Siegfried Vogl: > /dev/mapper/root is a crypted luks-partition made with "cryptsetup-1.0.6".
Although I don't know what it is, here is my guess. - it needs to be decrypted. - who decrypt it? a deamon in userspace, a user process itself, a kernel thread or in-place in kernel space? anyway, it accesss /dev/mapper/root. - at first mounting /dev/mapper/root surely exists and the decryptor can read the contents from it. - after switch_root, /dev/mapper/root may not exist or changed from its original one. - the decryptor may access /dev/mapper/root when you execute "find /system/roroot". - the decryptor may not read /dev/mapper/root since it may not exist or changed. If I were you, I would try one of these. - move /dev/mapper/root as you did to /newroot/system/ramroot. - restart the decryptor after switch_root. - mount /system/roroot after switch_root. J. R. Okajima ------------------------------------------------------------------------------ Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA -OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise -Strategies to boost innovation and cut costs with open source participation -Receive a $600 discount off the registration fee with the source code: SFAD http://p.sf.net/sfu/XcvMzF8H
