Recent site activity

Slackware




Please read the following QUICKSTART carefully:

  • The rootfs tarball can be downloaded via the Changelog page
  • The rootfs should be decompressed to the first partition of a USB drive (e.g. /dev/sda1).
  • The second partition (e.g. /dev/sda2) should be a swap partition, although Slackware will run without swap if this hasn't been configured.
  • You can find the kernel in /boot/bzImage in the tarball.  This needs to be flashed to the board using the scripts provided (bb_eth_upload8.py for Ethernet flashing or bb_upload8.py for serial flashing).
  • See this page if you need help following the above instructions
  • Although not part of the standard Slackware distribution, the 'slapt-get' program has been added to the tarball, to allow easy installation of extra packages over the network. By default slapt-get downloads from www.mirrorservice.org (in the UK).  Depending on your location other Slackware mirrors may give faster downloads, see /etc/slapt-get/slapt-getrc for details.
            Example: slapt-get -i gcc  (installs gcc)
  • The Bifferboard will try to get an IP address automatically (DHCP).  This can be changed by running the netconfig script.
  • To access your Bifferboard over the network, simply type "telnet bifferboard" and login as root.  Note: This rootfs has no root password set, so is very insecure!
  • A minimal set of kernel modules have been included, (i2c, watchdog etc..), see the subpages for info on how to use them.  
  • Refer to the Slackbook for help with running or configuring slackware.
  • Have fun!  :-).
     
More detailed info


Here is the readme:

Slackware on the Bifferboard
============================

This file attempts to document how Bifferboard Slackware differs from the
official Slackware distribution.  For general information on Slackware
see:  http://www.slackware.com.  For general information on slapt-get, the
package installer see:  http://software.jaos.org/.


Compiling a new kernel
======================

If the bzImage found in this directory is not to your liking, then you will
need to compile your own.  Follow these steps:

  svn co https://bifferboard.svn.sourceforge.net/svnroot/bifferboard
  cd bifferboard/kernel
  make
  cd linux-2.6.30.5
 
  make menuconfig
  *** configure the kernel as you like ***
  make
  make modules_install INSTALL_MOD_PATH=<rootfs location>

These steps will leave the built kernel sources under the /boot directory.
You can use the bb_eth_upload.py script or the bb_upload.py script to
flash the new kernel to your board.  Your modules should end up in the
right place. 

If your board has only 1MB flash: then the bzImage should
be no larger than 974848 bytes (0xee00 hex) to avoid overwriting the
Biffboot configuration block.  The absolute maximum size allowed is
983040 bytes (0xf0000 hex).




Notes on how to prepare Slackware rootfs for Bifferboard
========================================================

This is just for info, it's already been done for you if you're reading
this from the slackware rootfs tarball, but if you want to recreate
this rootfs starting with the Slackware CDs/DVD then you'll need this.

* Install Slackware from DVD.  See /var/log/packages for the list of
  packages to install.

* Edit /etc/securetty to include ttyS0 (comment it in), comment in the
  other consoles.

* edit /etc/inittab to include a serial logon, like this:

  # Local serial lines:
  s1:12345:respawn:/sbin/agetty -L ttyS0 115200 vt100
  #s2:12345:respawn:/sbin/agetty -L ttyS1 9600 vt100

* Put this in place of hwclock stuff in /etc/rc.d/rc.S

/usr/bin/date -s "$(/sbin/dumpe2fs -h /dev/sda1 | grep "Last mount time:" | sed s/"Last mount time: *"//)"

* Disable udevd (chmod 644 /etc/rc.d/rc.udevd)

* Install slapt-get (not an Official Slackware package)

* Update /etc/slapt-get/slapt-getrc to point to a mirror