From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ej1-f46.google.com (mail-ej1-f46.google.com [209.85.218.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 314A3268C73 for ; Sun, 14 Sep 2025 03:54:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.218.46 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757822087; cv=none; b=ck8qVnsOWquurVaqWV7bJTKgKtw3CduSjp/CcmHx18oPYdLp3UPOnIwlzBFXpvNu0nKVfBBwX0FIbkYsEj0d6ENgbLJzuI9x1ZEjoKNim/pvZQdiCWrMBsofWPV5KmAI2O9Awy4acU0+CNFsYssG3zW6QykWh/jDGCDEvGQy8cQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757822087; c=relaxed/simple; bh=z148AkYrWgRabAliJ93Wt4Z2ZD8niTFA9cUReN1NNec=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=RxsTsLNkuSnWw8h0+6LHyZcVFP1bnZjeevro1lPiBQUUQQpO9h8KVsNp09C2cx3TOt+y/y3IZoOhZQVBJsYNuL6sSvfYEXWUxo+uP3zaA91L1VJnPJ0pnxDqpJr7fUBFIbLfflz+J1Je3Hb3zixpX131POxBxsOwyhMrfKK/W8s= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=SnKvRore; arc=none smtp.client-ip=209.85.218.46 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="SnKvRore" Received: by mail-ej1-f46.google.com with SMTP id a640c23a62f3a-b00a9989633so589072466b.0 for ; Sat, 13 Sep 2025 20:54:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1757822083; x=1758426883; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=pjKVSjXysip/b5UNUwgMX+OIg9u3DNn6e0+I8Cmpn0k=; b=SnKvRoreLVbwLq3ZfOlOAtKHzJTK+2CRHD7ST4oqw6m/ZX2K/TZA22o1yNoPXi2wZ5 G7kuVImssYITwW/jgXP4hkFh2XUZ+TERnohXGu6hptn3aDrOoY98hw+QU1dhrDTt5T8k mMC8GCnLmrUP1UL8ToJv32F/LGSgjUKrOXx4232qqs1cxpwgRVRk7tE8FWchEOHHC9Tp 2SVUSHGslP+mCL9Z2UrOW6k9kv36DNY8Z2iTZPf0J8NDSEFQeGls4ACw/IuSe9ucFlYV m/I19RcmkFI3CO/PBZXuNWwi6tPZdk4wyrRTTsiUNwQ1IuWcK82Mr0pn/is7hcMyR4y2 XIhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1757822084; x=1758426884; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=pjKVSjXysip/b5UNUwgMX+OIg9u3DNn6e0+I8Cmpn0k=; b=ZhtLnju+DpF4oKhAKooGZhdACRchyOENhcwmrnUx5YltzMX0WrLPP1DWaubg38F0FG 3eFfhRFALuinokOVodfwMkWcFgX0kP0HZ4mjIW8aDKBICYvIK8toJPIf5XURxTZRuBFU FjbYsrrj0xgWb/HzSp8lXaiG4IEbdRsls1Hdl8ESu+tW994lc5k6gNTLYwtFHKkR36RK /7siW6nwXDtAHe8FqfxIVi4D8uc2vOjVc6U0iiCH+hWfYztHdnjjWxa1k3BymVOZsy5L xkPIWToOVz/qnu6dbhF6FlREPS4Lx9WUFagRMtPjnC2q4ZC3iv4P/pzsfARpmFLTNCqg o2/w== X-Forwarded-Encrypted: i=1; AJvYcCXyRsahEVu9tjGTiygYtg5L7FXtmtykzkoqIm0VzyZ86yMC+Y2ygaezyL3hfLz42lKBcbRpX9P4tJ1R@vger.kernel.org X-Gm-Message-State: AOJu0YxSoQLqj0AvyWkL8P4kC/ShICWU/+8VsMsDBq0Fc+B+WS1z7XDT ezqd43mEV+5U8Tg7E4jnxD2LbcRWLukZWzqyM90hHi0rbIFAU3Ubnwkt X-Gm-Gg: ASbGncshAJlCdE2IAPwijqXHeuUBPuXHV7gODutEitSw4IdD53+O6IEC81uS63xU12l 0Too/Mfh17NrqmxRJICMl1e8QpyWNBVqvU7A8oYPosatg0/qqr+BRjC+JmbnhyKTZtIrw/yhTjt fZT/gKLYBp4JfdhSvtn4f7MOjx0BXWLVKlewfLGdPiugsBizfka1UqDKUsTpOd6zSloEgbP10mg I6aSBDl2D41TlE6iQJbwu+tcpKVkIqEKF2N81CJ3bKexgKfRqFFJvYUZsQd4Rf2J5F1KyQGlgWm AB7I/SrqmX2XtCz1J76JbEbzGBpzvb9QCYet0vsNoo+G8ETmiOFIzB1h9+FcBxlMVoKs+G9Tj7U 2uHQ1CzH3rtWLLRUtSr5h/CGVSvCoVQ== X-Google-Smtp-Source: AGHT+IFpMpCVJeNrUipt0dZC4eBHRTy08fiFy9cwywIocPIoMawoMDT0bJrFyHi72vkPeUNRc3Oodg== X-Received: by 2002:a17:906:114e:b0:b0b:35d8:248e with SMTP id a640c23a62f3a-b0b35d8267fmr237998166b.18.1757822083468; Sat, 13 Sep 2025 20:54:43 -0700 (PDT) Received: from localhost ([212.73.77.104]) by smtp.gmail.com with UTF8SMTPSA id a640c23a62f3a-b07b32dd5a9sm665619166b.57.2025.09.13.20.54.39 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 13 Sep 2025 20:54:43 -0700 (PDT) From: Askar Safin To: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Linus Torvalds , Greg Kroah-Hartman , Christian Brauner , Al Viro , Jan Kara , Christoph Hellwig , Jens Axboe , Andy Shevchenko , Aleksa Sarai , =?UTF-8?q?Thomas=20Wei=C3=9Fschuh?= , Julian Stecklina , Gao Xiang , Art Nikpal , Andrew Morton , Eric Curtin , Alexander Graf , Rob Landley , Lennart Poettering , linux-arch@vger.kernel.org, linux-alpha@vger.kernel.org, linux-snps-arc@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-csky@vger.kernel.org, linux-hexagon@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-openrisc@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, linux-um@lists.infradead.org, x86@kernel.org, Ingo Molnar , linux-block@vger.kernel.org, initramfs@vger.kernel.org, linux-api@vger.kernel.org, linux-doc@vger.kernel.org, linux-efi@vger.kernel.org, linux-ext4@vger.kernel.org, "Theodore Y . Ts'o" , linux-acpi@vger.kernel.org, Michal Simek , devicetree@vger.kernel.org, Luis Chamberlain , Kees Cook , Thorsten Blum , Heiko Carstens , patches@lists.linux.dev Subject: [PATCH RESEND 45/62] doc: kernel-parameters: replace [RAM] with [INITRAMFS] Date: Sun, 14 Sep 2025 06:54:38 +0300 Message-ID: <20250914035438.3682240-1-safinaskar@gmail.com> X-Mailer: git-send-email 2.47.2 In-Reply-To: <20250913003842.41944-1-safinaskar@gmail.com> References: <20250913003842.41944-1-safinaskar@gmail.com> Precedence: bulk X-Mailing-List: linux-csky@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Also, do other initramfs-related edits, while we are here Signed-off-by: Askar Safin --- .../admin-guide/kernel-parameters.rst | 4 ++-- .../admin-guide/kernel-parameters.txt | 20 +++++++++---------- 2 files changed, 12 insertions(+), 12 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.rst b/Documentation/admin-guide/kernel-parameters.rst index 39d0e7ff0965..22af6bbffc35 100644 --- a/Documentation/admin-guide/kernel-parameters.rst +++ b/Documentation/admin-guide/kernel-parameters.rst @@ -123,7 +123,7 @@ is applicable:: CMA Contiguous Memory Area support is enabled. DRM Direct Rendering Management support is enabled. DYNAMIC_DEBUG Build in debug messages and enable them at runtime - EARLY Parameter processed too early to be embedded in initrd. + EARLY Parameter processed too early to be embedded in initramfs. EDD BIOS Enhanced Disk Drive Services (EDD) is enabled EFI EFI Partitioning (GPT) is enabled EVM Extended Verification Module @@ -134,6 +134,7 @@ is applicable:: HW Appropriate hardware is enabled. HYPER_V HYPERV support is enabled. IMA Integrity measurement architecture is enabled. + INITRAMFS Initramfs support is enabled. IP_PNP IP DHCP, BOOTP, or RARP is enabled. IPV6 IPv6 support is enabled. ISAPNP ISA PnP code is enabled. @@ -167,7 +168,6 @@ is applicable:: PPT Parallel port support is enabled. PS2 Appropriate PS/2 support is enabled. PV_OPS A paravirtualized kernel is enabled. - RAM RAM disk support is enabled. RDT Intel Resource Director Technology. RISCV RISCV architecture is enabled. S390 S390 architecture is enabled. diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 0805d3ebc75a..8e10abac4cc7 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -565,7 +565,7 @@ Format: integer bootconfig [KNL,EARLY] - Extended command line options can be added to an initrd + Extended command line options can be added to an initramfs and this will cause the kernel to look for it. See Documentation/admin-guide/bootconfig.rst @@ -1005,7 +1005,7 @@ may be missing from the dump. A standard crashkernel reservation, as described above, - is still needed to hold the crash kernel and initrd. + is still needed to hold the crash kernel and initramfs. This option increases the risk of a kdump failure: DMA transfers configured by the first kernel may end up @@ -2298,7 +2298,7 @@ initcall functions. Useful for debugging built-in modules and initcalls. - initramfs_async= [KNL] + initramfs_async= [INITRAMFS,KNL] Format: Default: 1 This parameter controls whether the initramfs @@ -2310,10 +2310,10 @@ unpacking being completed before device_ and late_ initcalls. - initrd= [BOOT,EARLY] Specify the location of the initial ramdisk + initrd= [BOOT,EARLY,INITRAMFS,KNL] Same as initrdmem= - initrdmem= [KNL,EARLY] Specify a physical address and size from which to - load the initrd. If an initrd is compiled in or + initrdmem= [BOOT,EARLY,INITRAMFS,KNL] Specify a physical address and size from which to + load initramfs. If initramfs is compiled in or specified in the bootparams, it takes priority over this setting. Format: ss[KMG],nn[KMG] @@ -2749,7 +2749,7 @@ between unregistering the boot console and initializing the real console. - keepinitrd [HW,ARM] See retain_initrd. + keepinitrd [HW,ARM,INITRAMFS] See retain_initrd. kernelcore= [KNL,X86,PPC,EARLY] Format: nn[KMGTPE] | nn% | "mirror" @@ -6129,8 +6129,8 @@ rdinit= [KNL] Format: - Run specified binary instead of /init from the ramdisk, - used for early userspace startup. See initrd. + Run specified binary instead of /init from initramfs, + used for early userspace startup. rdrand= [X86,EARLY] force - Override the decision by the kernel to hide the @@ -6324,7 +6324,7 @@ Useful for devices that are detected asynchronously (e.g. USB and MMC devices). - retain_initrd [RAM] Keep initrd memory after extraction. After boot, it will + retain_initrd [INITRAMFS] Keep initramfs memory after extraction. After boot, it will be accessible via /sys/firmware/initrd. retbleed= [X86] Control mitigation of RETBleed (Arbitrary -- 2.47.2