I got enlightenment yesterday and found a way of building boot.img

Attached you will find a boot.img that contains only kernel, adbd and busybox.
You may use it to see how deep the Streak Hole goes.

I was able to chroot to an Ubuntu Linux installation using this image.

smoku@wing:~/Android/boot$ fastboot -i 0x413c flash boot boot.img 
sending 'boot' (3136 KB)... OKAY
writing 'boot'... OKAY

smoku@wing:~/Android/boot$ fastboot -i 0x413c reboot

smoku@wing:~/Android/boot$ adb shell

~ $ su
su: access granted, courtesy of
/ # ls
bin             root
default.prop            init.qcom.rc            sbin
dev                       sys
etc                     init.rc                 system
init                    proc                    tmp

/ # ls /sbin

/ # mount -t yaffs2 /dev/block/mtdblock6 /system
/ # ls /system
PreLoadNetworkSettings  customization           lost+found
Wallpapers              etc                     media
app                     fonts                   ts.conf
bin                     framework               usr
bootpriority.xml        lib                     xbin
build.prop              logfilter.ini
busybox                 lost+found
/ # umount /system

/ # mkdir /ubuntu
/ # mount -t ext2 /dev/block/mmcblk1p2 /ubuntu
/ # ls /ubuntu
bin         home        mnt         sbin        system
boot        lib         opt         selinux     tmp
dev         lost+found  proc        srv         usr
etc         media       root        sys         var

/ # PATH=/usr/bin:/usr/sbin:/bin:/sbin
/ # chroot /ubuntu /bin/bash
root@localhost:/# ls
bin   dev  home  lost+found  mnt  proc  sbin     srv  system  usr
boot  etc  lib   media       opt  root  selinux  sys  tmp     var
root@localhost:/# exit
/ #
~ $
Attached Files
File Type: zip - [Click for QR Code] (3.04 MB, 174 views)
smoku (SMTP/XMPP)
JP-1301 N950 DL-T01