OK that is very odd, I never asked hashcode the number for otter2's, I assumed it was the same. Weird.
Sent from my Amazon Kindle Fire HD using Tapatalk[/QUOT
Last edited:
OK that is very odd, I never asked hashcode the number for otter2's, I assumed it was the same. Weird.
Sent from my Amazon Kindle Fire HD using Tapatalk[/QUOT
It was trial and error (with powers of 2).OK that is very odd, I never asked hashcode the number for otter2's, I assumed it was the same. Weird.
Sent from my Amazon Kindle Fire HD using Tapatalk
adb shell
su
busybox mount -o remount,suid,dev /data
busybox rm -rf /data/rootfs
mkdir /data/rootfs
cd /data/rootfs
busybox tar zxvpf /data/media/rootfs-20140411.tar.gz
stop
cd /data/media
busybox nohup cat /proc/kmsg &
cd /data/rootfs
busybox nohup busybox chroot /data/rootfs /init &
A N D R O I D _
adb shell
su
chmod 777 /data/media/nohup.out
exit
exit
adb pull /sdcard/nohup.out log.txt
oh thats wonderful, 2 imports failed, couldn't access a selinux directory, and the system process (zygote) is committing suicide, lovely...Upload rootfs-20140411.tar.gz to /sdcard
adb will disconnect but on the screen it should sayCode:adb shell su busybox mount -o remount,suid,dev /data busybox rm -rf /data/rootfs mkdir /data/rootfs cd /data/rootfs busybox tar zxvpf /data/media/rootfs-20140411.tar.gz stop cd /data/media busybox nohup cat /proc/kmsg & cd /data/rootfs busybox nohup busybox chroot /data/rootfs /init &
Then it will power off (it tries to reboot into recovery). Power it on.Code:A N D R O I D _
Then run:Code:adb shell su chmod 777 /data/media/nohup.out exit exit
log.txt is the dmesg.Code:adb pull /sdcard/nohup.out log.txt
Theoh thats wonderful, 2 imports failed, couldn't access a selinux directory, and the system process (zygote) is committing suicide, lovely...
Looking at the log afterTheimports andselinux don't actually matter but the suicide... I think we need DCI Hashcode!
EDIT: I think I've got it: it looks for init.omap4blazeboard.rc, we've got init.omap4430.rc!
mv init.omap4430.rc init.omap4blazeboard.rc
good to see this is making process, and just for the record hashcode is back from vacation in the irc.Looking at the log after
a chroot is gonna need a lot of work!Code:mv init.omap4430.rc init.omap4blazeboard.rc
EDIT: You remember what I said about modules? Lots of errors!!!
Nice! Anyway, let's move into development threads...good to see this is making process, and just for the record hashcode is back from vacation in the irc.