DRACUT.CMDLINE(7) | dracut | DRACUT.CMDLINE(7) |
NAME
dracut.cmdline - dracut kernel command line options
DESCRIPTION
The root device used by the kernel is specified in the boot configuration file on the kernel command line, as always.
The traditional root=/dev/sda1 style device specification is allowed, but not encouraged. The root device should better be identified by LABEL or UUID. If a label is used, as in root=LABEL=<label_of_root> the initramfs will search all available devices for a filesystem with the appropriate label, and mount that device as the root filesystem. root=UUID=<uuidnumber> will mount the partition with that UUID as the root filesystem.
In the following all kernel command line parameters, which are processed by dracut, are described.
"rd.*" parameters mentioned without "=" are boolean parameters. They can be turned on/off by setting them to {0|1}. If the assignment with "=" is missing "=1" is implied. For example rd.info can be turned off with rd.info=0 or turned on with rd.info=1 or rd.info. The last value in the kernel command line is the value, which is honored.
Standard
init=<path to real init>
root=<path to blockdevice>
Example.
root=/dev/sda1 root=/dev/disk/by-path/pci-0000:00:1f.1-scsi-0:0:1:0-part1 root=/dev/disk/by-label/Root root=LABEL=Root root=/dev/disk/by-uuid/3f5ad593-4546-4a94-a374-bcfb68aa11f7 root=UUID=3f5ad593-4546-4a94-a374-bcfb68aa11f7 root=PARTUUID=3f5ad593-4546-4a94-a374-bcfb68aa11f7
rootfstype=<filesystem type>
Example.
rootfstype=ext4
rootflags=<mount options>
ro
rw
rootfallback=<path to blockdevice>
rd.auto rd.auto=1
rd.hostonly=0
rd.cmdline=ask
rd.fstab=0
resume=<path to resume partition>
Example.
resume=/dev/disk/by-path/pci-0000:00:1f.1-scsi-0:0:1:0-part1 resume=/dev/disk/by-uuid/3f5ad593-4546-4a94-a374-bcfb68aa11f7 resume=UUID=3f5ad593-4546-4a94-a374-bcfb68aa11f7
rd.skipfsck
iso-scan/filename
Mount all mountable devices and search for ISO pointed by the argument. When the ISO is found set it up as a loop device. Device containing this ISO image will stay mounted at /run/initramfs/isoscandev. Using iso-scan/filename with a Fedora/Red Hat/CentOS Live iso should just work by copying the original kernel cmdline parameters.
Example.
menuentry 'Live Fedora 20' --class fedora --class gnu-linux --class gnu --class os { set isolabel=Fedora-Live-LXDE-x86_64-20-1 set isofile="/boot/iso/Fedora-Live-LXDE-x86_64-20-1.iso" loopback loop $isofile linux (loop)/isolinux/vmlinuz0 boot=isolinux iso-scan/filename=$isofile root=live:LABEL=$isolabel ro rd.live.image quiet rhgb initrd (loop)/isolinux/initrd0.img }
Misc
rd.emergency=[reboot|poweroff|halt]
rd.driver.blacklist=<drivername>[,<drivername>,...]
rd.driver.pre=<drivername>[,<drivername>,...]
rd.driver.post=<drivername>[,<drivername>,...]
rd.retry=<seconds>
rd.timeout=<seconds>
rd.noverifyssl
rd.ctty=<terminal device>
rd.shutdown.timeout.umount=<seconds>
Debug
If you are dropped to an emergency shell, the file /run/initramfs/rdsosreport.txt is created, which can be saved to a (to be mounted by hand) partition (usually /boot) or a USB stick. Additional debugging info can be produced by adding rd.debug to the kernel command line. /run/initramfs/rdsosreport.txt contains all logs and the output of some tools. It should be attached to any report about dracut problems.
rd.info
rd.shell
rd.debug
rd.memdebug=[0-5]
Higher level means more debugging output:
0 - no output 1 - partial /proc/meminfo 2 - /proc/meminfo 3 - /proc/meminfo + /proc/slabinfo 4 - /proc/meminfo + /proc/slabinfo + memstrack summary NOTE: memstrack is a memory tracing tool that tracks the total memory consumption, and peak memory consumption of each kernel modules and userspace progress during the whole initramfs runtime, report is generated and the end of initramsfs run. 5 - /proc/meminfo + /proc/slabinfo + memstrack (with top memory stacktrace) NOTE: memstrack (with top memory stacktrace) will print top memory allocation stack traces during the whole initramfs runtime.
rd.break
rd.break={cmdline|pre-udev|pre-trigger|initqueue|pre-mount|mount|pre-pivot|cleanup}
rd.udev.log_level={err|info|debug}
I18N
rd.vconsole.keymap=<keymap base file name>
Example.
rd.vconsole.keymap=de-latin1-nodeadkeys
rd.vconsole.keymap.ext=<list of keymap base file names>
rd.vconsole.unicode
rd.vconsole.font=<font base file name>
Example.
rd.vconsole.font=eurlatgr
rd.vconsole.font.map=<console map base file name>
rd.vconsole.font.unimap=<unicode table base file name>
rd.locale.LANG=<locale>
Example.
rd.locale.LANG=pl_PL.utf8
rd.locale.LC_ALL=<locale>
LVM
rd.lvm=0
rd.lvm.vg=<volume group name>
rd.lvm.lv=<volume group name>/<logical volume name>
rd.lvm.conf=0
crypto LUKS
rd.luks=0
rd.luks.uuid=<luks uuid>
rd.luks.allow-discards=<luks uuid>
rd.luks.allow-discards
rd.luks.crypttab=0
rd.luks.timeout=<seconds>
crypto LUKS - key on removable device support
NB: If systemd is included in the dracut initrd, dracut’s built in removable device keying support won’t work. systemd will prompt for a password from the console even if you’ve supplied rd.luks.key. You may be able to use standard systemd fstab(5) syntax to get the same effect. If you do need rd.luks.key to work, you will have to exclude the "systemd" dracut module and any modules that depend on it. See dracut.conf(5) and https://bugzilla.redhat.com/show_bug.cgi?id=905683 for more information.
rd.luks.key=<keypath>[:<keydev>[:<luksdev>]]
<keydev> identifies the device on which the key file resides. It may be the kernel name of the device (should start with "/dev/"), a UUID (prefixed with "UUID=") or a label (prefix with "LABEL="). You don’t have to specify a full UUID. Just its beginning will suffice, even if its ambiguous. All matching devices will be probed. This parameter is recommended, but not required. If it’s not present, all block devices will be probed, which may significantly increase boot time.
If <luksdev> is given, the specified key will only be used for the specified LUKS device. Possible values are the same as for <keydev>. Unless you have several LUKS devices, you don’t have to specify this parameter. The simplest usage is:
Example.
rd.luks.key=/foo/bar.key
As you see, you can skip colons in such a case.
Note
Your LUKS partition must match your key file.
dracut provides keys to cryptsetup with -d (an older alias for --key-file). This uses the entire binary content of the key file as part of the secret. If you pipe a password into cryptsetup without -d or --key-file, it will be treated as text user input, and only characters before the first newline will be used. Therefore, when you’re creating an encrypted partition for dracut to mount, and you pipe a key into cryptsetup luksFormat,you must use -d -.
Here is an example for a key encrypted with GPG (warning: --batch-mode will overwrite the device without asking for confirmation):
gpg --quiet --decrypt rootkey.gpg | \ cryptsetup --batch-mode --key-file - \ luksFormat /dev/sda47
If you use unencrypted key files, just use the key file pathname instead of the standard input. For a random key with 256 bits of entropy, you might use:
head -32c /dev/urandom > rootkey.key cryptsetup --batch-mode --key-file rootkey.key \ luksFormat /dev/sda47
You can also use regular key files on an encrypted keydev.
Compared to using GPG encrypted keyfiles on an unencrypted device this provides the following advantages:
To use an encrypted keydev you must ensure that it becomes available by using the keyword keysource, e.g. rd.luks.uuid=keysource:aaaa aaaa being the uuid of the encrypted keydev.
Example:
Lets assume you have three disks A, B and C with the uuids aaaa, bbbb and cccc. You want to unlock A and B using keyfile keyfile. The unlocked volumes be A', B' and C' with the uuids AAAA, BBBB and CCCC. keyfile is saved on C' as /keyfile.
One luks keyslot of each A, B and C is setup with a passphrase. Another luks keyslot of each A and B is setup with keyfile.
To boot this configuration you could use:
rd.luks.uuid=aaaa rd.luks.uuid=bbbb rd.luks.uuid=keysource:cccc rd.luks.key=/keyfile:UUID=CCCC
Dracut asks for the passphrase for C and uses the keyfile to unlock A and B. If getting the passphrase for C fails it falls back to asking for the passphrases for A and B.
If you want C' to stay unlocked, specify a luks name for it, e.g. rd.luks.name=cccc=mykeys, otherwise it gets closed when not needed anymore.
rd.luks.key.tout=0
MD RAID
rd.md=0
rd.md.imsm=0
rd.md.ddf=0
rd.md.conf=0
rd.md.waitclean=1
rd.md.uuid=<md raid uuid>
DM RAID
rd.dm=0
rd.dm.uuid=<dm raid uuid>
MULTIPATH
rd.multipath=0
rd.multipath=default
FIPS
rd.fips
boot=<boot device>
Example.
boot=/dev/sda1 boot=/dev/disk/by-path/pci-0000:00:1f.1-scsi-0:0:1:0-part1 boot=UUID=<uuid> boot=LABEL=<label>
rd.fips.skipkernel
Network
Important
It is recommended to either bind an interface to a MAC with the ifname argument, or to use the systemd-udevd predictable network interface names.
Predictable network interface device names based on:
See: http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames
Two character prefixes based on the type of interface:
en
wl
ww
Type of names:
o<index>
s<slot>[f<function>][d<dev_id>]
x<MAC>
[P<domain>]p<bus>s<slot>[f<function>][d<dev_id>]
[P<domain>]p<bus>s<slot>[f<function>][u<port>][..][c<config>][i<interface>]
All multi-function PCI devices will carry the [f<function>] number in the device name, including the function 0 device.
When using PCI geography, The PCI domain is only prepended when it is not 0.
For USB devices the full chain of port numbers of hubs is composed. If the name gets longer than the maximum number of 15 characters, the name is not exported. The usual USB configuration == 1 and interface == 0 values are suppressed.
PCI ethernet card with firmware index "1"
PCI ethernet card in hotplug slot with firmware index number
PCI ethernet multi-function card with 2 ports
PCI wlan card
USB built-in 3G modem
USB Android phone
The following options are supported by the network-legacy dracut module. Other network modules might support a slightly different set of options; refer to the documentation of the specific network module in use. For NetworkManager, see nm-initrd-generator(8).
ip={dhcp|on|any|dhcp6|auto6|either6|link6|single-dhcp}
dhcp|on|any
single-dhcp
auto6
dhcp6
either6
link6
ip=<interface>:{dhcp|on|any|dhcp6|auto6|link6}[:[<mtu>][:<macaddr>]]
dhcp|on|any|dhcp6
auto6
link6
<macaddr>
ip=<client-IP>:[<peer>]:<gateway-IP>:<netmask>:<client_hostname>:<interface>:{none|off|dhcp|on|any|dhcp6|auto6|ibft}[:[<mtu>][:<macaddr>]]
<macaddr>
ip=<client-IP>:[<peer>]:<gateway-IP>:<netmask>:<client_hostname>:<interface>:{none|off|dhcp|on|any|dhcp6|auto6|ibft}[:[<dns1>][:<dns2>]]
ifname=<interface>:<MAC>
Warning
Do not use the default kernel naming scheme for the interface name, as it can conflict with the kernel names. So, don’t use "eth[0-9]+" for the interface name. Better name it "bootnet" or "bluesocket".
rd.route=<net>/<netmask>:<gateway>[:<interface>]
Example.
rd.route=192.168.200.0/24:192.168.100.222:ens10 rd.route=192.168.200.0/24:192.168.100.222 rd.route=192.168.200.0/24::ens10 rd.route=[2001:DB8:3::/8]:[2001:DB8:2::1]:ens10
bootdev=<interface>
BOOTIF=<MAC>
rd.bootif=0
nameserver=<IP> [nameserver=<IP> ...]
rd.peerdns=0
biosdevname=0
rd.neednet=1
vlan=<vlanname>:<phydevice>
bond=<bondname>[:<bondslaves>:[:<options>[:<mtu>]]]
team=<teammaster>:<teamslaves>[:<teamrunner>]
bridge=<bridgename>:<ethnames>
NFS
root=[<server-ip>:]<root-dir>[:<nfs-options>]
root=nfs:[<server-ip>:]<root-dir>[:<nfs-options>], root=nfs4:[<server-ip>:]<root-dir>[:<nfs-options>], root={dhcp|dhcp6}
Example.
root-path=<server-ip>:<root-dir>[,<nfs-options>] root-path=nfs:<server-ip>:<root-dir>[,<nfs-options>] root-path=nfs4:<server-ip>:<root-dir>[,<nfs-options>]
root=/dev/nfs nfsroot=[<server-ip>:]<root-dir>[:<nfs-options>]
rd.nfs.domain=<NFSv4 domain name>
rd.net.dhcp.retry=<cnt>
rd.net.timeout.dhcp=<arg>
rd.net.timeout.iflink=<seconds>
rd.net.timeout.ifup=<seconds>
rd.net.timeout.route=<seconds>
rd.net.timeout.ipv6dad=<seconds>
rd.net.timeout.ipv6auto=<seconds>
rd.net.timeout.carrier=<seconds>
CIFS
root=cifs://[<username>[:<password>]@]<server-ip>:<root-dir>
Warning
Passwords specified on the kernel command line are visible for all users via the file /proc/cmdline and via dmesg or can be sniffed on the network, when using DHCP with DHCP root-path.
cifsuser=<username>
cifspass=<password>
Warning
Passwords specified on the kernel command line are visible for all users via the file /proc/cmdline and via dmesg or can be sniffed on the network, when using DHCP with DHCP root-path.
iSCSI
root=iscsi:[<username>:<password>[:<reverse>:<password>]@][<servername>]:[<protocol>]:[<port>][:[<iscsi_iface_name>]:[<netdev_name>]]:[<LUN>]:<targetname>
Warning
Passwords specified on the kernel command line are visible for all users via the file /proc/cmdline and via dmesg or can be sniffed on the network, when using DHCP with DHCP root-path.
Example.
root=iscsi:192.168.50.1::::iqn.2009-06.dracut:target0
If servername is an IPv6 address, it has to be put in brackets:
Example.
root=iscsi:[2001:DB8::1]::::iqn.2009-06.dracut:target0
root=??? netroot=iscsi:[<username>:<password>[:<reverse>:<password>]@][<servername>]:[<protocol>]:[<port>][:[<iscsi_iface_name>]:[<netdev_name>]]:[<LUN>]:<targetname> ...
Example.
root=UUID=12424547 netroot=iscsi:192.168.50.1::::iqn.2009-06.dracut:target0 netroot=iscsi:192.168.50.1::::iqn.2009-06.dracut:target1
If servername is an IPv6 address, it has to be put in brackets:
Example.
netroot=iscsi:[2001:DB8::1]::::iqn.2009-06.dracut:target0
Warning
Passwords specified on the kernel command line are visible for all users via the file /proc/cmdline and via dmesg or can be sniffed on the network, when using DHCP with DHCP root-path. You may want to use rd.iscsi.firmware.
root=??? rd.iscsi.initiator=<initiator> rd.iscsi.target.name=<target name> rd.iscsi.target.ip=<target ip> rd.iscsi.target.port=<target port> rd.iscsi.target.group=<target group> rd.iscsi.username=<username> rd.iscsi.password=<password> rd.iscsi.in.username=<in username> rd.iscsi.in.password=<in password>
Warning
Passwords specified on the kernel command line are visible for all users via the file /proc/cmdline and via dmesg or can be sniffed on the network, when using DHCP with DHCP root-path. You may want to use rd.iscsi.firmware.
root=??? netroot=iscsi rd.iscsi.firmware=1
rd.iscsi.login_retry_max=<num>
rd.iscsi.param=<param>
Example.
"netroot=iscsi rd.iscsi.firmware=1 rd.iscsi.param=node.session.timeo.replacement_timeout=30"
will result in
iscsistart -b --param node.session.timeo.replacement_timeout=30
rd.iscsi.ibft rd.iscsi.ibft=1: Turn on iBFT autoconfiguration for the interfaces
rd.iscsi.mp rd.iscsi.mp=1: Configure all iBFT interfaces, not only used for booting (multipath)
rd.iscsi.waitnet=0: Turn off waiting for all interfaces to be up before trying to login to the iSCSI targets.
rd.iscsi.testroute=0: Turn off checking, if the route to the iSCSI target IP is possible before trying to login.
FCoE
rd.fcoe=0
fcoe=<edd|interface|MAC>:{dcb|nodcb}:{fabric|vn2vn}
Note
letters in the MAC-address must be lowercase!
NVMf
rd.nonvmf
rd.nvmf.nonbft
rd.nvmf.nostatic
rd.nvmf.hostnqn=<hostNQN>
rd.nvmf.hostid=<hostID>
rd.nvmf.discover={rdma|fc|tcp},<traddr>,[<host_traddr>],[<trsvcid>]
Examples.
rd.nvmf.discover=tcp,192.168.10.10,,4420 rd.nvmf.discover=fc,nn-0x201700a05634f5bf:pn-0x201900a05634f5bf,nn-0x200000109b579ef3:pn-0x100000109b579ef3
rd.nvmf.discover=fc,auto
NBD
root=??? netroot=nbd:<server>:<port/exportname>[:<fstype>[:<mountopts>[:<nbdopts>]]]
NOTE: If "exportname" instead of "port" is given the standard port is used. Newer versions of nbd are only supported with "exportname".
root=/dev/root netroot=dhcp with dhcp root-path=nbd:<server>:<port/exportname>[:<fstype>[:<mountopts>[:<nbdopts>]]]
NOTE: If "exportname" instead of "port" is given the standard port is used. Newer versions of nbd are only supported with "exportname".
VIRTIOFS
root=virtiofs:<mount-tag>
rootfstype=virtiofs root=<mount-tag>
Both formats are supported by the virtiofs dracut module. See https://gitlab.com/virtio-fs/virtiofsd for more information.
Example.
root=virtiofs:host rw
DASD
rd.dasd=....
NOTE: This parameter is no longer handled by dracut itself but with the exact same syntax by https://github.com/ibm-s390-linux/s390-tools/tree/master/zdev/dracut/95zdev.
ZFCP
rd.zfcp=<zfcp adaptor device bus ID>,<WWPN>,<FCPLUN>
NOTE: This parameter is no longer handled by dracut itself but with the exact same syntax by https://github.com/ibm-s390-linux/s390-tools/tree/master/zdev/dracut/95zdev.
rd.zfcp=<zfcp adaptor device bus ID>
NOTE: This parameter is no longer handled by dracut itself but with the exact same syntax by https://github.com/ibm-s390-linux/s390-tools/tree/master/zdev/dracut/95zdev.
Example.
rd.zfcp=0.0.4000,0x5005076300C213e9,0x5022000000000000 rd.zfcp=0.0.4000
rd.zfcp.conf=0
ZNET
rd.znet=<nettype>,<subchannels>,<options>
rd.znet_ifname=<ifname>:<subchannels>
Example.
rd.znet=qeth,0.0.0600,0.0.0601,0.0.0602,layer2=1,portname=foo rd.znet=ctc,0.0.0600,0.0.0601,protocol=bar
Booting live images
Dracut offers multiple options for live booted images:
SquashFS (read-only) base filesystem image
Using one of these technologies, the system will provide a writable overlay for the base, read-only SquashFS root filesystem. These methods enable a relatively fast boot and lower RAM usage.
With the original Device-mapper snapshot overlay, users must be careful to avoid writing too many blocks to the snapshot device. Once the blocks of the snapshot overlay are exhausted, the whole root filesystem becomes read-only leading to application failures. The snapshot overlay device is marked Overflow, and a difficult recovery is required to repair and enlarge the overlay offline.
When rd.live.overlay= is not specified for persistent overlay storage, or the specified file is not found or writable, a Device-mapper snapshot based non-persistent or temporary overlay is automatically created as a sparse file in RAM of the initramfs. This file will only consume content space as required blocks are allocated. This snapshot based overlay defaults to an apparent size of 32 GiB in RAM, and can be adjusted with the rd.live.overlay.size= kernel command line option. This file is hidden (and appears deleted) when the boot process switches out of the initramfs to the main root filesystem but its loop device remains connected to the Device-mapper snapshot.
Even with large Device-mapper overlay files for write space, the available root filesystem capacity is limited by the total allocated size of the base root filesystem, which often provide only a small number of gigabytes of free space.
This shortage could be remedied by building the root filesystem with more allocated free space, or the OverlayFS based overlay mount method can be used.
When the rd.live.overlay.overlayfs option is specified or when rd.live.overlay= points to an appropriate directory with a sister at /../ovlwork, then an OverlayFS based overlay mount is employed. Such a persistent OverlayFS overlay can extend the available root filesystem storage up to the capacity of the LiveOS disk device.
For non-persistent OverlayFS overlays, the /run/overlayfs directory in the /run tmpfs is used for temporary storage. This filesystem is typically sized to one half of the RAM total in the system.
The command: mount -o remount,size=<nbytes> /run will resize this virtual filesystem after booting.
The internal SquashFS structure is traditionally expected to be:
squashfs.img | SquashFS from LiveCD .iso !(mount) /LiveOS |- rootfs.img | Usually a ext4 filesystem image to mount read-only !(mount) /bin | Base Live root filesystem /boot | /dev | ... |
For OverlayFS mount overlays, the internal SquashFS structure may be a direct compression of the root filesystem:
squashfs.img | SquashFS from LiveCD .iso !(mount) /bin | Base Live root filesystem /boot | /dev | ... |
Dracut uses one of the overlay methods of live booting by default. No additional command line options are required other than root=live:<path to blockdevice> or root=live:<URL> to specify the location of your squashed root filesystem.
Uncompressed live filesystem image
Writable filesystem image
The filesystem structure is expected to be:
rootfs.tgz | Compressed tarball containing filesystem image !(unpack) /rootfs.img | Filesystem image at /run/initramfs/fsimg/ !(mount) /bin | Live filesystem /boot | /dev | ... |
To use this boot option, ensure that rd.writable.fsimg=1 is in your kernel command line and add the root=live:<URL> to specify the location of your compressed filesystem image tarball or SquashFS image.
rd.writable.fsimg=1
Note
There must be enough free RAM available to hold the complete image.
rd.minmem=<megabyte>
This parameter only applies together with the parameters rd.writable.fsimg or rd.live.ram.
root=live:<url>
Examples.
root=live:http://example.com/liveboot.img root=live:ftp://ftp.example.com/liveboot.img root=live:torrent://example.com/liveboot.img.torrent
rd.live.debug=1
rd.live.dir=<path>
rd.live.squashimg=<filename of SquashFS image>
rd.live.ram=1
rd.live.overlay={<devspec>[:{<pathspec>|auto}]|none}
The above method shall be used to persist the changes made to the root filesystem specified within the
root=live:<path to blockdevice> or root=live:<url> device.
The default pathspec, when :auto or no :<pathspec> is given, is /<rd.live.dir>/overlay-<label>-<uuid>, where <label> and <uuid> are the LABEL and UUID of the filesystem specified by the root=live:<path|url> device.
If a persistent overlay is detected at the standard LiveOS path, and rd.live.overlay.overlayfs is not set to 1, the overlay type (either Device-mapper or OverlayFS) will be detected and it will be used.
Examples.
rd.live.overlay=/dev/sdb1:/persistent-overlay.img rd.live.overlay=UUID=99440c1f-8daa-41bf-b965-b7240a8996f4
rd.live.overlay.cowfs=[btrfs|ext4|xfs]
rd.live.overlay.size=<size_MiB>
rd.live.overlay.readonly=1
rd.live.overlay.reset=1
rd.live.overlay.thin=1
rd.live.overlay.overlayfs=1
The rd.live.overlay.readonly option, which allows a persistent overlayfs to be mounted read-only through a higher level transient overlay directory, has been implemented through the multiple lower layers feature of OverlayFS.
ZIPL
rd.zipl=<path to blockdevice>
Example.
rd.zipl=UUID=0fb28157-99e3-4395-adef-da3f7d44835a
CIO_IGNORE
rd.cio_accept=<device-ids>
Example.
rd.cio_accept=0.0.0180,0.0.0800,0.0.0801,0.0.0802
Plymouth Boot Splash
plymouth.enable=0
rd.plymouth=0
Kernel keys
masterkey=<kernel master key path name>
Example.
masterkey=/etc/keys/kmk-trusted.blob
masterkeytype=<kernel master key type>
Example.
masterkeytype=trusted
evmkey=<EVM HMAC key path name>
Example.
evmkey=/etc/keys/evm-trusted.blob
evmx509=<EVM X.509 cert path name>
Example.
evmx509=/etc/keys/x509_evm.der
ecryptfskey=<eCryptfs key path name>
Example.
ecryptfskey=/etc/keys/ecryptfs-trusted.blob
Deprecated, renamed Options
Here is a list of options and their new replacement.
rdbreak
rd.ccw
rd_CCW
rd_DASD_MOD
rd_DASD
rdinitdebug rdnetdebug
rd_NO_DM
rd_DM_UUID
rdblacklist
rdinsmodpost
rdloaddriver
rd_NO_FSTAB
rdinfo
check
rdlivedebug
live_dir
liveimg
overlay
readonly_overlay
reset_overlay
live_ram
rd_NO_CRYPTTAB
rd_LUKS_KEYDEV_UUID
rd_LUKS_KEYPATH
rd_NO_LUKS
rd_LUKS_UUID
rd_NO_LVMCONF
rd_LVM_LV
rd_NO_LVM
rd_LVM_VG
rd_NO_MDADMCONF
rd_NO_MDIMSM
rd_NO_MD
rd_MD_UUID
rd_NO_MULTIPATH: rd.multipath=0
rd_NFS_DOMAIN
iscsi_initiator
iscsi_target_name
iscsi_target_ip
iscsi_target_port
iscsi_target_group
iscsi_username
iscsi_password
iscsi_in_username
iscsi_in_password
iscsi_firmware
rd_NO_PLYMOUTH
rd_retry
rdshell
rd_NO_SPLASH
rdudevdebug
rdudevinfo
rd.udev.debug
rd.udev.info
rd_NO_ZFCPCONF
rd_ZFCP
rd_ZNET
KEYMAP
KEYTABLE
SYSFONT
CONTRANS
UNIMAP
UNICODE
EXT_KEYMAP
Configuration in the Initramfs
/etc/conf.d/
/etc/cmdline
/etc/cmdline.d/*.conf
AUTHOR
Harald Hoyer
SEE ALSO
NOTES
- 1.
- rfc4173
07/21/2024 | dracut 103 |