background preloader

PlugBoxes

Facebook Twitter

SheevaPlug – hackable:1. Testing hackable:1 on a usb device Preparing the usb device Needed: a serial terminal (minicom / cu / gtkterm / ...) a usb device ( => 500 Mo) get H1 version: # wget mount the first partition of a formated usb device (ext3 works as well, here we mounted it in /mnt/usb and device was in /dev/sdb1): # mkdir /mnt/usb # mount /dev/sdb1 /mnt/usb untar tarball to the usb device: # tar xzpf Hackable1-Openmoko-Freerunner-user-rev5beta5.tar.gz -C /mnt/usb/ edit inittab for serial: # echo "T0:23:respawn:/sbin/getty -L ttyS0 115200 vt100" >> /mnt/usb/etc/inittab edit network configuration (we want eth0): # sed "s/^#auto eth0/auto eth0/;s/^#iface eth0/iface eth0/" -i /mnt/usb/etc/network/interfaces umount usb: # sync # umount /mnt/usb Launch hackable:1 on the SheevaPlug Install h:1 on flash In this example we will explain how to upgrade the u-boot version of the SheevaPlug and at the same time install h:1 on flash.

GuruPlug, the next generation of SheevaPlug. OpenRD-Base. SheevaPlug Dev Kit. PlugApps. Nobox.