approaches to safely trying custom kernels
#1
Hi All,

I am coaching two undergrads through a summer research experience doing a deep dive into Linux kernel hacking.

I expect we're going to break the kernel a whole lot. My first task is to master recovering from this gracefully.

Leveraging dim memory from the last time I did something like this (a VAX 11/780 with Berkeley Unix), multiple kernel images could reside on disk (including a known good image). The boot loader could be instructed which to load.

I suspect the process on the Rock64 is similar... Would you be willing to comment if I'm on the right track:

- add USB UART to board.
- ensure U-Boot is flashed
- boot into U-Boot ... select kernel image... boot

Does the FLASH come with U-Boot already present? 

Thank you a lot - I am happy to answer any questions you might have about our project (introduce a multiple personality disorder into Ubuntu).
  Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)