第三世代 LinkStation ハックキットのセットアップは 一通り終わり、 KURO-RS を用いた赤外線リモコンも動くようになったので、 ハック de 録!!をセットアップしていく。
最初は、 標準ファームのコピー
Jul 18 20:24:27 slam kernel: usb 2-1: new high speed USB device using ehci_platform and address 3 Jul 18 20:24:27 slam kernel: usb 2-1: configuration #1 chosen from 1 choice Jul 18 20:24:27 slam kernel: scsi2 : SCSI emulation for USB Mass Storage devices Jul 18 20:24:32 slam kernel: Vendor: SAMSUNG Model: JDPPB08546 Rev: 0-05 Jul 18 20:24:32 slam kernel: Type: Direct-Access ANSI SCSI revision: 02 Jul 18 20:24:32 slam kernel: SCSI device sdb: 488397168 512-byte hdwr sectors (250059 MB) Jul 18 20:24:32 slam kernel: sdb: Write Protect is off Jul 18 20:24:32 slam kernel: SCSI device sdb: 488397168 512-byte hdwr sectors (250059 MB) Jul 18 20:24:32 slam kernel: sdb: Write Protect is off Jul 18 20:24:32 slam kernel: sdb: sdb1 sdb2 sdb4 < sdb5 sdb6 > Jul 18 20:24:32 slam kernel: sd 2:0:0:0: Attached scsi disk sdb Jul 18 20:24:32 slam kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0
slam:~# mkdir /tmp/root slam:~# mount /dev/sdb2 /tmp/root slam:~# ls /tmp/root bin dev home lost+found proc sbin sys usr www boot etc lib mnt root share tmp var slam:~# cat /tmp/root/etc/linkstation_release VERSION=1.11 SUBVERSION=HDD 3.00 PRODUCTID=0x0000000A BUILDDATE=2007/11/06 09:02:03 slam:~#
slam:~# ls /mnt share slam:~# mkdir /mnt/buffalo slam:~# (cd /tmp/root ; tar cf - .)|(cd /mnt/buffalo/; tar xvf -) ./ ./bin/ : : ./sys/ ./boot/ ./lost+found/ ./tmp slam:~#
slam:~# umount /tmp/root slam:~#
slam:~# cd /usr/local slam:/usr/local# ln -s /mnt/buffalo . slam:/usr/local# ls -l total 0 drwxrwsr-x 2 root staff 56 Jul 18 08:02 bin lrwxrwxrwx 1 root staff 12 Jul 18 20:27 buffalo -> /mnt/buffalo drwxrwsr-x 2 root staff 6 Nov 21 2008 etc drwxrwsr-x 2 root staff 6 Nov 21 2008 games drwxrwsr-x 2 root staff 6 Nov 21 2008 include drwxrwsr-x 3 root staff 44 Jul 18 08:03 lib lrwxrwxrwx 1 root staff 9 Jul 2 21:40 man -> share/man drwxrwsr-x 2 root staff 54 Jul 2 21:41 sbin drwxrwsr-x 3 root staff 16 Jul 2 21:40 share drwxrwsr-x 3 root staff 20 Jul 18 17:10 src slam:/usr/local#
slam:/usr/local# cd /mnt/buffalo/var slam:/mnt/buffalo/var# ls -l total 4 drwxr-xr-x 3 root root 17 Apr 5 06:48 empty drwxr-xr-x 4 root root 27 Apr 5 06:48 lib drwxrwxrwx 5 root root 97 Apr 5 06:50 lock drwxr-xr-x 6 root root 4096 Dec 14 23:33 log drwxr-xr-x 2 root root 6 Apr 5 06:48 proftpd lrwxrwxrwx 1 root root 16 Apr 27 23:11 run -> /mnt/ram/var/run drwxr-xr-x 2 root root 17 Apr 5 06:48 spool lrwxrwxrwx 1 root root 16 Apr 27 23:11 tmp -> /mnt/ram/var/tmp drwxr-xr-x 2 48 48 6 Apr 5 06:48 www slam:/mnt/buffalo/var# rm run slam:/mnt/buffalo/var# mkdir -p run/apache slam:/mnt/buffalo/var# rm tmp slam:/mnt/buffalo/var# mkdir tmp slam:/mnt/buffalo/var# chmod 1777 tmp slam:/mnt/buffalo/var# cd ../mnt/disk1/ slam:/mnt/buffalo/mnt/disk1# mkdir share slam:/mnt/buffalo/mnt/disk1# chmod 777 share slam:/mnt/buffalo/mnt/disk1#
|
← LS-XHL ファームウェア 1.10 から 1.20 にアップデートできる? |
ハックの記録 LinkStation/玄箱 をハックしよう |
→ ファームウェアの新規インストール |