Advertisement
Guest User

Untitled

a guest
Jul 19th, 2014
217
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.53 KB | None | 0 0
  1. [~/mer/android/droid/out/target/product/u8815]$ telnet 192.168.2.15 23
  2. Trying 192.168.2.15...
  3. Connected to 192.168.2.15.
  4. Escape character is '^]'.
  5.  
  6. Welcome to the Mer/SailfishOS Boat loader debug init system.
  7.  
  8. Log so far is in /init.log
  9.  
  10. You may inject commands into init shell process (PID 1):
  11.  
  12. To see output of commands as they're injected:
  13. tail -f /init.log &
  14. To run a command:
  15. echo "ls -l /" >/init-ctl/stdin
  16.  
  17. (Be careful if you experiment with exec as you need to terminate
  18. daemons and disable busybox hotplug handling)
  19.  
  20. To allow init to continue:
  21. echo "continue" >/init-ctl/stdin
  22.  
  23. The init script also functions as a post-switch_root debugger too:
  24. cp /init /target/init-debug
  25. (When run post-switch_root, telnet is on port 2323, not 23)
  26.  
  27. In order to work safely with the device's mmc you should
  28. echo "umount_stowaways" >/init-ctl/stdin
  29.  
  30. Then you can mount and modify exported mass storage on host. When done
  31. echo "mount_stowaways" >/init-ctl/stdin
  32.  
  33.  
  34. ~ # tail -f /init.log &
  35. ~ # + sync
  36. + inject_loop
  37. + INJ_DIR=/init-ctl
  38. + INJ_STDIN=/init-ctl/stdin
  39. + mkdir /init-ctl
  40. + mkfifo /init-ctl/stdin
  41. + echo This entire directory is for debugging init - it can safely be removed
  42. + echo ########################## Beginning inject loop
  43. ########################## Beginning inject loop
  44. + :
  45.  
  46. ~ # echo "continue" >/init-ctl/stdin
  47. ~ # Connection closed by foreign host.
  48. [~/mer/android/droid/out/target/product/u8815]$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement