Skip to content

Instantly share code, notes, and snippets.

@hskinnemoen
Created August 12, 2020 03:14
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save hskinnemoen/d48982b791dd8389e41468c9a3fbffbe to your computer and use it in GitHub Desktop.
Save hskinnemoen/d48982b791dd8389e41468c9a3fbffbe to your computer and use it in GitHub Desktop.
gsj openbmc /init trace
Run /init as init process
+ fslist='proc sys dev run'
+ rodir=run/initramfs/ro
+ rwdir=run/initramfs/rw
+ upper=run/initramfs/rw/cow
+ work=run/initramfs/rw/work
+ cd /
+ mkdir -p proc sys dev run
+ mount dev dev -tdevtmpfs
+ mount sys sys -tsysfs
+ mount proc proc -tproc
+ grep run proc/mounts
+ mount tmpfs run -t tmpfs -o 'mode=755,nodev'
+ mkdir -p run/initramfs/ro run/initramfs/rw
+ cp -rp init shutdown update whitelist bin sbin usr lib etc var run/initramfs
+ findmtd rofs
+ grep -xl rofs /sys/class/mtd/mtd0/name /sys/class/mtd/mtd1/name /sys/class/mtd/mtd2/name /sys/class/mtd/mtd3/name /sys/class/mtd/mtd4/name /sys/class/mtd/mtd5/name /sys/class/mtd/mtd6/name /sys/class/mtd/mtd7/name
+ m=/sys/class/mtd/mtd5/name
+ m=/sys/class/mtd/mtd5
+ m=mtd5
+ echo mtd5
+ rofs=mtd5
+ findmtd rwfs
+ grep -xl rwfs /sys/class/mtd/mtd0/name /sys/class/mtd/mtd1/name /sys/class/mtd/mtd2/name /sys/class/mtd/mtd3/name /sys/class/mtd/mtd4/name /sys/class/mtd/mtd5/name /sys/class/mtd/mtd6/name /sys/class/mtd/mtd7/name
+ m=/sys/class/mtd/mtd6/name
+ m=/sys/class/mtd/mtd6
+ m=mtd6
+ echo mtd6
+ rwfs=mtd6
+ rodev=/dev/mtdblock5
+ rwdev=/dev/mtdblock6
+ force_rwfst_jffs2=y
+ flash_images_before_init=n
+ consider_download_files=y
+ consider_download_tftp=y
+ consider_download_http=y
+ consider_download_ftp=y
+ rofst=squashfs
+ probe_fs_type /dev/mtdblock6
+ blkid_fs_type /dev/mtdblock6
+ blkid /dev/mtdblock6+
sed -e 's/^.*TYPE="//' -e 's/".*$//'
rcu: INFO: rcu_sched self-detected stall on CPU
rcu: 1-....: (7585 ticks this GP) idle=b6a/1/0x40000002 softirq=4713/4715 fqs=338
(t=2109 jiffies g=5933 q=2)
NMI backtrace for cpu 1
CPU: 1 PID: 81 Comm: kblockd Not tainted 5.4.32-7dc9442-dirty-6507d16 #1
Hardware name: NPCM7XX Chip family
Workqueue: kblockd blk_mq_run_work_fn
Backtrace:
[<b0107c4c>] (dump_backtrace) from [<b010823c>] (show_stack+0x20/0x24)
r7:00000000 r6:600b0193 r5:00000000 r4:b0b5b1b8
[<b010821c>] (show_stack) from [<b077b230>] (dump_stack+0x94/0xa8)
[<b077b19c>] (dump_stack) from [<b0782d78>] (nmi_cpu_backtrace+0xc8/0xcc)
r7:00000000 r6:00000001 r5:00000000 r4:00000001
[<b0782cb0>] (nmi_cpu_backtrace) from [<b0782e0c>] (nmi_trigger_cpumask_backtrace+0x90/0x130)
r5:b0b06d58 r4:b0109454
[<b0782d7c>] (nmi_trigger_cpumask_backtrace) from [<b010a578>] (arch_trigger_cpumask_backtrace+0x20/0x24)
r9:800b0193 r8:b0800948 r7:b0b03e2c r6:b0b03ed0 r5:b0b0e080 r4:00000001
[<b010a558>] (arch_trigger_cpumask_backtrace) from [<b0188584>] (rcu_dump_cpu_stacks+0x98/0xdc)
[<b01884ec>] (rcu_dump_cpu_stacks) from [<b01869d0>] (print_cpu_stall+0x104/0x19c)
r10:01e19170 r9:b0b03e2c r8:b0b03f00 r7:b0b0e080 r6:b0b042b0 r5:00000002
r4:b0b02d00 r3:0000fe48
[<b01868cc>] (print_cpu_stall) from [<b0186e0c>] (check_cpu_stall+0x138/0x238)
r9:00000001 r8:cf08c000 r7:b0b0e080 r6:0000fe3e r5:b0b03ec0 r4:b0b0e080
[<b0186cd4>] (check_cpu_stall) from [<b0186f3c>] (rcu_pending+0x30/0xac)
r9:00000001 r8:cf08c000 r7:b0b0e080 r6:1f150000 r5:cfbd3700 r4:b0a83700
[<b0186f0c>] (rcu_pending) from [<b0187764>] (rcu_sched_clock_irq+0x174/0x20c)
r7:cf0907c0 r6:00000000 r5:b0a83779 r4:b0b5f050
[<b01875f0>] (rcu_sched_clock_irq) from [<b018ecf0>] (update_process_times+0x70/0x98)
r7:cf0907c0 r6:1f150000 r5:00000000 r4:cfbcd340
[<b018ec80>] (update_process_times) from [<b019f10c>] (tick_periodic+0xc4/0xcc)
r7:cf0907c0 r6:cfbd6700 r5:7fffffff r4:ffffffff
[<b019f048>] (tick_periodic) from [<b019f1bc>] (tick_handle_periodic+0x38/0x9c)
r5:7fffffff r4:ffffffff
[<b019f184>] (tick_handle_periodic) from [<b010af04>] (twd_handler+0x40/0x48)
r9:cf2718f8 r8:cf08c000 r7:cf0907c0 r6:00000010 r5:b0b04504 r4:00000001
[<b010aec4>] (twd_handler) from [<b017666c>] (handle_percpu_devid_irq+0x10c/0x278)
r5:b0b04504 r4:cf08aa00
[<b0176560>] (handle_percpu_devid_irq) from [<b016fd34>] (__handle_domain_irq+0xb8/0xcc)
r10:01e19170 r9:cf2718f8 r8:cf08c000 r7:00000001 r6:00000000 r5:00000000
r4:b0a82b88 r3:b0176560
[<b016fc7c>] (__handle_domain_irq) from [<b0102234>] (gic_handle_irq+0x6c/0xa0)
r9:cf2718f8 r8:d0803100 r7:d0802100 r6:d080210c r5:b0b37db4 r4:b0b04504
[<b01021c8>] (gic_handle_irq) from [<b0101a8c>] (__irq_svc+0x6c/0x90)
Exception stack(0xcf2718f8 to 0xcf271940)
18e0: cf43ea00 600b0013
1900: b04ccd80 0000fb02 00000000 00000008 10202500 cf64e170 000249f0 00000001
1920: 01e19170 cf271954 cf271958 cf271948 b04ccd9c b079cba0 200b0013 ffffffff
r9:cf270000 r8:000249f0 r7:cf27192c r6:ffffffff r5:200b0013 r4:b079cba0
[<b079cb70>] (_raw_spin_unlock_irqrestore) from [<b04ccd9c>] (regmap_unlock_spinlock+0x1c/0x20)
[<b04ccd80>] (regmap_unlock_spinlock) from [<b04d193c>] (regmap_write+0x60/0x70)
[<b04d18dc>] (regmap_write) from [<b05125d8>] (npcm_fiu_uma_read+0x15c/0x270)
r7:cf64e170 r6:00000010 r5:00202500 r4:cf440b80
[<b051247c>] (npcm_fiu_uma_read) from [<b0512c04>] (npcm_fiu_exec_op+0x174/0x29c)
r10:cf440310 r9:00000010 r8:cf64e000 r7:00000170 r6:cf430340 r5:00000090
r4:cf271bf0
[<b0512a90>] (npcm_fiu_exec_op) from [<b05117e0>] (spi_mem_exec_op+0xcc/0x3a8)
r9:cf271cfc r8:cf64e000 r7:cf440800 r6:cf430340 r5:cf271bf0 r4:00000000
[<b0511714>] (spi_mem_exec_op) from [<b0506564>] (spi_nor_spimem_xfer_data+0xf4/0x12c)
r10:cf440310 r9:cf271cfc r8:cf64e000 r7:cf440040 r6:00000000 r5:00000000
r4:cf271bf0
[<b0506470>] (spi_nor_spimem_xfer_data) from [<b0506724>] (spi_nor_spimem_read_data+0x8c/0xb0)
r7:00000200 r6:01e19000 r5:cf440040 r4:00000001
[<b0506698>] (spi_nor_spimem_read_data) from [<b050a37c>] (spi_nor_read+0xf8/0x184)
r4:cf527000
[<b050a284>] (spi_nor_read) from [<b04ff91c>] (part_read+0x58/0x90)
r10:cf527000 r9:cf64e000 r8:00019000 r7:00000000 r6:00000000 r5:00000000
r4:cf527000
[<b04ff8c4>] (part_read) from [<b04fc010>] (mtd_read_oob+0xac/0xe8)
r6:cf527000 r5:00000000 r4:cf271cfc
[<b04fbf64>] (mtd_read_oob) from [<b04fc0c0>] (mtd_read+0x74/0xa0)
r8:cf271d50 r7:cf271cf4 r6:00019000 r5:00000000 r4:cf527000
[<b04fc04c>] (mtd_read) from [<b0505008>] (mtdblock_readsect+0x110/0x168)
r9:cf531f00 r8:00010000 r7:cf64e000 r6:00019000 r5:00000200 r4:00000200
[<b0504ef8>] (mtdblock_readsect) from [<b0504554>] (do_blktrans_request+0x230/0x370)
r10:00000800 r9:cf64e000 r8:000000c8 r7:000000d0 r6:cf531f00 r5:cf4fb000
r4:b0b42bd4
[<b0504324>] (do_blktrans_request) from [<b05047bc>] (mtd_blktrans_work+0x128/0x1f0)
r10:00000001 r9:cf531f48 r8:cf531f54 r7:cf531f10 r6:00000000 r5:cf4fb000
r4:cf531f00
[<b0504694>] (mtd_blktrans_work) from [<b05048ec>] (mtd_queue_rq+0x68/0x8c)
r10:cf534aa0 r9:00000000 r8:cf4fb000 r7:cf532400 r6:00000000 r5:cf271e24
r4:cf531f00
[<b0504884>] (mtd_queue_rq) from [<b03ffde0>] (blk_mq_dispatch_rq_list+0x178/0x3f4)
r5:cf271e64 r4:cf4fb030
[<b03ffc68>] (blk_mq_dispatch_rq_list) from [<b0405230>] (blk_mq_do_dispatch_sched+0xf8/0x124)
r10:00000000 r9:b0b5ec90 r8:cf534aa0 r7:cf534aa0 r6:cf4f5200 r5:cf271e64
r4:cf532400
[<b0405138>] (blk_mq_do_dispatch_sched) from [<b0405774>] (blk_mq_sched_dispatch_requests+0x14c/0x1b0)
r7:00000001 r6:cf532404 r5:cf271e94 r4:cf532400
[<b0405628>] (blk_mq_sched_dispatch_requests) from [<b03fcfac>] (__blk_mq_run_hw_queue+0x124/0x134)
r8:00000000 r7:ff7ee400 r6:cfbd2e00 r5:00000001 r4:cf532400
[<b03fce88>] (__blk_mq_run_hw_queue) from [<b03fd194>] (blk_mq_run_work_fn+0x28/0x2c)
r5:cf222a80 r4:cf532440
[<b03fd16c>] (blk_mq_run_work_fn) from [<b0136778>] (process_one_work+0x334/0x540)
[<b0136444>] (process_one_work) from [<b01376d8>] (rescuer_thread+0x2f0/0x4e8)
r10:cf222a80 r9:b0b0b5dc r8:cf222a94 r7:ff7ee468 r6:ff7ee400 r5:cfbd2e18
r4:cfbd2e00
[<b01373e8>] (rescuer_thread) from [<b013c8d0>] (kthread+0x150/0x158)
r10:cf0e761c r9:b01373e8 r8:cf222a80 r7:cf270000 r6:cf0bbdac r5:cf0e77c0
r4:cf0e7600
[<b013c780>] (kthread) from [<b01010e8>] (ret_from_fork+0x14/0x2c)
Exception stack(0xcf271fb0 to 0xcf271ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:b013c780
r4:cf0e77c0 r3:00000012
rcu: INFO: rcu_sched self-detected stall on CPU
rcu: 1-....: (13877 ticks this GP) idle=b6a/1/0x40000002 softirq=4713/4715 fqs=1234
(t=8409 jiffies g=5933 q=2)
NMI backtrace for cpu 1
CPU: 1 PID: 81 Comm: kblockd Not tainted 5.4.32-7dc9442-dirty-6507d16 #1
Hardware name: NPCM7XX Chip family
Workqueue: kblockd blk_mq_run_work_fn
Backtrace:
[<b0107c4c>] (dump_backtrace) from [<b010823c>] (show_stack+0x20/0x24)
r7:00000000 r6:600b0193 r5:00000000 r4:b0b5b1b8
[<b010821c>] (show_stack) from [<b077b230>] (dump_stack+0x94/0xa8)
[<b077b19c>] (dump_stack) from [<b0782d78>] (nmi_cpu_backtrace+0xc8/0xcc)
r7:00000000 r6:00000001 r5:00000000 r4:00000001
[<b0782cb0>] (nmi_cpu_backtrace) from [<b0782e0c>] (nmi_trigger_cpumask_backtrace+0x90/0x130)
r5:b0b06d58 r4:b0109454
[<b0782d7c>] (nmi_trigger_cpumask_backtrace) from [<b010a578>] (arch_trigger_cpumask_backtrace+0x20/0x24)
r9:800b0193 r8:b0800948 r7:b0b03e2c r6:b0b03ed0 r5:b0b0e080 r4:00000001
[<b010a558>] (arch_trigger_cpumask_backtrace) from [<b0188584>] (rcu_dump_cpu_stacks+0x98/0xdc)
[<b01884ec>] (rcu_dump_cpu_stacks) from [<b01869d0>] (print_cpu_stall+0x104/0x19c)
r10:e2d62c00 r9:b0b03e2c r8:b0b03f00 r7:b0b0e080 r6:b0b042b0 r5:00000002
r4:b0b02d00 r3:000116e4
[<b01868cc>] (print_cpu_stall) from [<b0186e0c>] (check_cpu_stall+0x138/0x238)
r9:00000001 r8:cf08c000 r7:b0b0e080 r6:000116dd r5:b0b03ec0 r4:b0b0e080
[<b0186cd4>] (check_cpu_stall) from [<b0186f3c>] (rcu_pending+0x30/0xac)
r9:00000001 r8:cf08c000 r7:b0b0e080 r6:1f150000 r5:cfbd3700 r4:b0a83700
[<b0186f0c>] (rcu_pending) from [<b0187764>] (rcu_sched_clock_irq+0x174/0x20c)
r7:cf0907c0 r6:00000000 r5:b0a83779 r4:b0b5f050
[<b01875f0>] (rcu_sched_clock_irq) from [<b018ecf0>] (update_process_times+0x70/0x98)
r7:cf0907c0 r6:1f150000 r5:00000000 r4:cfbcd340
[<b018ec80>] (update_process_times) from [<b019f10c>] (tick_periodic+0xc4/0xcc)
r7:cf0907c0 r6:cfbd6700 r5:7fffffff r4:ffffffff
[<b019f048>] (tick_periodic) from [<b019f1bc>] (tick_handle_periodic+0x38/0x9c)
r5:7fffffff r4:ffffffff
[<b019f184>] (tick_handle_periodic) from [<b010af04>] (twd_handler+0x40/0x48)
r9:cf271900 r8:cf08c000 r7:cf0907c0 r6:00000010 r5:b0b04504 r4:00000001
[<b010aec4>] (twd_handler) from [<b017666c>] (handle_percpu_devid_irq+0x10c/0x278)
r5:b0b04504 r4:cf08aa00
[<b0176560>] (handle_percpu_devid_irq) from [<b016fd34>] (__handle_domain_irq+0xb8/0xcc)
r10:e2d62c00 r9:cf271900 r8:cf08c000 r7:00000001 r6:00000000 r5:00000000
r4:b0a82b88 r3:b0176560
[<b016fc7c>] (__handle_domain_irq) from [<b0102234>] (gic_handle_irq+0x6c/0xa0)
r9:cf271900 r8:d0803100 r7:d0802100 r6:d080210c r5:b0b37db4 r4:b0b04504
[<b01021c8>] (gic_handle_irq) from [<b0101a8c>] (__irq_svc+0x6c/0x90)
Exception stack(0xcf271900 to 0xcf271948)
1900: 00f4ee31 00000000 000b11ce 00ffffff b0d77f40 00004984 00000010 cf6631d0
1920: 000249f0 00000001 e2d62c00 cf271984 cf271950 cf271950 b0191ef4 b0191ef4
1940: 600b0013 ffffffff
r9:cf270000 r8:000249f0 r7:cf271934 r6:ffffffff r5:600b0013 r4:b0191ef4
[<b0191e7c>] (ktime_get) from [<b05125fc>] (npcm_fiu_uma_read+0x180/0x270)
r10:01e2e1d0 r9:00000001 r8:000249f0 r7:cf6631d0 r6:00000010 r5:00202500
r4:cf440b80
[<b051247c>] (npcm_fiu_uma_read) from [<b0512c04>] (npcm_fiu_exec_op+0x174/0x29c)
r10:cf440310 r9:00000010 r8:cf663000 r7:000001d0 r6:cf430340 r5:00000030
r4:cf271bf0
[<b0512a90>] (npcm_fiu_exec_op) from [<b05117e0>] (spi_mem_exec_op+0xcc/0x3a8)
r9:cf271cfc r8:cf663000 r7:cf440800 r6:cf430340 r5:cf271bf0 r4:00000000
[<b0511714>] (spi_mem_exec_op) from [<b0506564>] (spi_nor_spimem_xfer_data+0xf4/0x12c)
r10:cf440310 r9:cf271cfc r8:cf663000 r7:cf440040 r6:00000000 r5:00000000
r4:cf271bf0
[<b0506470>] (spi_nor_spimem_xfer_data) from [<b0506724>] (spi_nor_spimem_read_data+0x8c/0xb0)
r7:00000200 r6:01e2e000 r5:cf440040 r4:00000001
[<b0506698>] (spi_nor_spimem_read_data) from [<b050a37c>] (spi_nor_read+0xf8/0x184)
r4:cf527000
[<b050a284>] (spi_nor_read) from [<b04ff91c>] (part_read+0x58/0x90)
r10:cf527000 r9:cf663000 r8:0002e000 r7:00000000 r6:00000000 r5:00000000
r4:cf527000
[<b04ff8c4>] (part_read) from [<b04fc010>] (mtd_read_oob+0xac/0xe8)
r6:cf527000 r5:00000000 r4:cf271cfc
[<b04fbf64>] (mtd_read_oob) from [<b04fc0c0>] (mtd_read+0x74/0xa0)
r8:cf271d50 r7:cf271cf4 r6:0002e000 r5:00000000 r4:cf527000
[<b04fc04c>] (mtd_read) from [<b0505008>] (mtdblock_readsect+0x110/0x168)
r9:cf531f00 r8:00010000 r7:cf663000 r6:0002e000 r5:00000200 r4:00000200
[<b0504ef8>] (mtdblock_readsect) from [<b0504554>] (do_blktrans_request+0x230/0x370)
r10:00000800 r9:cf663000 r8:00000170 r7:00000178 r6:cf531f00 r5:cf4fb180
r4:b0b42bd4
[<b0504324>] (do_blktrans_request) from [<b05047bc>] (mtd_blktrans_work+0x128/0x1f0)
r10:00000001 r9:cf531f48 r8:cf531f54 r7:cf531f10 r6:00000000 r5:cf4fb180
r4:cf531f00
[<b0504694>] (mtd_blktrans_work) from [<b05048ec>] (mtd_queue_rq+0x68/0x8c)
r10:cf534aa0 r9:00000000 r8:cf4fb180 r7:cf532400 r6:00000000 r5:cf271e24
r4:cf531f00
[<b0504884>] (mtd_queue_rq) from [<b03ffde0>] (blk_mq_dispatch_rq_list+0x178/0x3f4)
r5:cf271e64 r4:cf4fb1b0
[<b03ffc68>] (blk_mq_dispatch_rq_list) from [<b0405230>] (blk_mq_do_dispatch_sched+0xf8/0x124)
r10:00000000 r9:b0b5ec90 r8:cf534aa0 r7:cf534aa0 r6:cf4f5200 r5:cf271e64
r4:cf532400
[<b0405138>] (blk_mq_do_dispatch_sched) from [<b0405774>] (blk_mq_sched_dispatch_requests+0x14c/0x1b0)
r7:00000001 r6:cf532404 r5:cf271e94 r4:cf532400
[<b0405628>] (blk_mq_sched_dispatch_requests) from [<b03fcfac>] (__blk_mq_run_hw_queue+0x124/0x134)
r8:00000000 r7:ff7ee400 r6:cfbd2e00 r5:00000001 r4:cf532400
[<b03fce88>] (__blk_mq_run_hw_queue) from [<b03fd194>] (blk_mq_run_work_fn+0x28/0x2c)
r5:cf222a80 r4:cf532440
[<b03fd16c>] (blk_mq_run_work_fn) from [<b0136778>] (process_one_work+0x334/0x540)
[<b0136444>] (process_one_work) from [<b01376d8>] (rescuer_thread+0x2f0/0x4e8)
r10:cf222a80 r9:b0b0b5dc r8:cf222a94 r7:ff7ee468 r6:ff7ee400 r5:cfbd2e18
r4:cfbd2e00
[<b01373e8>] (rescuer_thread) from [<b013c8d0>] (kthread+0x150/0x158)
r10:cf0e761c r9:b01373e8 r8:cf222a80 r7:cf270000 r6:cf0bbdac r5:cf0e77c0
r4:cf0e7600
[<b013c780>] (kthread) from [<b01010e8>] (ret_from_fork+0x14/0x2c)
Exception stack(0xcf271fb0 to 0xcf271ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:b013c780
r4:cf0e77c0 r3:00000012
+ fst=
+ echo jffs2
+ rwfst=jffs2
+ roopts=rorandom: fast init done
+ rwopts=rw
+ image=/run/initramfs/image-
+ trigger=/run/initramfs/image-rwfs
+ init=/sbin/init
+ fsckbase=/sbin/fsck.
+ fsck=/sbin/fsck.jffs2
+ fsckopts=-a
+ optfile=/run/initramfs/init-options
+ optbase=/run/initramfs/init-options-base
+ urlfile=/run/initramfs/init-download-url
+ update=/run/initramfs/update
+ test -e /init-options
+ test -e /init-options-base
+ touch /run/initramfs/init-options-base
+ test '!' -f /run/initramfs/init-options
+ cat /proc/cmdline /run/initramfs/init-options-base
+ get_fw_env_var openbmcinit
+ copies=2
+ findmtd u-boot-env
+ grep -xl u-boot-env /sys/class/mtd/mtd0/name /sys/class/mtd/mtd1/name /sys/class/mtd/mtd2/name /sys/class/mtd/mtd3/name /sys/class/mtd/mtd4/name /sys/class/mtd/mtd5/name /sys/class/mtd/mtd6/name /sys/class/mtd/mtd7/name
+ m=/sys/class/mtd/mtd3/name
+ m=/sys/class/mtd/mtd3
+ m=mtd3
+ echo mtd3
+ envdev=mtd3
+ test -n mtd3
+ cat /dev/mtd3
+ tr '\n\000' '\r\n'
+ tail+ tail -c -c +5
+2
+ sed -ne '/^$/,$d' -e 's/^openbmcinit=//p'
+ get_fw_env_var openbmconce
+ copies=2
+ findmtd u-boot-env
+ grep -xl u-boot-env /sys/class/mtd/mtd0/name /sys/class/mtd/mtd1/name /sys/class/mtd/mtd2/name /sys/class/mtd/mtd3/name /sys/class/mtd/mtd4/name /sys/class/mtd/mtd5/name /sys/class/mtd/mtd6/name /sys/class/mtd/mtd7/name
+ m=/sys/class/mtd/mtd3/name
+ m=/sys/class/mtd/mtd3
+ m=mtd3
+ echo mtd3
+ envdev=mtd3
+ test -n mtd3
+ cat /dev/mtd3
+ tail+ tr -c '\n\000' +5
'\r\n'
+ tail -c +2
+ sed -ne '/^$/,$d' -e 's/^openbmconce=//p'
+ echo rofs '=' mtd5 squashfs rwfs '=' mtd6 jffs2
rofs = mtd5 squashfs rwfs = mtd6 jffs2
+ grep -w debug-init-sh /run/initramfs/init-options
+ test xy '=' xy
+ grep -w openbmc-init-download-files /run/initramfs/init-options
+ imagebasename=image-
+ test -n image-
+ ls '/image-*'
+ grep -w clean-rwfs-filesystem /run/initramfs/init-options
+ grep -w factory-reset /run/initramfs/init-options
+ do_save=--save-files
+ test xy '=' xy -a jffs2 '!=' jffs2 -a '!' -f /run/initramfs/image-rwfs
+ ls '/run/initramfs/image-*'
+ grep -w overlay-filesystem-in-ram /run/initramfs/init-options
+ copyfiles=
+ grep -w copy-files-to-ram /run/initramfs/init-options
+ test jffs2 '=' noney
+ grep -w copy-base-filesystem-to-ram /run/initramfs/init-options
+ test -s /run/image-rofs
+ mount /dev/mtdblock5 run/initramfs/ro -t squashfs -o ro
mount: mounting /dev/mtdblock5 on run/initramfs/ro failed: Invalid argument
+ test -x run/initramfs/ro/sbin/fsck.jffs2
+ test jffs2 '!=' jffs2 -a jffs2 '!=' none
+ test jffs2 '=' none
+ mount /dev/mtdblock6 run/initramfs/rw -t jffs2 -o rw
jffs2: notice: (176) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
+ rm -rf run/initramfs/rw/work
+ mkdir -p run/initramfs/rw/cow run/initramfs/rw/work
+ mount -t overlay -o 'lowerdir=run/initramfs/ro,upperdir=run/initramfs/rw/cow,workdir=run/initramfs/rw/work' cow /root
overlayfs: upper fs does not support tmpfile.
+ chroot /root /bin/sh -c 'test -x '"'"'/sbin/init'"'"' -a -s '"'"'/sbin/init'"'"
chroot: can't execute '/bin/sh': No such file or directory
+ cat
+ msg='
Unable to confirm /sbin/init is an executable non-empty file
in merged file system mounted at /root.
Change Root test failed! Invoking emergency shell.'
+ debug_takeover '
Unable to confirm /sbin/init is an executable non-empty file
in merged file system mounted at /root.
Change Root test failed! Invoking emergency shell.'
+ echo '
Unable to confirm /sbin/init is an executable non-empty file
in merged file system mounted at /root.
Change Root test failed! Invoking emergency shell.'
Unable to confirm /sbin/init is an executable non-empty file
in merged file system mounted at /root.
Change Root test failed! Invoking emergency shell.
+ test -n '
Unable to confirm /sbin/init is an executable non-empty file
in merged file system mounted at /root.
Change Root test failed! Invoking emergency shell.'
+ echo Enter password to try to manually fix.
Enter password to try to manually fix.
+ cat
After fixing run exit to continue this script, or reboot -f to retry, or
touch /takeover and exit to become PID 1 allowing editing of this script.
+ sulogin
Give root password for system maintenance
(or type Control-D for normal startup):
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment