Quote:
Originally Posted by MadMAXXX
But I cant use the script, because i erased the diags, right?
|
Correct.
We have to find someone with a serial port PW-3 that has not (yet) erased all.
But for the future reader of this thread, that is what will be used.
= = = =
PS: I do have a PW-3, (currently) without a serial port.
If we do not find someone else, I guess I will have to open mine up.
Or
Use the 'diags' kernel and file system from a KT-2 (which I already have open).
Or
I could modify the 'main' uImage file to install the Jailbreak (and probably anything in mrpackages) into the 'main' filesystem.
Note: Such a modified uImage file **would not** be flashed (it would be too big) but it could be loaded into ram and run-once from there.
(u-boot can do that, and I think fastboot can also).
= = = =
Meanwhile, we are on our own.
All we need is a way to remove a single character from the password file (or replace it with a space).
The only 'trick' in that is the 'whatever' has to be able to mount an ext2/ext3 file system.
(A newer version of u-boot might be able to do that. Something else for me to check on.)
= = = = =
Another way -
In u-boot, modify the kernel command line (getenv/setenv) to include:
rdinit=/bin/sh
Then when the (installed) kernel boots, it will jump to the busybox command shell
**before** doing any system initialization.
but if you have never initialized a Linux run-time system "by hand from the shell command line" - this probably isn't the time to learn.
= = = = =
Another way -
Since I am supposing we want to (temporarily) modify the kernel command line for a single start up -
Use u-boot getenv/setenv to change that ip=0 into a valid ip address on your home network of your pc -
Then when that kernel starts up, it will mount the file system image physically provided (by a server application) on your PC rather than the one in flash.
(called: netboot(ing) if you want to google that.)
= = = = =
Translation:
Your device isn't dead, this is just a speed bump in the recovery process.