/shared/linux/bpf.h index f4009dbdf6..51309a19b3 100644 --- a/src/shared/linux/bpf.h +++ b/src/shared/linux/bpf.h @@ -473,7 +473,7 @@ union bpf_iter_link_info { * Verify and load BPF Type Format (BTF) metadata into the kernel, * returning a new file descriptor associated with the metadata. * BTF is described in more detail at - * https://www.kernel.org/doc/html/latest/bpf/btf.html. + * https://docs.kernel.org/bpf/btf.html. * * The *btf* parameter must point to valid memory providing * *btf_size* bytes of BTF binary metadata. diff --git a/src/shared/udev-util.c b/src/shared/udev-util.c index 1eb5d8fb53..5eed3d95fd 100644 --- a/src/shared/udev-util.c +++ b/src/shared/udev-util.c @@ -608,7 +608,7 @@ static int device_is_power_sink(sd_device *device) { assert(device); /* USB-C power supply device has two power roles: source or sink. See, - * https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-class-typec */ + * https://docs.kernel.org/admin-guide/abi-testing.html#abi-file-testing-sysfs-class-typec */ r = sd_device_enumerator_new(&e); if (r < 0) @@ -690,7 +690,7 @@ int on_ac_power(void) { /* We assume every power source is AC, except for batteries. See * https://github.com/torvalds/linux/blob/4eef766b7d4d88f0b984781bc1bcb574a6eafdc7/include/linux/power_supply.h#L176 * for defined power source types. Also see: - * https://www.kernel.org/doc/Documentation/ABI/testing/sysfs-class-power */ + * https://docs.kernel.org/admin-guide/abi-testing.html#abi-file-testing-sysfs-class-power */ if (streq(val, "Battery")) { log_device_debug(d, "The power supply is battery, ignoring."); continue; diff --git a/src/test/test-web-util.c b/src/test/test-web-util.c index 368ccba326..d376d4a4cd 100644 --- a/src/test/test-web-util.c +++ b/src/test/test-web-util.c @@ -8,7 +8,7 @@ TEST(is_valid_documentation_url) { assert_se(documentation_url_is_valid("https://www.freedesktop.org/wiki/Software/systemd")); assert_se(documentation_url_is_valid("https://www.kernel.org/doc/Documentation/binfmt_misc.txt")); /* dead */ assert_se(documentation_url_is_valid("https://www.kernel.org/doc/Documentation/admin-guide/binfmt-misc.rst")); - assert_se(documentation_url_is_valid("https://www.kernel.org/doc/html/latest/admin-guide/binfmt-misc.html")); + assert_se(documentation_url_is_valid("https://docs.kernel.org/admin-guide/binfmt-misc.html")); assert_se(documentation_url_is_valid("file:/foo/foo")); assert_se(documentation_url_is_valid("man:systemd.special(7)")); assert_se(documentation_url_is_valid("info:bar")); diff --git a/sysctl.d/50-default.conf b/sysctl.d/50-default.conf index f41e24bcbc..69de91a2bc 100644 --- a/sysctl.d/50-default.conf +++ b/sysctl.d/50-default.conf @@ -14,7 +14,7 @@ # System Request functionality of the kernel (SYNC) # # Use kernel.sysrq = 1 to allow all keys. -# See https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html for a list +# See https://docs.kernel.org/admin-guide/sysrq.html for a list # of values and keys. kernel.sysrq = 16 diff --git a/test/fuzz/fuzz-unit-file/proc-sys-fs-binfmt_misc.automount b/test/fuzz/fuzz-unit-file/proc-sys-fs-binfmt_misc.automount index 371469d832..8d761b01b6 100644 --- a/test/fuzz/fuzz-unit-file/proc-sys-fs-binfmt_misc.automount +++ b/test/fuzz/fuzz-unit-file/proc-sys-fs-binfmt_misc.automount @@ -10,7 +10,7 @@ automount [Unit] Description=Arbitrary Executable File Formats File System Automount Point -Documentation=https://www.kernel.org/doc/html/latest/admin-guide/binfmt-misc.html +Documentation=https://docs.kernel.org/admin-guide/binfmt-misc.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no Before=sysinit.target diff --git a/units/dev-hugepages.mount b/units/dev-hugepages.mount index 2cd4a43c4f..1a34da1285 100644 --- a/units/dev-hugepages.mount +++ b/units/dev-hugepages.mount @@ -9,7 +9,7 @@ [Unit] Description=Huge Pages File System -Documentation=https://www.kernel.org/doc/html/latest/admin-guide/mm/hugetlbpage.html +Documentation=https://docs.kernel.org/admin-guide/mm/hugetlbpage.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no Before=sysinit.target diff --git a/units/proc-sys-fs-binfmt_misc.automount b/units/proc-sys-fs-binfmt_misc.automount index 172c8757ab..6b1bbdc91e 100644 --- a/units/proc-sys-fs-binfmt_misc.automount +++ b/units/proc-sys-fs-binfmt_misc.automount @@ -9,7 +9,7 @@ [Unit] Description=Arbitrary Executable File Formats File System Automount Point -Documentation=https://www.kernel.org/doc/html/latest/admin-guide/binfmt-misc.html +Documentation=https://docs.kernel.org/admin-guide/binfmt-misc.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no Before=sysinit.target diff --git a/units/proc-sys-fs-binfmt_misc.mount b/units/proc-sys-fs-binfmt_misc.mount index 919271b3e2..88a7748cb2 100644 --- a/units/proc-sys-fs-binfmt_misc.mount +++ b/units/proc-sys-fs-binfmt_misc.mount @@ -9,7 +9,7 @@ [Unit] Description=Arbitrary Executable File Formats File System -Documentation=https://www.kernel.org/doc/html/latest/admin-guide/binfmt-misc.html +Documentation=https://docs.kernel.org/admin-guide/binfmt-misc.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no diff --git a/units/sys-fs-fuse-connections.mount b/units/sys-fs-fuse-connections.mount index 056b047194..929d8e3bf0 100644 --- a/units/sys-fs-fuse-connections.mount +++ b/units/sys-fs-fuse-connections.mount @@ -9,7 +9,7 @@ [Unit] Description=FUSE Control File System -Documentation=https://www.kernel.org/doc/html/latest/filesystems/fuse.html +Documentation=https://docs.kernel.org/filesystems/fuse.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no ConditionPathExists=/sys/fs/fuse/connections diff --git a/units/sys-kernel-config.mount b/units/sys-kernel-config.mount index d7ce88a51e..dca94a8986 100644 --- a/units/sys-kernel-config.mount +++ b/units/sys-kernel-config.mount @@ -9,7 +9,7 @@ [Unit] Description=Kernel Configuration File System -Documentation=https://www.kernel.org/doc/html/latest/filesystems/configfs.html +Documentation=https://docs.kernel.org/filesystems/configfs.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no ConditionPathExists=/sys/kernel/config diff --git a/units/sys-kernel-debug.mount b/units/sys-kernel-debug.mount index 364ee8a30c..6c77ef53c9 100644 --- a/units/sys-kernel-debug.mount +++ b/units/sys-kernel-debug.mount @@ -9,7 +9,7 @@ [Unit] Description=Kernel Debug File System -Documentation=https://www.kernel.org/doc/html/latest/filesystems/debugfs.html +Documentation=https://docs.kernel.org/filesystems/debugfs.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no ConditionPathExists=/sys/kernel/debug diff --git a/units/sys-kernel-tracing.mount b/units/sys-kernel-tracing.mount index 17ba8457f9..f3cd47fb35 100644 --- a/units/sys-kernel-tracing.mount +++ b/units/sys-kernel-tracing.mount @@ -9,7 +9,7 @@ [Unit] Description=Kernel Trace File System -Documentation=https://www.kernel.org/doc/html/latest/trace/ftrace.html +Documentation=https://docs.kernel.org/trace/ftrace.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no ConditionVirtualization=!lxc diff --git a/units/systemd-binfmt.service.in b/units/systemd-binfmt.service.in index 96f595ad72..a702c0d9d7 100644 --- a/units/systemd-binfmt.service.in +++ b/units/systemd-binfmt.service.in @@ -10,7 +10,7 @@ [Unit] Description=Set Up Additional Binary Formats Documentation=man:systemd-binfmt.service(8) man:binfmt.d(5) -Documentation=https://www.kernel.org/doc/html/latest/admin-guide/binfmt-misc.html +Documentation=https://docs.kernel.org/admin-guide/binfmt-misc.html Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no Conflicts=shutdown.target