lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <473C2D30.4070309@fr.ibm.com>
Date:	Thu, 15 Nov 2007 12:27:44 +0100
From:	Daniel Lezcano <dlezcano@...ibm.com>
To:	Alexey Dobriyan <adobriyan@...il.com>
CC:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	gregkh@...e.de
Subject: Re: [2.6.24-rc2-git5] kernel panic when config_sysfs = n

Alexey Dobriyan wrote:
> On 11/15/07, Daniel Lezcano <dlezcano@...ibm.com> wrote:
>> When I tryed to boot with qemu a 2.6.24-rc2-git5 with sysfs disabled,
>> the boot fails when trying to mount root partition:
>>
>> "VFS: Cannot open root device "hda2" or unknown-block(0,0)
>> Please append a correct "root=" boot option; here are the available
>> partitions:
>> 0300    2097152 hda0300    2097152 hda driver: ide-disk
>>   driver: ide-disk
>>    0301     257008 hda1
>>    0302    1839442 hda2
>> 1600    4194302 hdc1600    4194302 hdc driver: ide-cdrom
>>   driver: ide-cdrom
>> Kernel panic - not syncing: VFS: Unable to mount root fs on
>> unknown-block(0,0)"
> 
> From CONFIG_SYSFS help text:
> 
> sysfs is currently used by the block subsystem to mount the root
> partition.  If sysfs is disabled you must specify the boot device on
> the kernel boot command line via its major and minor numbers.  For
> example, "root=03:01" for /dev/hda1.


Shame on me :)
Thanks a lot.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ