05-16-2018, 07:18 PM
Hi All,
I am coaching two undergrads through a summer research experience doing a deep dive into Linux kernel hacking.
I expect we're going to break the kernel a whole lot. My first task is to master recovering from this gracefully.
Leveraging dim memory from the last time I did something like this (a VAX 11/780 with Berkeley Unix), multiple kernel images could reside on disk (including a known good image). The boot loader could be instructed which to load.
I suspect the process on the Rock64 is similar... Would you be willing to comment if I'm on the right track:
- add USB UART to board.
- ensure U-Boot is flashed
- boot into U-Boot ... select kernel image... boot
Does the FLASH come with U-Boot already present?
Thank you a lot - I am happy to answer any questions you might have about our project (introduce a multiple personality disorder into Ubuntu).
I am coaching two undergrads through a summer research experience doing a deep dive into Linux kernel hacking.
I expect we're going to break the kernel a whole lot. My first task is to master recovering from this gracefully.
Leveraging dim memory from the last time I did something like this (a VAX 11/780 with Berkeley Unix), multiple kernel images could reside on disk (including a known good image). The boot loader could be instructed which to load.
I suspect the process on the Rock64 is similar... Would you be willing to comment if I'm on the right track:
- add USB UART to board.
- ensure U-Boot is flashed
- boot into U-Boot ... select kernel image... boot
Does the FLASH come with U-Boot already present?
Thank you a lot - I am happy to answer any questions you might have about our project (introduce a multiple personality disorder into Ubuntu).