SBE HW400c/2 Computer Hardware User Manual


 
HighWire HW400c/2 User Reference Guide Rev 1.0
5.4 Configuring
c/2.
5.4.1 Modifying
nce all software is compiled natively on the HW400c/2, there is no need to modify
the host’s path.
5.4.2 Configurin
y
age for your
nal product, having access to a complete Linux distribution and tool set for your
the /etc/exports file on
your host machine, adding an entry for that file system that looks something like the
p
Thi n
of the directory being exported by the host system as the
the target system
ion.
pecify the IP address that you have assigned to your HW400c/2 board,
r you can simply enter a * in order to grant access to the exported file system to any
Using * to specify the IP addresses of hosts permitted to access an exported file
the Host System
The next few sections describe daemons and system services that must be installed
and correctly activated in order to boot the Linux kernel on the HW400c/2 and
subsequently compile applications for the HW400
the Host Path
Si
g the Host NFS Server
The Linux kernel is a ready-to-run root file system for your target architecture,
enabling you to boot your target embedded system over the network using the
exported file system as the target’s root file system. Although you might eventuall
ant to use a small, specific root file system as an initial disk-on-chip imw
fi
target system provides you with access to a wide range of Linux software for testing
and debugging purposes.
To export the root file system, you will need to edit
following:
# /o t/gentoo 10.0.0.10(rw,no_root_squash)
s e try consists of two fields:
The full pathname
root file system for
Access information for the exported file system. This consists of the IP
address of the system that you want to be able to access the exported file
system, followed by a description of the type of access that the target system
will have to the exported file system, enclosed within parentheses.
The IP address of the target system depends on the IP address that is assign to the
HW400c/2 board. The value shown in the previous example is a commonly used
non-routable IP address, and is the IP address used in the examples in this sect
You should s
o
host.
!
system is extremely insecure and should only be done if you are on a trusted, private,
non-routable network and the system exporting the file system is not exposed to the
Internet.
October 10, 2006 Copyright 2006, SBE, Inc. Page 69