| The Following User Says Thank You to mautz For This Useful Post: | ||
- | SailfishOS 2.1.0.9 (Iijoki) (armv7hl) '--- [nemo@Sailfish ~]$ devel-su Password: [root@Sailfish nemo]# cd /media/sdcard/fc0ff9d5-6fa1-49b2-8b2d-31ce48893a9e/ [root@Sailfish fc0ff9d5-6fa1-49b2-8b2d-31ce48893a9e]# ls ArchLinux lost+found [root@Sailfish fc0ff9d5-6fa1-49b2-8b2d-31ce48893a9e]# cd ArchLinux/ [root@Sailfish ArchLinux]# mount --bind /dev dev [root@Sailfish ArchLinux]# mount --bind /sys sys [root@Sailfish ArchLinux]# mount --bind /proc proc [root@Sailfish ArchLinux]# mount --bind /dev/pts dev/pts [root@Sailfish ArchLinux]# mount --bind /run run [root@Sailfish ArchLinux]# chroot ./ chroot: cannot run command «*/bin/sh*»: Permission non accordée [root@Sailfish ArchLinux]#
mkdir /home/nemo mkdir /home/nemo/.config/pulse chown -R nemo:nemo /home/nemo
| The Following User Says Thank You to preflex For This Useful Post: | ||
mkdir /home/nemo mkdir /home/nemo/.config/pulse chown -R nemo:nemo /home/nemo
## sudoers file. ## ## This file MUST be edited with the 'visudo' command as root. ## Failure to use 'visudo' may result in syntax or file permission errors ## that prevent sudo from running. ## ## See the sudoers man page for the details on how to write a sudoers file. ## ## ## Host alias specification ## ## Groups of machines. These may include host names (optionally with wildcards$ ## IP addresses, network numbers or netgroups. # Host_Alias WEBSERVERS = www1, www2, www3 ## ## User alias specification ## ## Groups of users. These may consist of user names, uids, Unix groups, ## or netgroups. # User_Alias ADMINS = millert, dowdy, mikef ## ## Cmnd alias specification ## ## Groups of commands. Often used to group related commands together. # Cmnd_Alias PROCESSES = /usr/bin/nice, /bin/kill, /usr/bin/renice, \ # /usr/bin/pkill, /usr/bin/top # Cmnd_Alias REBOOT = /sbin/halt, /sbin/reboot, /sbin/poweroff ## ## Defaults specification ## ## You may wish to keep some of the following environment variables ## when running commands via sudo. ## ## Locale settings # Defaults env_keep += "LANG LANGUAGE LINGUAS LC_* _XKB_CHARSET" ## ## Run X applications through sudo; HOME is used to find the ## .Xauthority file. Note that other programs use HOME to find ## configuration files and this may lead to privilege escalation! # Defaults env_keep += "HOME" ## ## X11 resource path settings # Defaults env_keep += "XAPPLRESDIR XFILESEARCHPATH XUSERFILESEARCHPATH" ## ## Desktop path settings # Defaults env_keep += "QTDIR KDEDIR" ## ## Allow sudo-run commands to inherit the callers' ConsoleKit session # Defaults env_keep += "XDG_SESSION_COOKIE" ## ## Uncomment to enable special input methods. Care should be taken as ## this may allow users to subvert the command being run via sudo. # Defaults env_keep += "XMODIFIERS GTK_IM_MODULE QT_IM_MODULE QT_IM_SWITCHER" ## ## Uncomment to use a hard-coded PATH instead of the user's to find commands # Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbi$ ## ## Uncomment to send mail if the user does not enter the correct password. # Defaults mail_badpass ## ... ## ## User privilege specification ## root ALL=(ALL) ALL ## Uncomment to allow members of group wheel to execute any command # %wheel ALL=(ALL) ALL ## Same thing without a password # %wheel ALL=(ALL) NOPASSWD: ALL ## Uncomment to allow members of group sudo to execute any command # %sudo ALL=(ALL) ALL ## Uncomment to allow any user to run sudo if they know the password ## of the user they are running the command as (root by default). # Defaults targetpw # Ask for the password of the target user # ALL ALL=(ALL) ALL # WARNING: only use this together with 'Defaults targetpw' ## Read drop-in files from /etc/sudoers.d ## (the '#' here does not indicate a comment) #includedir /etc/sudoers.d