From nobody Thu Oct 2 19:00:51 2025 Received: from mail-ej1-f54.google.com (mail-ej1-f54.google.com [209.85.218.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2C49A267AF6 for ; Sun, 14 Sep 2025 03:54:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.218.54 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757822089; cv=none; b=KxvBa+8Rq5YsB2baIOjFAzPY9GyiBZWjZPOVL20YH0ExF0Edw7f1s5qTZ4f9WoF1CwAMgkQ5WdkXEOXN96PYjNhkuhVDjvIatQkmSHIuxVJQfAPl1K2Rfwk2zLZqihyHTvfQ3oQ3fvKEFg7z/b++p02j4IlDsN8Zlo+FUd3zGME= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757822089; c=relaxed/simple; bh=z148AkYrWgRabAliJ93Wt4Z2ZD8niTFA9cUReN1NNec=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=BZ4D7MogUJWsqE+SDCpVhpdDf84UOyagztyD9u1VPNLATeSX9ml0z0a/HlvNlq0J6eIKD1TWzOWIeZ4Dg36WJamAQPdQ0YX2fWt++FuwZBvJhoylL+/t1nUDnHZIVF2RNga9Le4LtZIvSQuuGkfWTt/VQB2BVnvlHBK+W3TtJBc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=SnKvRore; arc=none smtp.client-ip=209.85.218.54 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="SnKvRore" Received: by mail-ej1-f54.google.com with SMTP id a640c23a62f3a-b00a9989633so589071566b.0 for ; Sat, 13 Sep 2025 20:54:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1757822083; x=1758426883; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=pjKVSjXysip/b5UNUwgMX+OIg9u3DNn6e0+I8Cmpn0k=; b=SnKvRoreLVbwLq3ZfOlOAtKHzJTK+2CRHD7ST4oqw6m/ZX2K/TZA22o1yNoPXi2wZ5 G7kuVImssYITwW/jgXP4hkFh2XUZ+TERnohXGu6hptn3aDrOoY98hw+QU1dhrDTt5T8k mMC8GCnLmrUP1UL8ToJv32F/LGSgjUKrOXx4232qqs1cxpwgRVRk7tE8FWchEOHHC9Tp 2SVUSHGslP+mCL9Z2UrOW6k9kv36DNY8Z2iTZPf0J8NDSEFQeGls4ACw/IuSe9ucFlYV m/I19RcmkFI3CO/PBZXuNWwi6tPZdk4wyrRTTsiUNwQ1IuWcK82Mr0pn/is7hcMyR4y2 XIhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1757822083; x=1758426883; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=pjKVSjXysip/b5UNUwgMX+OIg9u3DNn6e0+I8Cmpn0k=; b=vYKCbVPjp4M3Xu5RpqukVmLazYBstkwxJxYzrTTGvq0+QKSv2gk+uauw/Bj45PVjrw Gn/QnZ6FMAcUHCPmhj5W14nqXntyAGWDuCJ516/cpLtsOlHySg1265RajAMpVkAx+zL3 VCJ8bU0bR1rQ59+HizLG8eMxotXBa4qL2/N7vfoD52cgnGYas95R6fBnHA2qWjhbSlY6 fqSGNG211VV8GQb61QAw3r0Fp5lRBloyCxD0FWQwcxjfdJc3jMtzug3hLsDpYwxz1Tqa OBBN1MEHPPyRb90Ia/faE4YO2fD7Ib2JzT/+Ig3rV/wbDeDjS4bm2yZoUhloQcQlv1ga IiWQ== X-Forwarded-Encrypted: i=1; AJvYcCUNXsW3IyuqTxYrTzhAY1qwoPabfcHhUKwoMffBWK3L6lCJZz9oBsoE7kcs2zCizfm0FgZBaEAyigU+PPc=@vger.kernel.org X-Gm-Message-State: AOJu0YwNmvNztvSKT9gq3XZwskXvNvj3apTbnyIYZNqZnLy8SgJQ63wz wXT3c979yXgOvpuH0ArOKBDfmFLVcFsUEw6QEpngtsxYu6QhAg00jM/o X-Gm-Gg: ASbGncvAbXxs68+iF9uEOXVQIDnuhNseP33ETrLCQNsPlj4B6T/icJAM915Z5Glkeoe NSQ9DgIYi2i5hjP8C3x4h+XzVxQbFGMM2lwQqKG5Es6bLUTD3Ku7g0bZpqOnQ/tWT0isU5c7Fby 3rjvntURiMVMxP+NN4b0chxsJZLtSZDqgsahjS0XTE55CaCF7w4LJpp/2/FOfL6u7+qA9t1kEDa o9nMn4h24FpJa3r9Yc7ICFuoMmba4cupvc5dV4U1Nd2WDpZnBj707+VB4sf9qALHzhrxah517+w De2QaFYygYKvzfEaI3vlVBGTjXbNTrczAkStB7v5ib0okzZNuiKNODgj3/ZL/lu4QYGuPcg1fNt 7KO4PFXVN6kNrj2/X6YGU0/qaEyi2wg== X-Google-Smtp-Source: AGHT+IFpMpCVJeNrUipt0dZC4eBHRTy08fiFy9cwywIocPIoMawoMDT0bJrFyHi72vkPeUNRc3Oodg== X-Received: by 2002:a17:906:114e:b0:b0b:35d8:248e with SMTP id a640c23a62f3a-b0b35d8267fmr237998166b.18.1757822083468; Sat, 13 Sep 2025 20:54:43 -0700 (PDT) Received: from localhost ([212.73.77.104]) by smtp.gmail.com with UTF8SMTPSA id a640c23a62f3a-b07b32dd5a9sm665619166b.57.2025.09.13.20.54.39 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 13 Sep 2025 20:54:43 -0700 (PDT) From: Askar Safin To: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Linus Torvalds , Greg Kroah-Hartman , Christian Brauner , Al Viro , Jan Kara , Christoph Hellwig , Jens Axboe , Andy Shevchenko , Aleksa Sarai , =?UTF-8?q?Thomas=20Wei=C3=9Fschuh?= , Julian Stecklina , Gao Xiang , Art Nikpal , Andrew Morton , Eric Curtin , Alexander Graf , Rob Landley , Lennart Poettering , linux-arch@vger.kernel.org, linux-alpha@vger.kernel.org, linux-snps-arc@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-csky@vger.kernel.org, linux-hexagon@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-openrisc@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, linux-um@lists.infradead.org, x86@kernel.org, Ingo Molnar , linux-block@vger.kernel.org, initramfs@vger.kernel.org, linux-api@vger.kernel.org, linux-doc@vger.kernel.org, linux-efi@vger.kernel.org, linux-ext4@vger.kernel.org, "Theodore Y . Ts'o" , linux-acpi@vger.kernel.org, Michal Simek , devicetree@vger.kernel.org, Luis Chamberlain , Kees Cook , Thorsten Blum , Heiko Carstens , patches@lists.linux.dev Subject: [PATCH RESEND 45/62] doc: kernel-parameters: replace [RAM] with [INITRAMFS] Date: Sun, 14 Sep 2025 06:54:38 +0300 Message-ID: <20250914035438.3682240-1-safinaskar@gmail.com> X-Mailer: git-send-email 2.47.2 In-Reply-To: <20250913003842.41944-1-safinaskar@gmail.com> References: <20250913003842.41944-1-safinaskar@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Also, do other initramfs-related edits, while we are here Signed-off-by: Askar Safin --- .../admin-guide/kernel-parameters.rst | 4 ++-- .../admin-guide/kernel-parameters.txt | 20 +++++++++---------- 2 files changed, 12 insertions(+), 12 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.rst b/Documentatio= n/admin-guide/kernel-parameters.rst index 39d0e7ff0965..22af6bbffc35 100644 --- a/Documentation/admin-guide/kernel-parameters.rst +++ b/Documentation/admin-guide/kernel-parameters.rst @@ -123,7 +123,7 @@ is applicable:: CMA Contiguous Memory Area support is enabled. DRM Direct Rendering Management support is enabled. DYNAMIC_DEBUG Build in debug messages and enable them at runtime - EARLY Parameter processed too early to be embedded in initrd. + EARLY Parameter processed too early to be embedded in initramfs. EDD BIOS Enhanced Disk Drive Services (EDD) is enabled EFI EFI Partitioning (GPT) is enabled EVM Extended Verification Module @@ -134,6 +134,7 @@ is applicable:: HW Appropriate hardware is enabled. HYPER_V HYPERV support is enabled. IMA Integrity measurement architecture is enabled. + INITRAMFS Initramfs support is enabled. IP_PNP IP DHCP, BOOTP, or RARP is enabled. IPV6 IPv6 support is enabled. ISAPNP ISA PnP code is enabled. @@ -167,7 +168,6 @@ is applicable:: PPT Parallel port support is enabled. PS2 Appropriate PS/2 support is enabled. PV_OPS A paravirtualized kernel is enabled. - RAM RAM disk support is enabled. RDT Intel Resource Director Technology. RISCV RISCV architecture is enabled. S390 S390 architecture is enabled. diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentatio= n/admin-guide/kernel-parameters.txt index 0805d3ebc75a..8e10abac4cc7 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -565,7 +565,7 @@ Format: integer =20 bootconfig [KNL,EARLY] - Extended command line options can be added to an initrd + Extended command line options can be added to an initramfs and this will cause the kernel to look for it. =20 See Documentation/admin-guide/bootconfig.rst @@ -1005,7 +1005,7 @@ may be missing from the dump. =20 A standard crashkernel reservation, as described above, - is still needed to hold the crash kernel and initrd. + is still needed to hold the crash kernel and initramfs. =20 This option increases the risk of a kdump failure: DMA transfers configured by the first kernel may end up @@ -2298,7 +2298,7 @@ initcall functions. Useful for debugging built-in modules and initcalls. =20 - initramfs_async=3D [KNL] + initramfs_async=3D [INITRAMFS,KNL] Format: Default: 1 This parameter controls whether the initramfs @@ -2310,10 +2310,10 @@ unpacking being completed before device_ and late_ initcalls. =20 - initrd=3D [BOOT,EARLY] Specify the location of the initial ramdisk + initrd=3D [BOOT,EARLY,INITRAMFS,KNL] Same as initrdmem=3D =20 - initrdmem=3D [KNL,EARLY] Specify a physical address and size from which to - load the initrd. If an initrd is compiled in or + initrdmem=3D [BOOT,EARLY,INITRAMFS,KNL] Specify a physical address and si= ze from which to + load initramfs. If initramfs is compiled in or specified in the bootparams, it takes priority over this setting. Format: ss[KMG],nn[KMG] @@ -2749,7 +2749,7 @@ between unregistering the boot console and initializing the real console. =20 - keepinitrd [HW,ARM] See retain_initrd. + keepinitrd [HW,ARM,INITRAMFS] See retain_initrd. =20 kernelcore=3D [KNL,X86,PPC,EARLY] Format: nn[KMGTPE] | nn% | "mirror" @@ -6129,8 +6129,8 @@ =20 rdinit=3D [KNL] Format: - Run specified binary instead of /init from the ramdisk, - used for early userspace startup. See initrd. + Run specified binary instead of /init from initramfs, + used for early userspace startup. =20 rdrand=3D [X86,EARLY] force - Override the decision by the kernel to hide the @@ -6324,7 +6324,7 @@ Useful for devices that are detected asynchronously (e.g. USB and MMC devices). =20 - retain_initrd [RAM] Keep initrd memory after extraction. After boot, it w= ill + retain_initrd [INITRAMFS] Keep initramfs memory after extraction. After b= oot, it will be accessible via /sys/firmware/initrd. =20 retbleed=3D [X86] Control mitigation of RETBleed (Arbitrary --=20 2.47.2