X-Git-Url: http://git.ipfire.org/?a=blobdiff_plain;f=man%2Fkernel-command-line.xml;h=b67639c92e5709e618e851597161e1d2b6c34c15;hb=6b222c4b0227f9914446ac54754aea867f742be4;hp=903ff924f5677aff6a7765725a0c20c2fc853c8b;hpb=4b381a9ef65d68dc79760b093436a9c81f43fa5d;p=thirdparty%2Fsystemd.git diff --git a/man/kernel-command-line.xml b/man/kernel-command-line.xml index 903ff924f56..b67639c92e5 100644 --- a/man/kernel-command-line.xml +++ b/man/kernel-command-line.xml @@ -27,9 +27,12 @@ Description - The kernel, the initial RAM disk (initrd) and - basic userspace functionality may be configured at boot via - kernel command line arguments. + The kernel, the initial RAM disk (initrd) and basic userspace functionality may be configured at + boot via kernel command line arguments. In addition, various systemd tools look at the EFI variable + SystemdOptions (if available). Both sources are combined, but the kernel command line + has higher priority. Please note that the EFI variable is only used by systemd tools, and is + ignored by the kernel and other user space tools, so it is not a replacement for the kernel + command line. For command line parameters understood by the kernel, please see @@ -59,6 +62,7 @@ systemd.confirm_spawn systemd.service_watchdogs systemd.show_status + systemd.status_unit_format= systemd.log_target= systemd.log_level= systemd.log_location= @@ -103,9 +107,9 @@ systemd.early_core_pattern= During early boot, the generation of core dump files is disabled until a core dump handler (if any) - takes over. This parameter allows to specifies an absolute path where core dump files should be stored until + takes over. This parameter allows specifying an absolute path where core dump files should be stored until a handler is installed. The path should be absolute and may contain specifiers, see - core5 for details. + core5 for details. @@ -267,6 +271,10 @@ rd.udev.exec_delay= udev.event_timeout= rd.udev.event_timeout= + udev.timeout_signal= + rd.udev.timeout_signal= + udev.blockdev_read_only + rd.udev.blockdev_read_only net.ifnames= net.naming-scheme= @@ -389,6 +397,17 @@ + + systemd.cpu_affinity= + + + Overrides the CPU affinity mask for the service manager and the default for all child + processes it forks. This takes precedence over CPUAffinity=, see + systemd-system.conf5 + for details. + + + modules_load= rd.modules_load= @@ -418,8 +437,71 @@ Takes a boolean argument, defaults to on. If off, systemd-firstboot.service8 - will not query the user for basic system settings, even if the system boots up for the first time and the - relevant settings are not initialized yet. + will not query the user for basic system settings, even if the system boots up for the first time and + the relevant settings are not initialized yet. Not to be confused with + systemd.condition-first-boot= (see below), which overrides the result of the + ConditionFirstBoot= unit file condition, and thus controls more than just + systemd-firstboot.service behaviour. + + + + systemd.condition-needs-update= + + Takes a boolean argument. If specified, overrides the result of + ConditionNeedsUpdate= unit condition checks. See + systemd.unit5 for + details. + + + + systemd.condition-first-boot= + + Takes a boolean argument. If specified, overrides the result of + ConditionFirstBoot= unit condition checks. See + systemd.unit5 for + details. Not to be confused with systemd.firstboot= which only controls behaviour + of the systemd-firstboot.service system service but has no effect on the + condition check (see above). + + + + systemd.clock-usec= + + Takes a decimal, numeric timestamp in µs since January 1st 1970, 00:00am, to set the + system clock to. The system time is set to the specified timestamp early during boot. It is not + propagated to the hardware clock (RTC). + + + + systemd.random-seed= + + Takes a base64 encoded random seed value to credit with full entropy to the kernel's + random pool during early service manager initialization. This option is useful in testing + environments where delays due to random pool initialization in entropy starved virtual machines shall + be avoided. + + Note that if this option is used the seed is accessible to unprivileged programs from + /proc/cmdline. This option is hence a security risk when used outside of test + systems, since the (possibly) only seed used for initialization of the kernel's entropy pool might be + easily acquired by unprivileged programs. + + It is recommended to pass 512 bytes of randomized data (as that matches the Linux kernel pool + size), which may be generated with a command like the following: + + dd if=/dev/urandom bs=512 count=1 status=none | base64 -w 0 + + Again: do not use this option outside of testing environments, it's a security risk elsewhere, + as secret key material derived from the entropy pool can possibly be reconstructed by unprivileged + programs. + + + + + systemd.hostname= + + Accepts a hostname to set during early boot. If specified takes precedence over what + is set in /etc/hostname. Note that this does not bar later runtime changes to + the hostname, it simply controls the initial hostname set during early boot. @@ -448,7 +530,8 @@ systemd-backlight@.service8, systemd-rfkill.service8, systemd-hibernate-resume-generator8, - systemd-firstboot.service8 + systemd-firstboot.service8, + bootctl1