approaches to safely trying custom kernels - Printable Version +- PINE64 (https://forum.pine64.org) +-- Forum: ROCK64 (https://forum.pine64.org/forumdisplay.php?fid=85) +--- Forum: Linux on Rock64 (https://forum.pine64.org/forumdisplay.php?fid=88) +--- Thread: approaches to safely trying custom kernels (/showthread.php?tid=6067) |
approaches to safely trying custom kernels - pkivolowitz - 05-16-2018 Hi All, I am coaching two undergrads through a summer research experience doing a deep dive into Linux kernel hacking. I expect we're going to break the kernel a whole lot. My first task is to master recovering from this gracefully. Leveraging dim memory from the last time I did something like this (a VAX 11/780 with Berkeley Unix), multiple kernel images could reside on disk (including a known good image). The boot loader could be instructed which to load. I suspect the process on the Rock64 is similar... Would you be willing to comment if I'm on the right track: - add USB UART to board. - ensure U-Boot is flashed - boot into U-Boot ... select kernel image... boot Does the FLASH come with U-Boot already present? Thank you a lot - I am happy to answer any questions you might have about our project (introduce a multiple personality disorder into Ubuntu). |