hacked:mountrcs

NEW: Stats & Info for your O!Play… oplaywarenfoo.cgi 19/02/2010 12:03:10

HACK#(ED) - Mount.RCS

/etc/init.d

# This script will parse the kernel command line like this one: 
# rootfstype=yaffs2 root=31:01 mtdparts=rtk_nand:993024k,28672k(/),16384k(/usr/local/etc),10496k
# The fields that have meta information, embraced by "( )" 
# and meaning the mount point, give us the information to mount the partitions.
# 
# The mount point of "/" will be skipped.
# If /usr/local/etc is not mounted, it will return 1.
# For the command like this, mount.rcS will only try to see if "/usr/local/etc" can be mounted:
#    > mount.rcS /usr/local/etc
 
# If /usr/local/etc is found.
USR_LOCAL_ETC=0
 
read CMDLINE < /proc/cmdline
for FIELD in $CMDLINE;
do

experiment & investigate a custom firmware for the Asus O!Play HD Digital Media Streamer

USE ENTIRELY AT YOUR OWN RISK. Use of the OPlayWare website is subject to published Disclaimer and Privacy Policy

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License