diff --git a/man/systemd-stub.xml b/man/systemd-stub.xml
index 184b10bc883fa..6e853336c224f 100644
--- a/man/systemd-stub.xml
+++ b/man/systemd-stub.xml
@@ -55,38 +55,37 @@
- The ELF Linux kernel images will be looked for in the .linux PE
- section of the executed image.
+ A .linux section with the ELF Linux kernel image.
- OS release information, i.e. the
- os-release5 file of
- the OS the kernel belongs to, in the .osrel PE section.
+ An .osrel section with OS release information, i.e. the contents of
+ the os-release5 file
+ of the OS the kernel belongs to.
- The kernel command line to pass to the invoked kernel will be looked for in the
- .cmdline PE section.
+ A .cmdline section with the kernel command line to pass to the
+ invoked kernel.
- The initrd will be loaded from the .initrd PE
- section.
+ An .initrd section with the initrd.
- A boot splash (in Windows .BMP format) to show on screen before
- invoking the kernel will be looked for in the .splash PE section.
+ A .splash section with an image (in the Windows
+ .BMP format) to show on screen before invoking the kernel.
- A compiled binary DeviceTree will be looked for in the .dtb PE
- section.
+ A .dtb section with a compiled binary DeviceTree.
- Kernel version information, i.e. the output of uname -r for the
- kernel included in the UKI, in the .uname PE section.
+ A .uname section with the kernel version information, i.e. the
+ output of uname -r for the kernel included in the .linux
+ section.
- SBAT revocation
- metadata, in the .sbat PE section.
+ An .sbat section with
+ SBAT revocation
+ metadata.
- A set of cryptographic signatures for expected TPM2 PCR values when this kernel is
- booted, in JSON format, in the .pcrsig section. This is useful for implementing TPM2
- policies that bind disk encryption and similar to kernels that are signed by a specific
- key.
+ A .pcrsig section with a set of cryptographic signatures for the
+ expected TPM2 PCR values after the kernel has been booted, in JSON format. This is useful for
+ implementing TPM2 policies that bind disk encryption and similar to kernels that are signed by a
+ specific key.
- A public key in PEM format matching this TPM2 PCR signature data in the
- .pcrpkey section.
+ A .pcrpkey section with a public key in the PEM format matching the
+ signature data in the the .pcrsig section.
If UEFI SecureBoot is enabled and the .cmdline section is present in the executed
@@ -100,15 +99,14 @@
DeviceTree in the corresponding EFI configuration table. systemd-stub will ask the firmware via the
EFI_DT_FIXUP_PROTOCOL for hardware specific fixups to the DeviceTree.
- The contents of seven of these eight PE sections are measured into TPM PCR 11, that is otherwise
- not used. Thus, it can be pre-calculated without too much effort. The .pcrsig section
- is not included in this PCR measurement, since it's supposed to contain signatures for the expected
- results for these measurements, i.e. of the outputs of the measurement operation, and thus cannot also be
- input to it.
+ The contents of eight of these nine sections are measured into TPM PCR 11. It is otherwise not used
+ and thus the result can be pre-calculated without too much effort. The .pcrsig section
+ is not included in this PCR measurement, since it is supposed to contain signatures for the output of the
+ measurement operation, and thus cannot also be input to it.
- When .pcrsig and/or .pcrpkey are present in a unified kernel
- image their contents are passed to the booted kernel in an synthetic initrd cpio archive that places them in the
- /.extra/tpm2-pcr-signature.json and
+ When .pcrsig and/or .pcrpkey sections are present in a
+ unified kernel image their contents are passed to the booted kernel in an synthetic initrd cpio archive
+ that places them in the /.extra/tpm2-pcr-signature.json and
/.extra/tpm2-pcr-public-key.pem files. Typically, a
tmpfiles.d5 line then
ensures they are copied into /run/systemd/tpm2-pcr-signature.json and
@@ -395,7 +393,8 @@
/
- The main initrd from the .initrd PE section of the unified kernel image.
+ The main initrd from the .initrd PE section of the unified kernel
+ image.
@@ -412,8 +411,8 @@
/.extra/global_credentials/*.cred
- Similar, credential files in the /loader/credentials/ directory
- in the file system the unified kernel image is placed in are copied into the
+ Similarly, credential files in the /loader/credentials/
+ directory in the file system the unified kernel image is placed in are copied into the
/.extra/global_credentials/ directory in the initrd execution
environment.
@@ -433,8 +432,7 @@
/.extra/tpm2-pcr-signature.json
The TPM2 PCR signature JSON object included in the .pcrsig PE
section of the unified kernel image is copied into the
- /.extra/tpm2-pcr-signature.json file in the initrd execution
- environment.
+ /.extra/tpm2-pcr-signature.json file in the initrd execution environment.
diff --git a/man/systemd-vconsole-setup.service.xml b/man/systemd-vconsole-setup.service.xml
index 614a4d48d268d..90931126db84c 100644
--- a/man/systemd-vconsole-setup.service.xml
+++ b/man/systemd-vconsole-setup.service.xml
@@ -33,7 +33,7 @@
Description
- systemd-vconsole-setup sets up and configures either all virtual consoles, or
+ systemd-vconsole-setup sets up and configures either all virtual consoles, or
— if the optional TTY parameter is provided — a specific one. When the system
is booting up, systemd-vconsole-setup.service is called by
systemd-udevd8 during
diff --git a/units/systemd-vconsole-setup.service.in b/units/systemd-vconsole-setup.service.in
index 3475d456bc918..c6c5bc9130a3f 100644
--- a/units/systemd-vconsole-setup.service.in
+++ b/units/systemd-vconsole-setup.service.in
@@ -17,6 +17,12 @@ DefaultDependencies=no
Before=sysinit.target
Before=initrd-switch-root.target shutdown.target
+# This unit will be restarted by udev whenever a new vtcon device appears or is
+# triggered. Usually that happens just a handful of times during boot, but some
+# systems may have hundreds or thousands of serial consoles connected, so let's
+# just disable the limit altogether.
+StartLimitIntervalSec=0
+
[Service]
Type=oneshot
# This service will be restarted by udev whenever a new vtcon device appears.