From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ewerton Romulo Subject: Re: Run linux in ramdisk(tmpfs) and use a mounted HD for files cause memory and CPU overflow! Date: Wed, 29 Jun 2005 15:46:24 -0300 Message-ID: <1f52e8ed05062911465733819b@mail.gmail.com> References: <1f52e8ed05062821415f505fee@mail.gmail.com> Reply-To: Ewerton Romulo Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: QUOTED-PRINTABLE Cc: Jan Hudec , linux-fsdevel@vger.kernel.org Return-path: Received: from wproxy.gmail.com ([64.233.184.207]:10850 "EHLO wproxy.gmail.com") by vger.kernel.org with ESMTP id S262411AbVF2SqZ convert rfc822-to-8bit (ORCPT ); Wed, 29 Jun 2005 14:46:25 -0400 Received: by wproxy.gmail.com with SMTP id 57so832773wri for ; Wed, 29 Jun 2005 11:46:25 -0700 (PDT) To: Bryan Henderson In-Reply-To: Content-Disposition: inline Sender: linux-fsdevel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org > Your subject line says "use a mounted HD for files." Does this mean > you're putting these files into a filesystem that lives on a real, > conventional disk device? >=20 > In your /proc mounts, I see one such filesystem mounted: >=20 > /dev/hda1 /test vfat rw 0 0 Yes! That=B4s right!! The files is many .. that diferents sizes .. so I can=B4t put it all in RAM! > You also have a tmpfs filesystem mounted, which you mentioned a few t= imes, > but I believe all you really said about it is that it's your root > filesystem. Or is this also the one in which you're stuffing files w= hen > the problem occurs? >=20 > /dev/root / tmpfs rw 0 0 Well, my root filesystem is tmpfs, always ... only the new files that I like to save, will be saved in a mount HD! >=20 > Do you have reason to believe that the fact of having a tmpfs root > filesystem is related to the problem? Well, the problem only happen when I mount HD and begin to save file= s in it! - To unsubscribe from this list: send the line "unsubscribe linux-fsdevel= " in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html