Virtual Console and Kernel logs
The console serial port for the User VM is virtualized, which means that you must use an SSH connection to access it and see the kernel boot logs.
The virtual console SSH connection is protected by the Guest password.
Connecting to the Virtual Console
Run the following command and enter the Guest password:
$ ssh acu6pro-serial
It will render something like this:
...
[ 2.874476] scsi host0: usb-storage 1-1:1.0
[ 2.875198] usbcore: registered new interface driver usb-storage
[ 3.907242] scsi 0:0:0:0: Direct-Access SanDisk Cruzer Blade 1.26 PQ: 0 ANSI: 5
[ 4.145153] sd 0:0:0:0: [sda] 31266816 512-byte logical blocks: (16.0 GB/14.9 GiB)
[ 4.196600] sd 0:0:0:0: [sda] Write Protect is off
[ 4.248178] sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, doesn't support DPO or FUA
[ 4.693421] sda: sda1
[ 4.991800] sd 0:0:0:0: [sda] Attached SCSI removable disk
Welcome to Buildroot
buildroot login:
At the bottom is the the login prompt of the User VM. You can log in to the example Linux
distribution as root
, without any password.
As this is a virtual serial port, you cannot close it using exit
. However, pressing
~ followed by . will make the SSH client close the connection.