[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20260111125635.53682-1-lillian@star-ark.net>
Date: Sun, 11 Jan 2026 07:56:35 -0500
From: Lillian Berry <lillian@...r-ark.net>
To: Ahmad Fatoum <a.fatoum@...gutronix.de>,
linux-kernel@...r.kernel.org
Cc: Andrew Morton <akpm@...ux-foundation.org>,
Al Viro <viro@...iv.linux.org.uk>,
Leonard Goehrs <lgo@...gutronix.de>,
"kernel @ pengutronix . de" <kernel@...gutronix.de>,
Lillian Berry <lillian@...r-ark.net>
Subject: [PATCH] init/main.c: check if rdinit was explicitly set before printing warning
The rdinit parameter is set by default, and attempted during boot even
if not specified in the command line. Only print the warning about
rdinit being inaccessible if the rdinit value was found in command line;
it's just noise otherwise.
Signed-off-by: Lillian Berry <lillian@...r-ark.net>
---
init/main.c | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/init/main.c b/init/main.c
index b84818ad9685..522fdc9b1a25 100644
--- a/init/main.c
+++ b/init/main.c
@@ -162,6 +162,7 @@ static size_t initargs_offs;
static char *execute_command;
static char *ramdisk_execute_command = "/init";
+static bool ramdisk_execute_command_set;
/*
* Used to generate warnings if static_key manipulation functions are used
@@ -623,6 +624,7 @@ static int __init rdinit_setup(char *str)
unsigned int i;
ramdisk_execute_command = str;
+ ramdisk_execute_command_set = true;
/* See "auto" comment in init_setup */
for (i = 1; i < MAX_INIT_ARGS; i++)
argv_init[i] = NULL;
@@ -1699,8 +1701,9 @@ static noinline void __init kernel_init_freeable(void)
int ramdisk_command_access;
ramdisk_command_access = init_eaccess(ramdisk_execute_command);
if (ramdisk_command_access != 0) {
- pr_warn("check access for rdinit=%s failed: %i, ignoring\n",
- ramdisk_execute_command, ramdisk_command_access);
+ if (ramdisk_execute_command_set)
+ pr_warn("check access for rdinit=%s failed: %i, ignoring\n",
+ ramdisk_execute_command, ramdisk_command_access);
ramdisk_execute_command = NULL;
prepare_namespace();
}
--
2.47.3
Powered by blists - more mailing lists