GUF-Yocto-jethro-9.0-r7707-0
i.MX6
User Manual
Figure 2: Pinning of the RS232 connector on a 7" device (left) and on a 5" device (right)
To use the serial console provided over USB, connect a Micro-USB cable to the USB-OTG connector of the
target. When this USB cable is connected to a Windows PC, a driver is installed and a new COM port is created.
Its name can be seen in the device manager.
Note:
Although the serial connection over USB is easy to setup, there are some disadvantages over the RS232
connection: The output of the bootloader and the boot messages are not shown. The first thing you see is the
login shell. This way it is not ideal for system updates.
With the serial connection set up start your favourite terminal program (e.g. minicom) with the following settings:
115200 baud
8 data bits
no parity
1 stop bit
no hardware flow control
no software flow control
If you are using the RS232 connection, you should see debug messages in the terminal from the very first moment
when the target is powered. After the boot process has finished, you will see the Linux login shell:
Garz & Fricke Yocto BSP (based on Poky) @VERSION@ santaro /dev/ttymxc0
santaro login:
You can log in as user
root
without any password by default.
3.2
SSH console
Using SSH, you can access the console of the device and copy files to or from the target. Please note that SSH
must be installed on the host system in order to gain access.
To login via SSH, type on the host system:
$ ssh [email protected]
The first time you access the target system from the host system, the target is added to the list of known hosts.
You have to confirm this step in order to establish the connection.
The authenticity of host '192.168.1.1 (192.168.1.1)' can't be established.
RSA key fingerprint is e5:86:89:19:50:a5:46:52:15:35:e5:0e:d2:d1:f9:62.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.1.1' (RSA) to the list of known hosts.
root@santaro:~#
To return to your host system’s console, type:
root@santaro:~# exit
You can use
secure copy (scp)
on the device or the host system to copy files from or to the device.
Example
: To copy the file
myapp
from the host’s current working directory to the target’s
/usr/bin
directory, type
on the host’s console:
$ scp ./myapp [email protected]:/usr/bin/myapp
11