diff --git a/docs/zh/server/maintenance/syscare/using_syscare.md b/docs/zh/server/maintenance/syscare/using_syscare.md index b5a07c42b45490ba778ccee9afff70a9c9b45468..ede14f2780d7bbc0e7f7575a352680253b44bddf 100644 --- a/docs/zh/server/maintenance/syscare/using_syscare.md +++ b/docs/zh/server/maintenance/syscare/using_syscare.md @@ -38,7 +38,7 @@ ```shell syscare build \ - --patch_name HP001 \ + --patch-name HP001 \ --source kernel-5.10.0-60.66.0.91.oe2203.src.rpm \ --debuginfo kernel-debuginfo-5.10.0-60.66.0.91.oe2203.x86_64.rpm \ --output output \ @@ -85,21 +85,21 @@ ```shell USAGE: - syscare build [OPTIONS] --patch_name --source --debuginfo ... --patch ... + syscare build [OPTIONS] --patch-name --source ... --debuginfo ... --patch ... OPTIONS: - -n, --patch_name Patch name - --patch_arch Patch architecture [default: x86_64] - --patch_version Patch version [default: 1] - --patch_release Patch release [default: 1] - --patch_description Patch description [default: (none)] + -n, --patch-name Patch name + --patch-arch Patch architecture [default: x86_64] + --patch-version Patch version [default: 1] + --patch-release Patch release [default: 1] + --patch-description Patch description [default: (none)] -s, --source Source package -d, --debuginfo ... Debuginfo package(s) --workdir Working directory [default: .] -o, --output Output directory [default: .] -j, --jobs Parllel build jobs [default: 96] - --skip_compiler_check Skip compiler version check (not recommended) - --skip_cleanup Skip post-build cleanup + --skip-compiler-check Skip compiler version check (not recommended) + --skip-cleanup Skip post-build cleanup -v, --verbose Provide more detailed info -p, --patch ... Patch file(s) -h, --help Prints help information @@ -108,11 +108,11 @@ OPTIONS: |名称|描述|类型|备注| | ---- | ---- | ---- | ---- | -|-n, --patch_name ``|补丁名称|字符串|必选参数,需符合RPM命名规范| -|--patch_arch ``|补丁架构|字符串|默认为当前架构,需符合RPM命名规范| -|--patch_version ``|补丁版本号|字符串|默认值为1,需符合RPM命名规范| -|--patch_release ``|补丁release|数字|默认值为1,需符合RPM命名规范| -|--patch_description ``|补丁描述|字符串|默认为(none)| +|-n, --patch-name ``|补丁名称|字符串|必选参数,需符合RPM命名规范| +|--patch-arch ``|补丁架构|字符串|默认为当前架构,需符合RPM命名规范| +|--patch-version ``|补丁版本号|字符串|默认值为1,需符合RPM命名规范| +|--patch-release ``|补丁release|数字|默认值为1,需符合RPM命名规范| +|--patch-description ``|补丁描述|字符串|默认为(none)| |-s, --source ``|目标软件src.rpm源码包路径|字符串|必选参数,需为合法路径| |-d, --debuginfo `...`|目标软件debuginfo包路径|字符串|必选参数,可指定多个,需为合法路径| |--workdir ``|临时文件夹路径|字符串|默认为当前执行目录,需为合法路径| @@ -129,8 +129,8 @@ OPTIONS: ```shell syscare build \ - --patch_name "HP001" \ - --patch_description "CVE-2021-32675 - When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authentication requests, this vulnerability can also be exploited by unauthenticated users." \ + --patch-name "HP001" \ + --patch-description "CVE-2021-32675 - When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authentication requests, this vulnerability can also be exploited by unauthenticated users." \ --source ./redis-6.2.5-1.src.rpm \ --debuginfo ./redis-debuginfo-6.2.5-1.x86_64.rpm \ --output ./output \