]> git.ipfire.org Git - thirdparty/dracut.git/blob - dracut.asc
1791e406711665ef55b8fd21d422e4a26c90e84c
[thirdparty/dracut.git] / dracut.asc
1 dracut
2 ======
3 Harald Hoyer <harald@redhat.com>
4 v2.0, March 2011
5
6 :language: bash
7
8 = Introduction
9 This section is a modified version of
10 http://en.wikipedia.org/wiki/Initrd which is licensed under the
11 Creative Commons Attribution/Share-Alike License.
12
13 == Definition
14 An _initial ramdisk_ is a temporary file system used in the boot process of the
15 Linux kernel. _initrd_ and _initramfs_ refer to slightly different schemes for
16 loading this file system into memory. Both are commonly used to make
17 preparations before the real root file system can be mounted.
18
19 == Rationale
20 Many Linux distributions ship a single, generic kernel image that is intended to
21 boot as wide a variety of hardware as possible. The device drivers for this
22 generic kernel image are included as loadable modules, as it is not possible to
23 statically compile them all into the one kernel without making it too large to
24 boot from computers with limited memory or from lower-capacity media like floppy
25 disks.
26
27 This then raises the problem of detecting and loading the modules necessary to
28 mount the root file system at boot time (or, for that matter, deducing where or
29 what the root file system is).
30
31 To further complicate matters, the root file system may be on a software RAID
32 volume, LVM, NFS (on diskless workstations), or on an encrypted partition. All
33 of these require special preparations to mount.
34
35 Another complication is kernel support for hibernation, which suspends the
36 computer to disk by dumping an image of the entire system to a swap partition or
37 a regular file, then powering off. On next boot, this image has to be made
38 accessible before it can be loaded back into memory.
39
40 To avoid having to hardcode handling for so many special cases into the kernel,
41 an initial boot stage with a temporary root file system
42 —now dubbed early user space— is used. This root file system would contain
43 user-space helpers that would do the hardware detection, module loading and
44 device discovery necessary to get the real root file system mounted.
45
46 == Implementation
47 An image of this initial root file system (along with the kernel image) must be
48 stored somewhere accessible by the Linux bootloader or the boot firmware of the
49 computer. This can be:
50
51 * The root file system itself
52 * A boot image on an optical disc
53 * A small ext2/ext3 or FAT-formatted partition on a local disk
54 (a _boot partition_)
55 * A TFTP server (on systems that can boot from Ethernet)
56
57 The bootloader will load the kernel and initial root file system image into
58 memory and then start the kernel, passing in the memory address of the image.
59
60 Depending on which algorithms were compiled statically into it, the kernel can
61 currently unpack initrd/initramfs images compressed with gzip, bzip2 and LZMA.
62
63 == Mount preparations
64 dracut can generate a customized initrams image which contains only whatever is
65 necessary to boot some particular computer, such as ATA, SCSI and filesystem
66 kernel modules (host-only mode).
67
68 dracut can also generate a more generic initramfs image (default mode).
69
70 dracut's initramfs starts only with the device name of the root file system (or
71 its UUID) and must discover everything else at boot time. A complex cascade of
72 tasks must be performed to get the root file system mounted:
73
74 * Any hardware drivers that the boot process depends on must be loaded. All
75 kernel modules for common storage devices are packed onto the initramfs and then
76 udev pulls in modules matching the computer's detected hardware.
77
78 * On systems which display a boot rd.splash screen, the video hardware must be
79 initialized and a user-space helper started to paint animations onto the display
80 in lockstep with the boot process.
81
82 * If the root file system is on NFS, dracut does then:
83 ** Bring up the primary network interface.
84 ** Invoke a DHCP client, with which it can obtain a DHCP lease.
85 ** Extract the name of the NFS share and the address of the NFS server from the
86 lease.
87 ** Mount the NFS share.
88
89 * If the root file system appears to be on a software RAID device, there is no
90 way of knowing which devices the RAID volume spans; the standard MD utilities
91 must be invoked to scan all available block devices with a raid signature and
92 bring the required ones online.
93
94 * If the root file system appears to be on a logical volume, the LVM utilities
95 must be invoked to scan for and activate the volume group containing it.
96
97 * If the root file system is on an encrypted block device:
98 ** Invoke a helper script to prompt the user to type in a passphrase and/or
99 insert a hardware token (such as a smart card or a USB security dongle).
100
101 * Create a decryption target with the device mapper.
102
103 dracut uses udev, an event-driven hotplug agent, which invokes helper programs
104 as hardware devices, disk partitions and storage volumes matching certain rules
105 come online. This allows discovery to run in parallel, and to progressively
106 cascade into arbitrary nestings of LVM, RAID or encryption to get at the root
107 file system.
108
109 When the root file system finally becomes visible:
110
111 * Any maintenance tasks which cannot run on a mounted root file system
112 are done.
113 * The root file system is mounted read-only.
114 * Any processes which must continue running (such as the rd.splash screen helper
115 and its command FIFO) are hoisted into the newly-mounted root file system.
116
117 The final root file system cannot simply be mounted over /, since that would
118 make the scripts and tools on the initial root file system inaccessible for any
119 final cleanup tasks. On an initramfs, the initial root file system cannot be
120 rotated away. Instead, it is simply emptied and the final root file system
121 mounted over the top.
122
123 = User Manual
124
125 == Creating an initramfs Image
126 To create a initramfs image, the most simple command is:
127 ----
128 # dracut
129 ----
130
131 This will generate a general purpose initramfs image, with all possible
132 functionality resulting of the combination of the installed dracut modules and
133 system tools. The image is /boot/initramfs-_++<kernel version>++_.img and
134 contains the kernel modules of the currently active kernel with version
135 _++<kernel version>++_.
136
137 If the initramfs image already exists, dracut will display an error message, and
138 to overwrite the existing image, you have to use the --force option.
139 ----
140 # dracut --force
141 ----
142
143 If you want to specify another filename for the resulting image you would issue
144 a command like:
145 ----
146 # dracut foobar.img
147 ----
148
149 To generate an image for a specific kernel version, the command would be:
150 ----
151 # dracut foobar.img 2.6.40-1.rc5.f20
152 ----
153
154 A shortcut to generate the image at the default location for a specific kernel
155 version is:
156 ----
157 # dracut --kver 2.6.40-1.rc5.f20
158 ----
159
160 If you want to create lighter, smaller initramfs images, you may want to specify
161 the --host-only or -H option. Using this option, the resulting image will
162 contain only those dracut modules, kernel modules and filesystems, which are
163 needed to boot this specific machine. This has the drawback, that you can't put
164 the disk on another controller or machine, and that you can't switch to another
165 root filesystem, without recreating the initramfs image. The usage of the
166 --host-only option is only for experts and you will have to keep the broken
167 pieces. At least keep a copy of a general purpose image (and corresponding
168 kernel) as a fallback to rescue your system.
169
170 === Inspecting the Contents
171 To see the contents of the image created by dracut, you can use the lsinitrd tool.
172 ----
173 # lsinitrd /boot/initramfs-$(uname -r).img | less
174 ----
175
176 To display the contents of a file in the initramfs also use the lsinitrd tool:
177 ----
178 # lsinitrd /boot/initramfs-$(uname -r).img /etc/ld.so.conf
179 include ld.so.conf.d/*.conf
180 ----
181
182 === Adding dracut Modules
183 Some dracut modules are turned off by default and have to be activated manually.
184 You can do this by adding the dracut modules to the configuration file
185 _/etc/dracut.conf_ or _/etc/dracut.conf.d/myconf.conf_. See <<dracutconf5>>.
186 You can also add dracut modules on the command line
187 by using the -a or --add option:
188 ----
189 # dracut --add bootchart initramfs-bootchart.img
190 ----
191
192 To see a list of available dracut modules, use the --list-modules option:
193 ----
194 # dracut --list-modules
195 ----
196
197 or, if you have a dracut version earlier than +008+, issue the command:
198 ----
199 # for mod in /usr/lib/dracut/modules.d/*; do echo ${mod##*/??}; done
200 ----
201
202 === Omitting dracut Modules
203 Sometimes you don't want a dracut module to be included for reasons of speed,
204 size or functionality. To do this, either specify the omit_dracutmodules
205 variable in the _dracut.conf_ or _/etc/dracut.conf.d/myconf.conf_ configuration
206 file (see <<dracutconf5>>), or use the -o or --omit option
207 on the command line:
208 ----
209 # dracut -o "multipath lvm" no-multipath-lvm.img
210 ----
211
212 === Adding Kernel Modules
213 If you need a special kernel module in the initramfs, which is not
214 automatically picked up by dracut, you have the use the --add-drivers option
215 on the command line or the drivers vaiable in the _/etc/dracut.conf_
216 or _/etc/dracut.conf.d/myconf.conf_ configuration file (see <<dracutconf5>>):
217 ----
218 # dracut --add-drivers mymod initramfs-with-mymod.img
219 ----
220
221 == Boot parameters
222 The generated initramfs.img file normally does not contain any system
223 configuration files (except for some special exceptions), so the configuration
224 has to be done on the kernel command line. With this flexibility, you can easily
225 boot from a changed root partition, without the need to recompile the initramfs
226 image. So, you could completly change your root partition (move it inside a md
227 raid with encryption and LVM on top), as long as you specify the correct
228 filesystem LABEL or UUID on the kernel command line for your root device, dracut
229 will find it and boot from it.
230
231 The kernel command line usually can be configured in _/boot/grub/grub.conf_, if
232 grub is your bootloader and it also can be edited in the real boot process in
233 the grub menu.
234
235 The kernel command line can also be provided by the dhcp server with the
236 root-path option. See <<NetworkBoot>>.
237
238 For a full reference of all kernel command line parameters, see <<dracut8>>.
239
240 === Specifying the root Device
241 This is the only option dracut really needs to boot from your root partition.
242 Because your root partition can live in various environments, there are a lot of
243 formats for the root= option. The most basic one is root=_++<path to device
244 node>++_:
245 ----
246 root=/dev/sda2
247 ----
248
249 Because device node names can change, dependent on the drive ordering, you are
250 encouraged to use the filesystem identifier (UUID) or filesystem label (LABEL)
251 to specify your root partition:
252 ----
253 root=UUID=19e9dda3-5a38-484d-a9b0-fa6b067d0331
254 ----
255
256 or
257
258 ----
259 root=LABEL=myrootpartitionlabel
260 ----
261
262 To see all UUIDs or LABELs on your system, do:
263 ----
264 # ls -l /dev/disk/by-uuid
265 ----
266
267 or
268
269 ----
270 # ls -l /dev/disk/by-label
271 ----
272
273 If your root partition is on the network see <<NetworkBoot>>.
274
275 === Keyboard Settings
276 If you have to input passwords for encrypted disk volumes, you might want to set
277 the keyboard layout and specify a display font.
278
279 A typical german kernel command would contain:
280 ----
281 vconsole.font=latarcyrheb-sun16 vconsole.keymap=de-latin1-nodeadkeys locale.LANG=de_DE.UTF-8
282 ----
283
284 Setting these options can override the setting stored on your system, if you use
285 a modern init system, like systemd.
286
287 For dracut versions prior to version +008+ the line would look like:
288 ----
289 LANG=de_DE.UTF-8 SYSFONT=latarcyrheb-sun16 KEYBOARDTYPE=pc KEYTABLE=de-latin1-nodeadkeys
290 ----
291
292 === Blacklisting Kernel Modules
293 Sometimes it is required to prevent the automatic kernel module loading of a
294 specific kernel module. To do this, just add rd.blacklist=_++<kernel module
295 name>++_, with _++<kernel module name>++_ not containing the _.ko_
296 suffix, to the kernel command line. For example:
297 ----
298 rd.driver.blacklist=mptsas rd.driver.blacklist=nouveau
299 ----
300
301 The option can be specified multiple times on the kernel command line.
302
303 === Speeding up the Boot Process
304 If you want to speed up the boot process, you can specify as much information
305 for dracut on the kernel command as possible. For example, you can tell dracut,
306 that you root partition is not on a LVM volume or not on a raid partition, or
307 that it lives inside a specific crypto LUKS encrypted volume. By default, dracut
308 searches everywhere. A typical dracut kernel command line for a plain primary or
309 logical partition would contain:
310 ----
311 rd.luks=0 rd.lvm=0 rd.md=0 rd.dm=0
312 ----
313
314 On systems with dracut version prior to +008+ the line would look like:
315 ----
316 rd_NO_LUKS rd_NO_LVM rd_NO_MD rd_NO_DM
317 ----
318
319 This turns off every automatic assembly of LVM, MD raids, DM raids and crypto LUKS.
320
321 Of course, you could also omit the dracut modules in the initramfs creation
322 process, but then you would lose the posibility to turn it on on demand.
323
324
325 [[Injecting]]
326 === Injecting custom Files
327 To add your own files to the initramfs image, you have several possibilities.
328
329 The --include option let you specify a source path and a target path. For example
330 ----
331 # dracut --include cmdline-preset /etc/cmdline initramfs-cmdline-pre.img
332 ----
333 will create an initramfs image, where the file cmdline-preset will be copied
334 inside the initramfs to _/etc/cmdline_. --include can only be specified once.
335
336
337 ----
338 # mkdir rd.live.overlay
339 # mkdir rd.live.overlay/etc
340 # mkdir rd.live.overlay/etc/conf.d
341 # echo "ip=auto" >> rd.live.overlay/etc/cmdline
342 # echo export TESTVAR=testtest >> rd.live.overlay/etc/conf.d/testvar.conf
343 # echo export TESTVAR=testtest >> rd.live.overlay/etc/conf.d/testvar.conf
344 # tree rd.live.overlay/
345 rd.live.overlay/
346 └── etc
347 ├── cmdline
348 └── conf.d
349 └── testvar.conf
350 # dracut --include rd.live.overlay / initramfs-rd.live.overlay.img
351 ----
352
353 This will put the contents of the rd.live.overlay directory into the root of the
354 initramfs image.
355
356 The --install option let you specify several files, which will get installed in
357 the initramfs image at the same location, as they are present on initramfs
358 creation time.
359
360
361 ----
362 # dracut --install 'strace fsck.ext3 ssh' initramfs-dbg.img
363 ----
364
365 This will create an initramfs with the strace, fsck.ext3 and ssh executables,
366 together with the libraries needed to start those. The --install option can be
367 specified multiple times.
368
369
370 [[NetworkBoot]]
371 == Network Boot
372
373 If your root partition is on a network drive, you have to have the network
374 dracut modules installed to create a network aware initramfs image.
375
376 On a Red Hat Enterprise Linux or Fedora system, this means, you have to install
377 the _dracut-network_ rpm package:
378
379
380 ----
381 # yum install dracut-network
382 ----
383
384 The resulting initramfs image can be served by a boot manager residing on your
385 local hard drive or it can be served by a PXE/TFTP server.
386
387 How to setup your PXE/TFTP server can be found in the
388 http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Storage_Administration_Guide/[Red
389 Hat Enterprise Linux Storage Administration Guide].
390
391 If you specify rd.ip=auto on the kernel command line, then dracut asks a dhcp
392 server about the ip adress for the machine. The dhcp server can also serve an
393 additional root-path, which will set the root device for dracut. With this
394 mechanism, you have static configuration on your client machine and a
395 centralized boot configuration on your TFTP/DHCP server. If you can't pass a
396 kernel command line, then you can inject _/etc/cmdline_, with a method described
397 in <<Injecting>>.
398
399
400
401
402 === Reducing the Image Size
403
404 To reduce the size of the initramfs, you should create it with by ommitting all
405 dracut modules, which you know, you don't need to boot the machine.
406
407 You can also specify the exact dracut and kernel modules to produce a very tiny
408 initramfs image.
409
410 For example for a NFS image, you would do:
411
412
413 ----
414 # dracut -m "nfs network base" initramfs-nfs-only.img
415 ----
416
417 Then you would boot from this image with your target machine and reduce the size
418 once more by creating it on the target machine with the --host-only option:
419
420
421 ----
422 # dracut -m "nfs network base" --host-only initramfs-nfs-host-only.img
423 ----
424
425 This will reduce the size of the initramfs image significantly.
426
427
428
429 === NFS Root Device
430
431 FIXME
432
433 === iSCSI Root Device
434
435 FIXME
436
437 === FCoE Root Device
438
439 FIXME
440
441 == Troubleshooting
442
443 If the boot process does not succeed, you have several options to debug the
444 situation. Some of the basic operations are covered here. For more information
445 you should also visit:
446 http://fedoraproject.org/wiki/How_to_debug_Dracut_problems
447
448
449 [[identifying-your-problem-area]]
450 === Identifying your problem area
451 . Remove ''rhgb'' and ''quiet'' from the kernel command line
452 . Add ''rd.shell'' to the kernel command line. This will present a shell should
453 dracut be unable to locate your root device
454 . Add ''rd.shell rd.debug log_buf_len=1M'' to the kernel command line so that
455 dracut shell commands are printed as they are executed
456 . With dracut >= 002-11, you can inspect the rd.debug output with:
457 +
458 ----
459 # less /run/initramfs/init.log
460 # dmesg | less
461 ----
462 . With dracut >= 022 and systemd, you can inspect the rd.debug output with:
463 ----
464 # journalctl -ab
465 ----
466
467 If you want to save that output, simply mount /boot by hand or insert an USB stick and mount that.
468 Then you can store the output for later inspection.
469
470 [[information-to-include-in-your-report]]
471 === Information to include in your report
472
473 [[all-bug-reports]]
474 ==== All bug reports
475 In all cases, the following should be mentioned and attached to your bug report:
476
477 * The exact kernel command-line used. Typically from the bootloader
478 configuration file (e.g. _/etc/grub.conf_) or from _/proc/cmdline_.
479 * A copy of your disk partition information from _/etc/fstab_, which might be
480 obtained booting an old working initramfs or a rescue medium.
481 * A device listing from device-mapper. This can be obtained by running the
482 command
483 +
484 ----
485 # dmsetup ls --tree
486 ----
487 +
488 * A list of block device attributes. This can be obtained by running the commands:
489 +
490 ----
491 # blkid -p
492 # blkid -p -o udev
493 ----
494 * Turn on dracut debugging (see _the 'debugging dracut' section_), and attach
495 all relevant information from the boot log. This can be obtained by running the
496 command
497 +
498 ----
499 # dmesg|grep dracut
500 ----
501 +
502 * If you use a dracut configuration file, please include _/etc/dracut.conf_ and
503 all files in _/etc/dracut.conf.d/*.conf_
504
505 [[logical-volume-management-related-problems]]
506 ==== Logical Volume Management related problems
507 As well as the information from <<all-bug-reports>> include the following
508 information:
509
510 * Include physical volume information by running the command:
511 +
512 ----
513 # lvm pvdisplay
514 ----
515 +
516 * Include volume group information by running the command:
517 +
518 ----
519 # lvm vgdisplay
520 ----
521 +
522 * Include logical volume information by running the command:
523 +
524 ----
525 # lvm lvdisplay
526 ----
527
528 [[software-raid-related-problems]]
529 ==== Software RAID related problems
530 As well as the information from <<all-bug-reports>>, include the following
531 information:
532
533 * If using software RAID disk partitions, please include the output of
534 +
535 ----
536 # cat /proc/mdstat
537 ----
538
539 [[network-root-device-related-problems]]
540 ==== Network root device related problems
541 This section details information to include when experiencing problems on a
542 system whose root device is located on a network attached volume (e.g. iSCSI,
543 NFS or NBD). As well as the information from <<all-bug-reports>>, include the
544 following information:
545
546
547 * Please include the output of
548 +
549 ----
550 # /sbin/ifup <interfacename>
551 # ip addr show
552 ----
553
554 [[debugging-dracut]]
555 === Debugging dracut
556
557
558 [[configure-a-serial-console]]
559 ==== Configure a serial console
560
561 Successfully debugging dracut will require some form of console
562 logging during the system boot. This section documents configuring a
563 serial console connection to record boot messages.
564
565 . First, enable serial console output for both the kernel and the bootloader.
566 . Open the file _/etc/grub.conf_ for editing. Below the line ''timeout=5'', add
567 the following:
568 +
569 ----
570 serial --unit=0 --speed=9600
571 terminal --timeout=5 serial console
572 ----
573 +
574 . Also in _/etc/grub.conf_, add the following boot arguemnts to the ''kernel''
575 line:
576 +
577 ----
578 console=tty0 console=ttyS0,9600
579 ----
580 +
581 . When finished, the _/etc/grub.conf_ file should look similar to the example
582 below.
583 +
584 ----
585 default=0
586 timeout=5
587 serial --unit=0 --speed=9600
588 terminal --timeout=5 serial console
589 title Fedora (2.6.29.5-191.fc11.x86_64)
590 root (hd0,0)
591 kernel /vmlinuz-2.6.29.5-191.fc11.x86_64 ro root=/dev/mapper/vg_uc1-lv_root console=tty0 console=ttyS0,9600
592 initrd /dracut-2.6.29.5-191.fc11.x86_64.img
593 ----
594 +
595 . More detailed information on how to configure the kernel for console output
596 can be found at
597 http://www.faqs.org/docs/Linux-HOWTO/Remote-Serial-Console-HOWTO.html#CONFIGURE-KERNEL.
598 . Redirecting non-interactive output
599 +
600 --
601 NOTE: You can redirect all non-interactive output to _/dev/kmsg_ and the kernel
602 will put it out on the console when it reaches the kernel buffer by doing
603
604 ----
605 # exec >/dev/kmsg 2>&1 </dev/console
606 ----
607 --
608
609 [[using-the-dracut-shell]]
610 ==== Using the dracut shell
611
612 Dracut offers a shell for interactive debugging in the event dracut fails to
613 locate your root filesystem. To enable the shell:
614
615 . Add the boot parameter ''rd.shell'' to your bootloader configuration file
616 (e.g. _/etc/grub.conf_)
617 . Remove the boot arguments ''rhgb'' and ''quiet''
618 +
619 A sample _/etc/grub.conf_ bootloader configuration file is listed below.
620 +
621 ----
622 default=0
623 timeout=5
624 serial --unit=0 --speed=9600
625 terminal --timeout=5 serial console
626 title Fedora (2.6.29.5-191.fc11.x86_64)
627 root (hd0,0)
628 kernel /vmlinuz-2.6.29.5-191.fc11.x86_64 ro root=/dev/mapper/vg_uc1-lv_root console=tty0 rd.shell
629 initrd /dracut-2.6.29.5-191.fc11.x86_64.img
630 ----
631 +
632 . If system boot fails, you will be dropped into a shell as seen in the example below.
633 +
634 ----
635 No root device found
636 Dropping to debug shell.
637
638 #
639 ----
640 +
641 . Use this shell prompt to gather the information requested above (see <<all-bug-reports>>).
642
643 [[accessing-the-root-volume-from-the-dracut-shell]]
644 ==== Accessing the root volume from the dracut shell
645 From the dracut debug shell, you can manually perform the task of locating and
646 preparing your root volume for boot. The required steps will depend on how your
647 root volume is configured. Common scenarios include:
648
649 * A block device (e.g. _/dev/sda7_)
650 * A LVM logical volume (e.g. _/dev/VolGroup00/LogVol00_)
651 * An encrypted device (e.g. _/dev/mapper/luks-4d5972ea-901c-4584-bd75-1da802417d83_)
652 * A network attached device (e.g. netroot=iscsi:@192.168.0.4::3260::iqn.2009-02.org.fedoraproject:for.all)
653
654 The exact method for locating and preparing will vary. However, to continue with
655 a successful boot, the objective is to locate your root volume and create a
656 symlink _/dev/root_ which points to the file system. For example, the following
657 example demonstrates accessing and booting a root volume that is an encrypted
658 LVM Logical volume.
659
660 . Inspect your partitions using parted
661 +
662 ----
663 # parted /dev/sda -s p
664 Model: ATA HTS541060G9AT00 (scsi)
665 Disk /dev/sda: 60.0GB
666 Sector size (logical/physical): 512B/512B
667 Partition Table: msdos
668 Number Start End Size Type File system Flags
669 1 32.3kB 10.8GB 107MB primary ext4 boot
670 2 10.8GB 55.6GB 44.7GB logical lvm
671 ----
672 +
673 . You recall that your root volume was a LVM logical volume. Scan and activate
674 any logical volumes.
675 +
676 ----
677 # lvm vgscan
678 # lvm vgchange -ay
679 ----
680 +
681 . You should see any logical volumes now using the command blkid:
682 +
683 ----
684 # blkid
685 /dev/sda1: UUID="3de247f3-5de4-4a44-afc5-1fe179750cf7" TYPE="ext4"
686 /dev/sda2: UUID="Ek4dQw-cOtq-5MJu-OGRF-xz5k-O2l8-wdDj0I" TYPE="LVM2_member"
687 /dev/mapper/linux-root: UUID="def0269e-424b-4752-acf3-1077bf96ad2c" TYPE="crypto_LUKS"
688 /dev/mapper/linux-home: UUID="c69127c1-f153-4ea2-b58e-4cbfa9257c5e" TYPE="ext3"
689 /dev/mapper/linux-swap: UUID="47b4d329-975c-4c08-b218-f9c9bf3635f1" TYPE="swap"
690 ----
691 +
692 . From the output above, you recall that your root volume exists on an encrypted
693 block device. Following the guidance disk encryption guidance from the
694 Installation Guide, you unlock your encrypted root volume.
695 +
696 ----
697 # UUID=$(cryptsetup luksUUID /dev/mapper/linux-root)
698 # cryptsetup luksOpen /dev/mapper/linux-root luks-$UUID
699 Enter passphrase for /dev/mapper/linux-root:
700 Key slot 0 unlocked.
701 ----
702 +
703 . Next, make a symbolic link to the unlocked root volume
704 +
705 ----
706 # ln -s /dev/mapper/luks-$UUID /dev/root
707 ----
708 +
709 . With the root volume available, you may continue booting the system by exiting
710 the dracut shell
711 +
712 ----
713 # exit
714 ----
715
716 [[additional-dracut-boot-parameters]]
717 ==== Additional dracut boot parameters
718 For more debugging options, see <<dracutkerneldebug>> in <<dracutcmdline7>>.
719
720 = Developer Manual
721
722 == dracut Components
723
724 dracut uses a modular system to build and extend the initramfs image. All
725 modules are located in _/usr/lib/dracut/modules.d_ or in _<git-src>/modules.d_.
726 The most basic dracut module is _99base_. In _99base_ the initial shell script
727 init is defined, which gets run by the kernel after initramfs loading. Although
728 you can replace init with your own version of _99base_, this is not encouraged.
729 Instead you should use, if possible, the hooks of dracut. All hooks, and the
730 point of time in which they are executed, are described in <<stages>>.
731
732 The main script, which creates the initramfs is dracut itsself. It parses all
733 arguments and sets up the directory, in which everything is installed. It then
734 executes all check, install, installkernel scripts found in the modules, which
735 are to be processed. After everything is installed, the install directory is
736 archived and compressed to the final initramfs image. All helper functions used
737 by check, install and installkernel are found in in the file _dracut-functions_.
738 These shell functions are available to all module installer (install,
739 installkernel) scripts, without the need to source _dracut-functions_.
740
741 A module can check the preconditions for install and installkernel with the
742 check script. Also dependencies can be expressed with check. If a module passed
743 check, install and installkernel will be called to install all of the necessary
744 files for the module. To split between kernel and non-kernel parts of the
745 installation, all kernel module related parts have to be in installkernel. All
746 other files found in a module directory are module specific and mostly are hook
747 scripts and udev rules.
748
749
750 [[stages]]
751 == Boot Process Stages
752
753 The init script in _99base_ is the main script, which prepares the root file
754 system for usage, runs udev, mounts the real root device, kills the remaining
755 processes, and switches to the real root device for further booting. dracut
756 modules can insert custom script at various points, to control the boot process.
757 These hooks are plain directories containing shell scripts ending with ".sh",
758 which are sourced by init.
759 Common used functions are in _dracut-lib.sh_, which can be sourced by any script.
760
761
762
763 === Basic Setup
764
765 The first thing init does, is to mount _/proc_ and _/sys_ and manually create
766 the basic device nodes and symbolic links in _/dev_ needed to execute basic
767 commands. Then logging is setup according to kernel command line arguments.
768 _/dev/pts_ and _/dev/shm_ are mounted and the first hook is sourced.
769
770
771
772 === Hook: cmdline
773
774 The _cmdline_ hook is a place to insert scripts to parse the kernel command line
775 and prepare the later actions, like setting up udev rules and configuration
776 files.
777
778 In this hook the most important environment variable is defined: root. The
779 second one is rootok, which indicates, that a module claimed to be able to parse
780 the root defined. So for example, **root=**__iscsi:....__ will be claimed by the
781 iscsi dracut module, which then sets rootok.
782
783 === Hook: pre-udev
784
785 This hook is executed right after the cmdline hook and a check if root and
786 rootok were set. Here modules can take action with the final root, and before
787 udev has been run.
788
789
790
791 === Start Udev
792
793 Now udev is started and the logging for udev is setup.
794
795
796
797 === Hook: pre-trigger
798
799 In this hook, you can set udev environment variables with **udevadm control
800 --property=KEY=_value_** or control the further execution of udev with
801 udevadm.
802
803
804
805 === Trigger Udev
806
807 udev is triggered by calling udevadm trigger, which sends add events for all
808 devices and subsystems.
809
810
811
812 === Main Loop
813
814 Now the main loop of 99base/init begins. Here we loop until udev has settled and
815 all scripts in _initqueue/finished_ returned true. In this loop there are three
816 hooks, where scripts can be inserted by calling /sbin/initqueue.
817
818
819
820 ==== Initqueue
821
822 This hook gets executed every time a script is inserted here, regardless of the
823 udev state.
824
825
826
827 ==== Initqueue settled
828
829 This hooks gets executed every time udev has settled.
830
831
832
833 ==== Initqueue timeout
834
835 This hooks gets executed, when the main loop counter becomes half of the
836 rd.retry counter.
837
838
839
840 ==== Initqueue finished
841
842 This hook is called after udev has settled and if all scripts herein return 0
843 the main loop will be ended.
844
845
846
847 === Hook: pre-mount
848
849 Before the root device is mounted all scripts in the hook pre-mount are
850 executed. In some cases (e.g. NFS) the real root device is already mounted,
851 though.
852
853
854
855 === Hook: mount
856
857 This hook is mainly to mount the real root device.
858
859
860
861 === Hook: pre-pivot
862
863 This hook is called before cleanup hook, This is a good place for
864 actions other than cleanups which need to be called before pivot.
865
866
867 === Hook: cleanup
868
869 This hook is the last hook and is called before init finally switches root to
870 the real root device. This is a good place to clean up and kill processes not
871 needed anymore.
872
873
874 === Cleanup and switch_root
875
876 Init kills all udev processes, cleans up the environment, sets up the arguments
877 for the real init process and finally calls switch_root. switch_root removes the
878 whole filesystem hierarchy of the initramfs, chroot()s to the real root device
879 and calls /sbin/init with the specified arguments.
880
881 To ensure all files in the initramfs hierarchy can be removed, all processes
882 still running from the initramfs should not have any open file descriptors left.
883
884
885
886 == Network Infrastructure
887
888
889 FIXME
890
891
892 == Writing a Module
893
894 A simple example module is _96insmodpost_, which modprobes a kernel module after
895 udev has settled and the basic device drivers have been loaded.
896
897 All module installation information is in the file module-setup.sh.
898
899 First we create a check() function, which just exits with 0 indicating that this
900 module should be included by default.
901
902 check():
903
904
905 ----
906 return 0
907 ----
908
909 The we create the install() function, which installs a cmdline hook with
910 priority number 20 called _parse-insmodpost.sh_. It also installs the
911 _insmodpost.sh_ script in _/sbin_.
912
913 install():
914
915
916 ----
917 inst_hook cmdline 20 "$moddir/parse-insmodpost.sh"
918 inst_simple "$moddir/insmodpost.sh" /sbin/insmodpost.sh
919 ----
920
921 The _pase-instmodpost.sh_ parses the kernel command line for a argument
922 rd.driver.post, blacklists the module from being autoloaded and installs the
923 hook _insmodpost.sh_ in the _initqueue/settled_.
924
925 _parse-insmodpost.sh_:
926
927
928 ----
929 for p in $(getargs rd.driver.post=); do
930 echo "blacklist $p" >> /etc/modprobe.d/initramfsblacklist.conf
931 _do_insmodpost=1
932 done
933
934 [ -n "$_do_insmodpost" ] && /sbin/initqueue --settled --unique --onetime /sbin/insmodpost.sh
935 unset _do_insmodpost
936
937 ----
938
939 _insmodpost.sh_, which is called in the _initqueue/settled_ hook will just
940 modprobe the kernel modules specified in all rd.driver.post kernel command line
941 parameters. It runs after udev has settled and is only called once (--onetime).
942
943 _insmodpost.sh_:
944
945
946 ----
947 . /lib/dracut-lib.sh
948
949 for p in $(getargs rd.driver.post=); do
950 modprobe $p
951 done
952
953 ----
954
955
956
957 === check()
958
959 _check()_ is called by dracut to evaluate the inclusion of a dracut module in
960 the initramfs.
961
962 $hostonly:: If the $hostonly variable is set, then the module check() function
963 should be in "hostonly" mode, which means, that the check() should only return
964 0, if the module is really needed to boot this specific host.
965
966 check() should return with:
967
968 0:: Include the dracut module in the initramfs.
969
970 1:: Do not include the dracut module. The requirements are not fullfilled
971 (missing tools, etc.)
972
973 255:: Only include the dracut module, if another module requires it or if
974 explicitly specified in the config file or on the argument list.
975
976
977
978 === depends()
979
980 The function depends() should echo all other dracut module names the module
981 depends on.
982
983
984
985 === install()
986
987 dracut_install
988
989 inst
990
991 inst_hook
992
993 inst_rules
994
995
996
997
998
999 === installkernel()
1000
1001 instmods
1002
1003
1004
1005 === Creation Functions
1006
1007
1008 FIXME
1009
1010
1011 === Initramfs Functions
1012
1013
1014 FIXME
1015
1016
1017 === Network Modules
1018
1019 FIXME
1020
1021
1022 :leveloffset: 1
1023 [[dracut8]]
1024 include::dracut.8.asc[]
1025
1026 [[dracutconf5]]
1027 include::dracut.conf.5.asc[]
1028
1029 [[dracutcmdline7]]
1030 include::dracut.cmdline.7.asc[]
1031
1032 [[lsinitrd1]]
1033 include::lsinitrd.1.asc[]
1034
1035 [[mkinitrd8]]
1036 include::mkinitrd.8.asc[]
1037
1038 :leveloffset: 0
1039 [appendix]
1040 License
1041 -------
1042 This work is licensed under the Creative Commons Attribution/Share-Alike
1043 License. To view a copy of this license, visit
1044 http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to Creative
1045 Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
1046