Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752138AbdHNSho (ORCPT ); Mon, 14 Aug 2017 14:37:44 -0400 Received: from relmlor4.renesas.com ([210.160.252.174]:39694 "EHLO relmlie3.idc.renesas.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750910AbdHNShm (ORCPT ); Mon, 14 Aug 2017 14:37:42 -0400 X-IronPort-AV: E=Sophos;i="5.41,374,1498489200"; d="scan'208";a="253487450" From: Chris Brandt To: Nicolas Pitre CC: Alexander Viro , "linux-fsdevel@vger.kernel.org" , "linux-embedded@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: RE: [PATCH 0/5] cramfs refresh for embedded usage Thread-Topic: [PATCH 0/5] cramfs refresh for embedded usage Thread-Index: AQHTEtdFT0/wwlN9sk6l1Kak7eVmpaKEGObggAAH1ICAAAY+sIAABmYAgAAD8RA= Date: Mon, 14 Aug 2017 18:37:37 +0000 Message-ID: References: <20170811192252.19062-1-nicolas.pitre@linaro.org> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=Chris.Brandt@renesas.com; x-originating-ip: [4.59.13.106] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;SG2PR06MB1166;20:NlTNkaR5xVnrUumbFq8AeiL6S5EJXt7hvcD0jeQrAXN/2qkzSM7LQj3JrrZy/7+4pUvgn0GyoOC91+A8U0HSEJB5PEld9yzkeC9XXpwmZzIVzNpB8/0JQfLxolXyKK98N/OwgaxvTGL8M8rtny68QpFW0A3nhfugBdyfJF09n6A= x-ms-exchange-antispam-srfa-diagnostics: SSOS; x-ms-office365-filtering-correlation-id: 17e1e1f4-59fe-4a2a-4aba-08d4e3438988 x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(300000502095)(300135100095)(22001)(2017030254152)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);SRVR:SG2PR06MB1166; x-ms-traffictypediagnostic: SG2PR06MB1166: x-exchange-antispam-report-test: UriScan:; x-microsoft-antispam-prvs: x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(3002001)(6055026)(6041248)(20161123562025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123560025)(20161123564025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:SG2PR06MB1166;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:SG2PR06MB1166; x-forefront-prvs: 039975700A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(39860400002)(189002)(199003)(24454002)(68736007)(189998001)(7696004)(4326008)(9686003)(3280700002)(110136004)(6436002)(6116002)(102836003)(3846002)(478600001)(53936002)(97736004)(229853002)(2900100001)(6246003)(5660300001)(101416001)(86362001)(76176999)(33656002)(50986999)(3660700001)(25786009)(54356999)(74316002)(2906002)(305945005)(81166006)(81156014)(5250100002)(6506006)(93886004)(8936002)(8676002)(7736002)(2950100002)(105586002)(66066001)(55016002)(106356001)(99286003)(14454004)(54906002)(6916009)(72206003);DIR:OUT;SFP:1102;SCL:1;SRVR:SG2PR06MB1166;H:SG2PR06MB1165.apcprd06.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 X-OriginatorOrg: renesas.com X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Aug 2017 18:37:37.4557 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 53d82571-da19-47e4-9cb4-625a166a4a2a X-MS-Exchange-Transport-CrossTenantHeadersStamped: SG2PR06MB1166 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by nfs id v7EIboLU024385 Content-Length: 1297 Lines: 43 On Monday, August 14, 2017, Nicolas Pitre wrote: > > However, now with your mkcramfs tool, I can no longer mount my cramfs > > image as the rootfs on boot. I was able to do that before (ie, 30 > minutes > > ago) when using the community mkcramfs (ie, 30 minutes ago). > > > > I get this: > > > > [ 1.712425] cramfs: checking physical address 0x1b000000 for linear > cramfs image > > [ 1.720531] cramfs: linear cramfs image appears to be 15744 KB in > size > > [ 1.728656] VFS: Mounted root (cramfs_physmem filesystem) readonly on > device 0:12. > > [ 1.737062] devtmpfs: mounted > > [ 1.741139] Freeing unused kernel memory: 48K > > [ 1.745545] This architecture does not have kernel memory protection. > > [ 1.760381] Starting init: /sbin/init exists but couldn't execute it > (error -22) > > [ 1.769685] Starting init: /bin/sh exists but couldn't execute it > (error -14) > > Is /sbin/init a link to busybox? Yes. > I suppose it just boots if you do mkcramfs without -X? Correct. I just created another image and removed the "-X -X" when creating it. Now I can boot that image as my rootfs. (I'm using -X -X because I'm using a Cortex-A9 with MMU). > If so could you share your non-working cramfs image with me? I will send it (in a separate email) Chris