sh-3.2# diff -au hackkit_wheezy_131104.sh hackkit_wheezy_131212.sh --- hackkit_wheezy_131104.sh Mon Nov 4 15:40:12 2013 +++ hackkit_wheezy_131212.sh Thu Dec 12 04:10:56 2013 @@ -902,6 +902,17 @@ RAID=yes ;; +0x00003007) + MACHINE=LSWSXL + + BOOTPARTITION=/dev/md0 + BOOTPARTITIONTYPE=ext3 + ROOTPARTITION=/dev/md1 + SWAPPARTITION=/dev/md10 + DATAPARTITION="" + + RAID=yes + ;; 0x00004000) MACHINE=LSQL sh-3.2#のように eth1 を指定しておらず eth0 で動作しているはず。
HDD の中を見て、修正する。
yasunari@ls410d:~$ sudo tail -f /var/log/messages [sudo] password for yasunari: : : Dec 12 23:51:53 ls410d kernel: usb 1-1: new high-speed USB device number 2 using ehci_marvell Dec 12 23:51:53 ls410d kernel: scsi2 : usb-storage 1-1:1.0 Dec 12 23:51:54 ls410d kernel: scsi 2:0:0:0: Direct-Access ViPowER VP-89118(SD1) 2.10 PQ: 0 ANSI: 4 Dec 12 23:51:54 ls410d kernel: sd 2:0:0:0: [sdb] 78165360 512-byte logical blocks: (40.0 GB/37.2 GiB) Dec 12 23:51:54 ls410d kernel: sd 2:0:0:0: [sdb] Write Protect is off Dec 12 23:51:54 ls410d kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 Dec 12 23:51:54 ls410d kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 12 23:51:54 ls410d kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb5 sdb6 Dec 12 23:51:54 ls410d kernel: sd 2:0:0:0: [sdb] Attached SCSI disk
yasunari@ls410d:~$ sudo mdadm --assemble -scan mdadm: /dev/md/LS-WSXLE75:21 has been started with 1 drive (out of 2). mdadm: /dev/md/LS-WSXL-EME75:10 has been started with 1 drive (out of 2). mdadm: /dev/md/LS-WSXL-EME75:1 has been started with 1 drive (out of 2). mdadm: failed to add /dev/sdb3 to /dev/md/1_0: Invalid argument mdadm: failed to RUN_ARRAY /dev/md/1_0: Invalid argument mdadm: /dev/md/0_0 has been started with 1 drive (out of 2). mdadm: failed to add /dev/sdb3 to /dev/md/1_0: Invalid argument mdadm: failed to RUN_ARRAY /dev/md/1_0: Invalid argument yasunari@ls410d:~$ ls -l /dev/md* brw-rw---T 1 root disk 9, 124 12月 12 23:52 /dev/md124 brw-rw---T 1 root disk 9, 125 12月 12 23:52 /dev/md125 brw-rw---T 1 root disk 9, 126 12月 12 23:52 /dev/md126 brw-rw---T 1 root disk 9, 127 12月 12 23:52 /dev/md127 /dev/md: 合計 0 lrwxrwxrwx 1 root root 8 12月 12 23:52 0_0 -> ../md124 lrwxrwxrwx 1 root root 8 12月 12 23:52 LS-WSXL-EME75:1 -> ../md125 lrwxrwxrwx 1 root root 8 12月 12 23:52 LS-WSXL-EME75:10 -> ../md126 lrwxrwxrwx 1 root root 8 12月 12 23:52 LS-WSXLE75:21 -> ../md127 yasunari@ls410d:~$ mkdir /tmp/root yasunari@ls410d:~$ sudo mount /dev/md125 /tmp/root yasunari@ls410d:~$ ls /tmp/root bin dev home lib mnt proc run selinux sys usr boot etc initrd media opt root sbin srv tmp var yasunari@ls410d:~$
yasunari@ls410d:~$ mkdir /tmp/root yasunari@ls410d:~$ sudo mount /dev/md125 /tmp/root yasunari@ls410d:~$ ls /tmp/root bin dev home lib mnt proc run selinux sys usr boot etc initrd media opt root sbin srv tmp var yasunari@ls410d:~$ cd /tmp/root/var/log/ yasunari@ls410d:/tmp/root/var/log$ ls -l 合計 600 -rw-r--r-- 1 root root 11985 11月 4 18:04 alternatives.log drwxr-xr-x 2 root root 4096 11月 4 18:01 apt -rw-r----- 1 root adm 514 12月 12 04:35 auth.log -rw-r--r-- 1 root root 44028 11月 4 18:00 bootstrap.log -rw-rw---- 1 root utmp 0 11月 4 17:53 btmp -rw-r----- 1 root adm 54 12月 12 04:35 daemon.log -rw-r----- 1 root adm 621 12月 12 04:28 debug -rw-r----- 1 root adm 9955 12月 12 04:28 dmesg -rw-r----- 1 root adm 31 11月 4 17:57 dmesg.0 -rw-r--r-- 1 root root 112159 11月 4 18:05 dpkg.log -rw-r--r-- 1 root root 24024 11月 4 18:05 faillog drwxr-xr-x 2 root root 4096 11月 4 17:57 fsck -rw-r----- 1 root adm 19310 12月 12 04:35 kern.log -rw-rw-r-- 1 root utmp 292292 11月 4 18:05 lastlog -rw-r----- 1 root adm 0 12月 12 04:28 lpr.log -rw-r----- 1 root adm 0 12月 12 04:28 mail.err -rw-r----- 1 root adm 0 12月 12 04:28 mail.info -rw-r----- 1 root adm 0 12月 12 04:28 mail.log -rw-r----- 1 root adm 0 12月 12 04:28 mail.warn -rw-r----- 1 root adm 18890 12月 12 04:35 messages drwxr-xr-x 2 root root 4096 12月 12 04:28 news -rw-r----- 1 root adm 20033 12月 12 04:35 syslog -rw-r----- 1 root adm 69 12月 12 04:35 user.log -rw-rw-r-- 1 root utmp 4992 12月 12 04:35 wtmp yasunari@ls410d:/tmp/root/var/log$ログが更新されているのでハックキットで起動したことは間違いない。
yasunari@ls410d:/tmp/root/var/log$ sudo grep eth dmesg o register under mv88fx_eth platform o eth0, ifindex = 2, GbE port = 0 o eth1, ifindex = 3, GbE port = 1 eth0: started yasunari@ls410d:/tmp/root/var/log$ん?やっぱり eth0 ?
yasunari@ls410d:/tmp/root/var/log$ cd /tmp/root yasunari@ls410d:/tmp/root$ sudo chroot . root@ls410d:/# dmesg | grep eth mv_eth_probe: port_mask=0x3, cpu_mask=0x1 o eth0, ifindex = 2, GbE port = 0 o eth1, ifindex = 3, GbE port = 1 eth1: link up eth1: started root@ls410d:/# exit yasunari@ls410d:/tmp/root/var/log$おー。eth1 のような。。。
yasunari@ls410d:/tmp/root$ cd etc/network yasunari@ls410d:/tmp/root/etc/network$ sudo vi interfaces : :eth0 を eth1 に修正
yasunari@ls410d:/tmp/root/etc/network$ cat !$ cat interfaces ###################################################################### # /etc/network/interfaces -- configuration file for ifup(8), ifdown(8) # See the interfaces(5) manpage for information on what options are # available. ###################################################################### # We always want the loopback interface. # auto lo iface lo inet loopback # To use dhcp: # # auto eth0 # iface eth0 inet dhcp # Static IP setup: (broadcast and gateway are optional) # auto eth1 iface eth1 inet static address 192.168.2.58 network 192.168.2.0 netmask 255.255.255.0 broadcast 192.168.2.255 gateway 192.168.2.96 yasunari@ls410d:/tmp/root/etc/network$
yasunari@ls410d:/$ sudo umount /tmp/root/ yasunari@ls410d:/$
yasunari@sil:~$ telnet lswsxl Trying 192.168.2.58... Connected to lswsxl. Escape character is '^]'. Linux 3.3.4-88f6281 (sil.yamasita.jp) (pts/0) lswsxl login: guest Password: Linux lswsxl 3.3.4-88f6281 #1 Tue Jul 9 14:48:53 JST 2013 armv5tel The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. No directory, logging in with HOME=/ guest@lswsxl:/$I got it!
|
← ハックキットで起動 |
ハックの記録 LinkStation/玄箱 をハックしよう |
→ 動作確認 |
Copyright (C) 2003-2013 Yasunari Yamashita. All Rights Reserved.
yasunari @ yamasita.jp 山下康成@京都府向日市