Well, I received my GoFlex Satellite and this device was made for hacking. Telnetted right in as root/goflex, it has a nice environment - actually the open Arago Project distro
http://arago-project.org/ as advertised right on the /etc/issue.
It was almost trivial to set up an Arch chroot environment. My biggest question for the forum is what image should I be using? I used an outdated
http://us.mirror.archlinuxarm.org/os/to ... oot.tar.gz just because it had "chroot" in the name - don't really know much about what the difference is.
128MB RAM, /proc/cpuinfo is:
Processor : ARMv7 Processor rev 2 (v7l)
BogoMIPS : 298.32
Features : swp half thumb fastmult vfp edsp neon vfpv3
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x3
CPU part : 0xc08
CPU revision : 2
Hardware : OMAP3 EVM
Revision : 0020
Serial : 0000000000000000
My complete notes follow - note that this is only a first pass, I'm sure I'll be refining them in the coming days.
GoFlex Satellite Arch chroot - 8/24/2012
----
Power on, associate with wifi, go to any web page, click "connect to internet",
configure for local wifi.
telnet goflexsatellite
user: root
pw: goflex
Followed TouchPad chroot instructions adapted from:
viewtopic.php?t=1361 cd /media/sda1
mkdir arch
dd if=/dev/zero of=alarm.img seek=749999999 bs=1 count=1 #750MB image file
mke2fs -F alarm.img
losetup /dev/loop1 alarm.img
mount -t ext2 /dev/loop1 arch/
cd arch
# Note: I used the Touchpad chroot image - lucky first pick - probably too old
wget
http://us.mirror.archlinuxarm.org/os/to ... oot.tar.gz tar xzf ArchLinuxARM-*.tar.gz
mount -o bind /dev/ /media/sda1/arch/dev
chroot . /bin/bash
echo "nameserver 8.8.8.8" > /etc/resolv.conf
mount -t proc proc /proc
mount -t sysfs sysfs /sys
pacman -Syu # upgrades...