Siegfried Vogl:
> /dev/mapper/root is a crypted luks-partition made with "cryptsetup-1.0.6".

Although I don't know what it is, here is my guess.
- it needs to be decrypted.
- who decrypt it? a deamon in userspace, a user process itself, a kernel
  thread or in-place in kernel space? anyway, it accesss
  /dev/mapper/root.
- at first mounting /dev/mapper/root surely exists and the decryptor can
  read the contents from it.
- after switch_root, /dev/mapper/root may not exist or changed from its
  original one.
- the decryptor may access /dev/mapper/root when you execute "find
  /system/roroot".
- the decryptor may not read /dev/mapper/root since it may not exist or
  changed.

If I were you, I would try one of these.
- move /dev/mapper/root as you did to /newroot/system/ramroot.
- restart the decryptor after switch_root.
- mount /system/roroot after switch_root.


J. R. Okajima


------------------------------------------------------------------------------
Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA
-OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise
-Strategies to boost innovation and cut costs with open source participation
-Receive a $600 discount off the registration fee with the source code: SFAD
http://p.sf.net/sfu/XcvMzF8H

Reply via email to