Virtual Console and Kernel logs

The console serial port for the User VM is virtualized, which means that you must use an SSH connection to access it and see the kernel boot logs.

The virtual console SSH connection is protected by the Guest password.

Connecting to the Virtual Console

Run the following command and enter the Guest password:

$ ssh acu6pro-serial

It will render something like this:

...
[ 2.874476] scsi host0: usb-storage 1-1:1.0
[ 2.875198] usbcore: registered new interface driver usb-storage
[ 3.907242] scsi 0:0:0:0: Direct-Access SanDisk Cruzer Blade 1.26 PQ: 0 ANSI: 5
[ 4.145153] sd 0:0:0:0: [sda] 31266816 512-byte logical blocks: (16.0 GB/14.9 GiB)
[ 4.196600] sd 0:0:0:0: [sda] Write Protect is off
[ 4.248178] sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn't support DPO or FUA
[ 4.693421] sda: sda1
[ 4.991800] sd 0:0:0:0: [sda] Attached SCSI removable disk

Welcome to Buildroot
buildroot login:

At the bottom is the the login prompt of the User VM. You can log in to the example Linux distribution as root, without any password.

As this is a virtual serial port, you cannot close it using exit. However, pressing ~ followed by . will make the SSH client close the connection.