From patchwork Fri Jun 30 23:33:28 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Paul E. McKenney" X-Patchwork-Id: 114929 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp10730914vqr; Fri, 30 Jun 2023 16:55:43 -0700 (PDT) X-Google-Smtp-Source: APBJJlGLX6wTAieDUjNDNhj1IXoYzNpExlbIqXGwtDMXKiECHA5bi1DGXaCkxvhUvCU/S/JDhTyv X-Received: by 2002:a05:6359:29b:b0:133:9da:8d9f with SMTP id ek27-20020a056359029b00b0013309da8d9fmr3720851rwb.14.1688169342849; Fri, 30 Jun 2023 16:55:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688169342; cv=none; d=google.com; s=arc-20160816; b=ci+eGpqtspzSrz0AC++WPOUKma1UQ/jwLRew6EcDAYAtvwS6PIbmvQTnP8C3Obi0wO jgy3FYRobV1xthGXAIqtLKjqY86+UVxbZKLqGo7pITQ5gFoh+qs3/lEZUS4Ex76VSmwY XQZMA/4Qm2Kg403H+CdXyd4vrASb2mPcZ9eQNXf7Fy/Jg618gKFRGfgDhPad+6/wZmX4 s+ZiHckugBlSAKOMjy42lUBbVyAYQxgvYMDFV/vqJNtFEgyAEsO4DM3oYIRPZTrPuUDn tNV7+XO9kMPHBDn0USpCMiZ7j1+iciXGIaFJARGdYbmIsYZOVOBa2pP/IVHJbt2sgzk1 niBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:reply-to :message-id:subject:cc:to:from:date:dkim-signature; bh=XxIbxWBeFZvVXpm454BdFtSxzwWtWoOMy9sYJ4SI1jc=; fh=tIMMPuXR1XNY3CezWOwvefV6DjURmzZCpbBEJYWud+8=; b=jrwP8P6ZrGsH5teH0VlQxWm2h5Xf1iFSyur/M8PktXUbTBRK0xvBblba8QJR7LPEqH yMb7mu4pH7eFtCDuNvGx6m2zN/WG1Y/brwaMPiAp+A9Ck9JLwWYeJl2T0EyoGDzsnaby dYPVQbibkUaTY5lVvr67wD81AnAPElUimrzmne7U9IXJN2hydF4SIyyT2t7iMs67/gE3 QklPQiE1QR5UijTDbCEWSIuEX1jyMj5BESL53QhNORu0ywffaoLgy+qYeg1PzrO6NgWo I1KwVo/ufKsqYnykXME85quFjF3Rvmsks/9LO0UTuJ/bIBCRNX7rYnCM45k5e2IW6HUa scMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YU7Eg+Ga; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k24-20020a170902761800b001b8142bfb5csi8581291pll.296.2023.06.30.16.55.29; Fri, 30 Jun 2023 16:55:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YU7Eg+Ga; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231888AbjF3Xdc (ORCPT + 99 others); Fri, 30 Jun 2023 19:33:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43554 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229518AbjF3Xda (ORCPT ); Fri, 30 Jun 2023 19:33:30 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BE1DB2683; Fri, 30 Jun 2023 16:33:29 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 28BAA617A2; Fri, 30 Jun 2023 23:33:29 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8B52CC433C8; Fri, 30 Jun 2023 23:33:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1688168008; bh=wdXvIBgn1eGmE8h6DFbUHlgk1I7I6DDYfxIPFTNXd3A=; h=Date:From:To:Cc:Subject:Reply-To:From; b=YU7Eg+Ga36QQjMRUaRU8a3Vw337utJjr48orn4ggxTHq2CG+59LHfEQDV9Z9rOanN xsaI2ZtkWvfXaw2tXWqLVQT7gEfAinwl7nMHk/8n/TMYoEY/5G97RoFcTYkKQ4IuJ9 a1CD2tmAXeMMQu9aYOmRCihBeU4oQ8xAR//I39toUW1OImgar63fvenF5MxmxurCkm sUI+jw7l34dHH7samaWjC1xskVFgo+EJ7XjyqpHibVQ4Ry2myCXoBv5F7aqsKNhCmP TTAoRTixcHpy5gefgWZjalfUah839YWLhYRnpeN3rsG4N5Gx8m5HWyR7PERoqF9HNn Ydzh72Ua5hIgA== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id 2AE91CE0DEA; Fri, 30 Jun 2023 16:33:28 -0700 (PDT) Date: Fri, 30 Jun 2023 16:33:28 -0700 From: "Paul E. McKenney" To: mtk.manpages@gmail.com Cc: mhiramat@kernel.org, corbet@lwn.net, akpm@linux-foundation.org, ndesaulniers@google.com, vbabka@suse.cz, hannes@cmpxchg.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] proc.5: Clarify that boot arguments can be embedded in image Message-ID: <433d742b-743b-4335-878f-1ca0f45698f7@paulmck-laptop> Reply-To: paulmck@kernel.org MIME-Version: 1.0 Content-Disposition: inline X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1770173856815372404?= X-GMAIL-MSGID: =?utf-8?q?1770173856815372404?= With the advent of the CONFIG_BOOT_CONFIG Kconfig option, kernel boot arguments can now be embedded in the kernel image, either attached to the end of initramfs or embedded in the kernel itself. Document this possibility in the /proc/cmdline entry of proc.5. Signed-off-by: Paul E. McKenney Cc: Michael Kerrisk Cc: Masami Hiramatsu Cc: Jonathan Corbet Cc: Andrew Morton Cc: Nick Desaulniers Cc: Vlastimil Babka Cc: Johannes Weiner Reviewed-by: Masami Hiramatsu (Google) diff --git a/man5/proc.5 b/man5/proc.5 index c6684620e..141a2983c 100644 --- a/man5/proc.5 +++ b/man5/proc.5 @@ -3100,6 +3100,9 @@ Often done via a boot manager such as .BR lilo (8) or .BR grub (8). +Any arguments embedded in the kernel image or initramfs via +.B CONFIG_BOOT_CONFIG +will also be displayed. .TP .IR /proc/config.gz " (since Linux 2.6)" This file exposes the configuration options that were used