Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- OpenMediaVault for ODROID C0/C1/C1+/C2/XU3/XU4/HC1/HC2
- Write image in a single step using Etcher https://etcher.io to SD card
- or eMMC using Hardkernel's adapter. When booting from SD card you can
- transfer the rootfs in a second step to permanently attached storage
- using the included nand-sata-install tool.
- Notes:
- - for ODROID-XU4/HC1/HC2 use OMV_3_0_88_Odroidxu4_4.9.52.img.xz
- - detailed information / discussion:
- https://forum.openmediavault.org/index.php/Thread/19618
- - for ODROID-C0/C1/C1+ use OMV_3_0_88_Odroidc1_3.10.107.img.xz
- - No need to decompress images. Simply burn them using Etcher
- https://etcher.io -- Etcher decompresses on the fly, verifies
- burning results and thereby saves you from common SD card hassles!
- - OMV installation finalizes itself at first boot (network connection
- needed!) Please be patient since this can take up to 15 minutes.
- When done the board automatically reboots once and afterwards OMV
- is ready to be used
- - SSH keys are regenerated on first boot but SSH login has to be
- enabled in web UI prior to usage: Services --> SSH --> Permit root
- login
- - Please immediately change default passwords!
- - The last partition for data use will be automatically resized on
- first boot to use all available SD card space. Though you need to
- put your filesystem of choice on it (eg mkfs.btrfs /dev/mmcblk0p3)
- - openmediavault-flashmemory plugin preinstalled to reduce wear on SD
- card/eMMC.
- - In case your OMV installation behaves strange and you use an 8GB
- eMMC module please try via SSH: rm /root/.rootfs_resize && reboot
- Web interface:
- - username = admin
- - password = openmediavault
- Console/SSH:
- - username = root
- - password = openmediavault
- Download integrity:
- Below are MD5 hashes for the compressed images:
- OMV_3_0_88_Odroidc1_3.10.107.img.xz: 6b92fd7721e559efbde0e08182567c31
- OMV_3_0_88_Odroidc2_3.14.79.img.xz: 57610461487310371603e0324ea68a12
- OMV_3_0_88_Odroidxu4_4.9.52.img.xz: ec90048c2972bbc0e2f7fd795b027492
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement