dracut.cmdline(7) — Arch manual pages
DRACUT.CMDLINE(7)
dracut
DRACUT.CMDLINE(7)
NAME
dracut.cmdline - dracut kernel command line options
DESCRIPTION
The root device used by the kernel is specified in the boot
configuration file on the kernel command line, as always.
The traditional
root=/dev/sda1
style device specification
is allowed, but not encouraged. The root device should better be identified
by LABEL or UUID. If a label is used, as in
root=LABEL=
the initramfs will search all
available devices for a filesystem with the appropriate label, and mount
that device as the root filesystem.
root=UUID=
will
mount the partition with that UUID as the root filesystem.
In the following all kernel command line parameters, which are
processed by dracut, are described.
"rd.*" parameters mentioned without "=" are
boolean parameters. They can be turned on/off by setting them to {0|1}. If
the assignment with "=" is missing "=1" is implied. For
example
rd.info
can be turned off with
rd.info=0
or turned on
with
rd.info=1
or
rd.info
. The last value in the kernel
command line is the value, which is honored.
Standard
init=

specify the path to the init program to be started after
the initramfs has finished
root=

specify the block device to use as the root filesystem.
Example
root=/dev/sda1
root=/dev/disk/by-path/pci-0000:00:1f.1-scsi-0:0:1:0-part1
root=/dev/disk/by-label/Root
root=LABEL=Root
root=/dev/disk/by-uuid/3f5ad593-4546-4a94-a374-bcfb68aa11f7
root=UUID=3f5ad593-4546-4a94-a374-bcfb68aa11f7
root=PARTUUID=3f5ad593-4546-4a94-a374-bcfb68aa11f7
rootfstype=

"auto" if not specified.
Example
rootfstype=ext4
rootflags=

specify additional mount options for the root filesystem.
If not set,
/etc/fstab
of the real root will be parsed for special
mount options and mounted accordingly.
ro
force mounting
and
/usr
(if it is a
separate device) read-only. If none of ro and rw is present, both are mounted
according to
/etc/fstab
rw
force mounting
and
/usr
(if it is a
separate device) read-write. See also ro option.
rootfallback=

specify the block device to use as the root filesystem,
if the normal root cannot be found. This can only be a simple block device
with a simple file system, for which the filesystem driver is either compiled
in, or added manually to the initramfs. This parameter can be specified
multiple times.
rd.auto
rd.auto=1
enable autoassembly of special devices like cryptoLUKS,
dmraid, mdraid or lvm. Default is off as of dracut version >= 024.
rd.hostonly=0
removes all compiled in configuration of the host system
the initramfs image was built on. This helps booting, if any disk layout
changed, especially in combination with rd.auto or other parameters specifying
the layout.
rd.cmdline=ask
prompts the user for additional kernel command line
parameters
rd.fstab=0
do not honor special mount options for the root
filesystem found in
/etc/fstab
of the real root.
resume=

resume from a swap partition
Example
resume=/dev/disk/by-path/pci-0000:00:1f.1-scsi-0:0:1:0-part1
resume=/dev/disk/by-uuid/3f5ad593-4546-4a94-a374-bcfb68aa11f7
resume=UUID=3f5ad593-4546-4a94-a374-bcfb68aa11f7
rd.skipfsck
skip fsck for rootfs and
/usr
. If you’re
mounting
/usr
read-only and the init system performs fsck before
remount, you might want to use this option to avoid duplication.
iso-scan/filename
Mount all mountable devices and search for ISO pointed by the
argument. When the ISO is found set it up as a loop device. Device
containing this ISO image will stay mounted at /run/initramfs/isoscandev.
Using iso-scan/filename with a Fedora/Red Hat/CentOS Live iso should just
work by copying the original kernel cmdline parameters. Requires the dracut
dmsquash-live
module.
Example
menuentry 'Live' --class gnu-linux --class gnu --class os {
set isolabel=Live-x86_64
set isofile="/boot/iso/Live-x86_64.iso"
loopback loop $isofile
linux (loop)/isolinux/vmlinuz0 boot=isolinux iso-scan/filename=$isofile root=live:LABEL=$isolabel ro rd.live.image quiet
initrd (loop)/isolinux/initrd0.img
Misc
rd.emergency=
[reboot|poweroff|halt]
specify, what action to execute in case of a critical
failure. rd.shell=0 must also be specified.
rd.driver.blacklist=

[,

,...]
do not load kernel module . This
parameter can be specified multiple times.
rd.driver.pre=

[,

,...]
force loading kernel module . This
parameter can be specified multiple times.
rd.driver.post=

[,

,...]
force loading kernel module after all
automatic loading modules have been loaded. This parameter can be specified
multiple times.
rd.driver.export
making all drivers from initramfs available to rootfs
after switch_root. This parameter can be set to
force
for exporting
over existing modules. Requires the dracut
kernel-modules-export
module.
rd.retry=

specify how long dracut should retry the initqueue to
configure devices. The default is 180 seconds. After 2/3 of the time, degraded
raids are force started. If you have hardware, which takes a very long time to
announce its drives, you might want to extend this value. Requires the dracut
initqueue
module.
rd.timeout=

specify how long dracut should wait for devices to
appear. The default is
, which means
forever
. Note that this
timeout should be longer than rd.retry to allow for proper
configuration.
rd.noverifyssl
accept self-signed certificates for ssl downloads.
Requires the dracut
url-lib
module.
rd.ctty=

specify the controlling terminal for the console. This is
useful, if you have multiple "console=" arguments.
rd.shutdown.timeout.umount=

specify how long dracut should wait for an individual
umount to finish during shutdown. This avoids the system from blocking when
unmounting a file system cannot complete and waits indefinitely. Value
means to wait
forever
. The default is 90 seconds. Requires the
dracut
shutdown
module.
Debug
If you are dropped to an emergency shell, the file
/run/initramfs/rdsosreport.txt
is created, which can be saved to a
(to be mounted by hand) partition (usually /boot) or a USB stick. Additional
debugging info can be produced by adding
rd.debug
to the kernel
command line.
/run/initramfs/rdsosreport.txt
contains all logs and
the output of some tools. It should be attached to any report about dracut
problems.
rd.info
print informational output though "quiet" is
set
rd.shell
allow dropping to a shell, if root mounting fails
rd.debug
set -x for the dracut shell. If systemd is active in the
initramfs, all output is logged to the systemd journal, which you can inspect
with "journalctl -ab". If systemd is not active, the logs are
written to dmesg and
/run/initramfs/init.log
. If "quiet" is
set, it also logs to the console.
rd.memdebug=[0-5]
Print memory usage info at various points, set the
verbose level from 0 to 5.
Higher level means more debugging output:
0 - no output
1 - partial /proc/meminfo
2 - /proc/meminfo
3 - /proc/meminfo + /proc/slabinfo
4 - /proc/meminfo + /proc/slabinfo + memstrack summary
NOTE: memstrack is a memory tracing tool that tracks the total memory
consumption, and peak memory consumption of each kernel modules
and userspace progress during the whole initramfs runtime, report
is generated and the end of initramfs run.
5 - /proc/meminfo + /proc/slabinfo + memstrack (with top memory stacktrace)
NOTE: memstrack (with top memory stacktrace) will print top memory
allocation stack traces during the whole initramfs runtime.
rd.break
drop to a shell at the end
rd.break=
{cmdline|pre-udev|pre-trigger|initqueue|pre-mount|mount|pre-pivot|cleanup}
drop to a shell before the defined breakpoint starts.
This parameter can be specified multiple times.
rd.udev.log_level=
{err|info|debug}
set udev log level. The default is
err
I18N
Requires the dracut
i18n
module.
rd.vconsole.keymap=

keyboard translation table loaded by loadkeys; taken from
keymaps directory; will be written as KEYMAP to
/etc/vconsole.conf
in
the initramfs.
Example
rd.vconsole.keymap=de-latin1-nodeadkeys
rd.vconsole.keymap.ext=
names>
list of extra keymaps to bo loaded (sep. by space); will
be written as EXT_KEYMAP to
/etc/vconsole.conf
in the initramfs
rd.vconsole.unicode
boolean, indicating UTF-8 mode; will be written as
UNICODE to
/etc/vconsole.conf
in the initramfs
rd.vconsole.font=

console font; taken from consolefonts directory; will be
written as FONT to
/etc/vconsole.conf
in the initramfs.
Example
rd.vconsole.font=eurlatgr
rd.vconsole.font.map=
name>
see description of
-m
parameter in setfont manual;
taken from consoletrans directory; will be written as FONT_MAP to
/etc/vconsole.conf
in the initramfs
rd.vconsole.font.unimap=
name>
see description of
-u
parameter in setfont manual;
taken from unimaps directory; will be written as FONT_UNIMAP to
/etc/vconsole.conf
in the initramfs
rd.locale.LANG=

taken from the environment; if no UNICODE is defined we
set its value in basis of LANG value (whether it ends with ".utf8"
(or similar) or not); will be written as LANG to
/etc/locale.conf
in
the initramfs.
Example
rd.locale.LANG=pl_PL.utf8
rd.locale.LC_ALL=

taken from the environment; will be written as LC_ALL to
/etc/locale.conf
in the initramfs
LVM
Requires the dracut
lvm
module.
rd.lvm=0
disable LVM detection
rd.lvm.vg=

only activate all logical volumes in the the volume
groups with the given name. rd.lvm.vg can be specified multiple times on the
kernel command line.
rd.lvm.lv=
/name>
only activate the logical volumes with the given name.
rd.lvm.lv can be specified multiple times on the kernel command line.
rd.lvm.conf=0
remove any
/etc/lvm/lvm.conf
, which may exist in
the initramfs
crypto LUKS
Requires the dracut
crypt
module.
rd.luks=0
disable crypto LUKS detection
rd.luks.uuid=

only activate the LUKS partitions with the given UUID.
Any "luks-" of the LUKS UUID is removed before comparing to

. The comparisons also matches, if
uuid>
is only the beginning of the LUKS UUID, so you don’t have
to specify the full UUID. This parameter can be specified multiple times.

may be prefixed by the keyword
keysource:
, see
rd.luks.key
below.
rd.luks.allow-discards=

Allow using of discards (TRIM) requests for LUKS
partitions with the given UUID. Any "luks-" of the LUKS UUID is
removed before comparing to

. The comparisons also
matches, if

is only the beginning of the LUKS UUID,
so you don’t have to specify the full UUID. This parameter can be
specified multiple times.
rd.luks.allow-discards
Allow using of discards (TRIM) requests on all LUKS
partitions.
rd.luks.crypttab=0
do not check, if LUKS partition is in
/etc/crypttab
rd.luks.timeout=

specify how long dracut should wait when waiting for the
user to enter the password. This avoid blocking the boot if no password is
entered. It does not apply to luks key. The default is
, which means
forever
crypto LUKS - key on removable device support
NB: If systemd is included in the dracut initrd, dracut’s
built in removable device keying support won’t work. systemd will
prompt for a password from the console even if you’ve supplied
rd.luks.key
. You may be able to use standard systemd
man:fstab[5,external] syntax to get the same effect. If you do need
rd.luks.key
to work, you will have to exclude the "systemd"
dracut module and any modules that depend on it. See man:dracut.conf[5] and
for more
information.
rd.luks.key=
[:[:]]

is the pathname of a key file,
relative to the root of the filesystem on some device. It’s REQUIRED.
When

ends with
.gpg
it’s considered to be
key encrypted symmetrically with GPG. You will be prompted for the GPG
password on boot. GPG support requires the
crypt-gpg
dracut module,
which needs to be added explicitly.

identifies the device on which the key file
resides. It may be the kernel name of the device (should start with
"/dev/"), a UUID (prefixed with "UUID=") or a label
(prefix with "LABEL="). You don’t have to specify a full
UUID. Just its beginning will suffice, even if its ambiguous. All matching
devices will be probed. This parameter is recommended, but not required. If
it’s not present, all block devices will be probed, which may
significantly increase boot time.
If

is given, the specified key will only be
used for the specified LUKS device. Possible values are the same as for

. Unless you have several LUKS devices, you
don’t have to specify this parameter. The simplest usage is:
Example
rd.luks.key=/foo/bar.key
As you see, you can skip colons in such a case.
Note
Your LUKS partition must match your key file.
dracut provides keys to cryptsetup with
-d
(an older alias
for
--key-file
). This uses the entire binary content of the key file
as part of the secret. If you pipe a password into cryptsetup
without
-d
or
--key-file
, it will be treated as text user input, and
only characters before the first newline will be used. Therefore, when
you’re creating an encrypted partition for dracut to mount, and you
pipe a key into
cryptsetup luksFormat
,you must use
-d -
Here is an example for a key encrypted with GPG (warning:
--batch-mode
will overwrite the device without asking for
confirmation):
gpg --quiet --decrypt rootkey.gpg | \
cryptsetup --batch-mode --key-file - \
luksFormat /dev/sda47
If you use unencrypted key files, just use the key file pathname
instead of the standard input. For a random key with 256 bits of entropy,
you might use:
head -32c /dev/urandom > rootkey.key
cryptsetup --batch-mode --key-file rootkey.key \
luksFormat /dev/sda47
You can also use regular key files on an encrypted
keydev
Compared to using GPG encrypted keyfiles on an unencrypted device
this provides the following advantages:
•you can unlock your disk(s) using multiple
passphrases
•better security by not losing the key stretching
mechanism
To use an encrypted
keydev
you
must
ensure that it
becomes available by using the keyword
keysource
e.g.
rd.luks.uuid=keysource:aaaa
aaaa
being
the uuid of the encrypted
keydev
Example:
Lets assume you have three disks
and
with the uuids
aaaa
bbbb
and
cccc
You want to unlock
and
using keyfile
keyfile
The unlocked volumes be
A'
B'
and
C'
with the uuids
AAAA
BBBB
and
CCCC
keyfile
is saved on
C'
as
/keyfile
One luks keyslot of each
and
is setup
with a passphrase.
Another luks keyslot of each
and
is setup with
keyfile
To boot this configuration you could use:
rd.luks.uuid=aaaa
rd.luks.uuid=bbbb
rd.luks.uuid=keysource:cccc
rd.luks.key=/keyfile:UUID=CCCC
Dracut asks for the passphrase for
and uses the keyfile
to unlock
and
If getting the passphrase for
fails it falls back to asking for the
passphrases for
and
If you want
C'
to stay unlocked, specify a luks name for
it, e.g.
rd.luks.name=cccc=mykeys
, otherwise it gets
closed when not needed anymore.
rd.luks.key.tout=0
specify how many times dracut will try to read the keys
specified in rd.luks.key. This gives a chance to the removable device
containing the key to initialize.
MD RAID
Requires the dracut
mdraid
module.
rd.md=0
disable MD RAID detection
rd.md.imsm=0
disable MD RAID for imsm/isw raids, use DM RAID
instead
rd.md.ddf=0
disable MD RAID for SNIA ddf raids, use DM RAID
instead
rd.md.conf=0
ignore mdadm.conf included in initramfs
rd.md.waitclean=1
wait for any resync, recovery, or reshape activity to
finish before continuing
rd.md.uuid=

only activate the raid sets with the given UUID. This
parameter can be specified multiple times.
DM RAID
Requires the dracut
dmraid
module.
rd.dm=0
disable DM RAID detection
rd.dm.uuid=

only activate the raid sets with the given UUID. This
parameter can be specified multiple times.
MULTIPATH
Requires the dracut
multipath
module.
rd.multipath=0
disable multipath detection
rd.multipath=default
use default multipath settings
FIPS
Requires the dracut
fips
module.
rd.fips
enable FIPS
boot=

specify the device, where /boot is located.
Example
boot=/dev/sda1
boot=/dev/disk/by-path/pci-0000:00:1f.1-scsi-0:0:1:0-part1
boot=UUID=
boot=LABEL=