The Following 3 Users Say Thank You to reinob For This Useful Post: | ||
![]() |
2012-09-21
, 14:34
|
Posts: 2,154 |
Thanked: 8,464 times |
Joined on May 2010
|
#152
|
Pali,
I just remembered that I had one question when I first read this:
Would it be possible to build a kernel without the twl4030_wdt module? (neither built-in nor as a module).
Would this mean that the HW watchdog would just do nothing, or would it still reboot the machine because nobody's talking to it?
For safety reasons I now run my N900s always with R&D mode enabled, so this is not really a problem, but it would be nice if the kernel would disable (or "not enable") the watchdog in any case.
(Obviously I'm not requesting this be implemented in kernel-power, because there will be people who for some reason want the watchdog enabled, but I just want to know if you know what happens when you remove -- completely --the module from the kernel).
The Following 4 Users Say Thank You to pali For This Useful Post: | ||
![]() |
2012-09-21
, 14:41
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#153
|
The Following User Says Thank You to reinob For This Useful Post: | ||
![]() |
2013-11-25
, 14:39
|
Posts: 1,397 |
Thanked: 2,126 times |
Joined on Nov 2009
@ Dublin, Ireland
|
#154
|
The Following User Says Thank You to ivgalvez For This Useful Post: | ||
![]() |
2013-11-25
, 15:09
|
Posts: 1,397 |
Thanked: 2,126 times |
Joined on Nov 2009
@ Dublin, Ireland
|
#156
|
![]() |
2013-11-25
, 15:14
|
Posts: 2,154 |
Thanked: 8,464 times |
Joined on May 2010
|
#157
|
The Following 4 Users Say Thank You to pali For This Useful Post: | ||
![]() |
2013-11-25
, 16:21
|
Posts: 1,397 |
Thanked: 2,126 times |
Joined on Nov 2009
@ Dublin, Ireland
|
#158
|
@ivgalvez: yes, look into CAL partition if there is r&d string. also check if you have cordump file in / (which can be generated by bootmenu watchdog daemon). daemon crashing if r&d string is not in CAL. As I wrote this problem is fixed and will be in next bootmenu relase...
The Following 3 Users Say Thank You to ivgalvez For This Useful Post: | ||
![]() |
Tags |
console, console-mode, framebuffer, recovery, recovery-mode |
|
Don't know. I guess real hackers don't give a sh*t about timestamps
Basically, you mount the rootfs somewhere, then mount the sd card somewhere, and then you use tar,
**** UNTESTED, written by hand, DO NOT USE, I REPEAT, DO NOT USE ****
The good thing about doing this yourself, manually, is that you can see if tar complains about anything.
Good luck!
(and report if you actually do this)