# Login Debian11 default login `username`: toybrick, `password`: toybrick # Remote Login Debugging TB-RK3588X development board debian11 OS support `adb` and `ssh` method to remote login by default. - Linux PC USB connector : Connect PC USB Host connector with TB-RK358X USB OTG connector. - Execute the `adb shell` command to login TB-RK3588X debian system. ```eval_rst .. hint:: Usually the OTG port on development board has “TYPE_C” or "DOWNLOAD" silkscreen. ``` ## ssh Login Linux PC Host execute the following command remotely by network to login TB-RK3588X development board debian11 system. ([ip get]( #ip_get)) ```shell ssh toybrick@xxx.xxx.xxx.xxx //xxx.xxx.xxx.xxx development board IP address ``` # Common Command Line ## Network Connect - Insert network cable - Command for view the ethernet port name: `ip a` - Command for dynamically assigning IP addresses (For example the ethernet port name is eth1) : `dhclient eth1` ## Mount the U Disk ```shell mount /dev/sda1 /mnt //assume u disk is:/dev/sda1 ``` ## Remote Copy ```shell scp $LOCAL_FILE $USER@$IP:/$REMOTE_PATH ``` ## Backup Important File Mount the Rootfs partition to the /sysroot directory: After you enter the emergency mode, the system will automatically mounts the Rootfs partition to /sysroot. Copy important files to U-disk or remote host: ```shell cp $FILE /mnt/ scp $LOCAL_FILE $USER@$IP:/$REMOTE_PATH ``` ## System Recovery 1. Copy rootfs.img to the U-disk and mount the U-disk to the/mnt directory. ```shell $cp rootfs.img $Udisk mount /dev/sda1 /mnt ``` 2. Execute the following command to recovery the system. ```shell umount /sysroot dd if=/mnt/rootfs.img of=/dev/disk/by-partlabel/rootfs ``` ## Emergency Mode The emergency mode is used when the system cannot start normally due to abnormal user behavior that damages system files. Do not use the emergency mode unless necessary. Pull out the type-c cable of the OTG connector of the device, long press the recovery button and restart the device, and the system will enter the command line of emergency mode, as shown in the following figure: ![shell](./Images/initrd_shell_0.png)