Linux - Embedded & Single-board computerThis forum is for the discussion of Linux on both embedded devices and single-board computers (such as the Raspberry Pi, BeagleBoard and PandaBoard). Discussions involving Arduino, plug computers and other micro-controller like devices are also welcome.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
New to embedded linux and linux. I have an embedded linux system on ARM9. I am able to access root via LAN and access the console (I think) via serial port. It use vivi (or something called suppervivi) as bootloader. I found a JTAG on the board but don't know the pin config. I would like to learn embedded system by replacing the bootloader and regen the linux kernel. But before that, I would like to prepare for the worse. How can I backup the whole system so that in case something wrong I can restore to stock?
You should proceed with caution. It may be possible to overwrite the bootloader from a userspace application, but unless the new bootloader is at least functional enough to repeat the process, you will have to use an alternative method to restore a working bootloader. Whether this is possible is completely hardware dependent. Given the presence of a JTAG interface, it is possible, but not guaranteed, that the bootloader can be restored using the JTAG interface. You should ascertain that you have a clear understanding of, and the necessary ancillary support (cabling, development host software, etc.) to correct any bootloader corruption. Without this, there is a real possibility of making your embedded target into a brick.
Can you provide a make/model description of your target hardware? There may be someone with firsthand experience with your hardware that can provide specific answers.
--- rod.
ravi, Am I right that the dd only backup the kernel image but not the bootloader?
Nbomr, Thanks. I don't know what info is needed for others to help me. I have root access so that I can look for anywhere in the system, but I don't know what to look for answer to my question. Here is a few which I believe is related:
Here is at the beginning of the console (I believe), before loading kernel:
VIVI version 0.1.4 (root@localhost.localdomain) (gcc version 2.95.3 20010315 (re
lease)) #0.1.4 Sat Jul 21 11:51:25 CST 2007
MMU table base address = 0x33DFC000
Succeed memory mapping.
DIVN_UPLL0
MPLLVal [M:7fh,P:2h,S:1h]
CLKDIVN:5h
+---------------------------------------------+
| S3C2440A USB Downloader ver R0.03 2004 Jan |
+---------------------------------------------+
USB: IN_ENDPOINT:1 OUT_ENDPOINT:3
FORMAT: <ADDR(DATA):4>+<SIZE(n+10):4>+<DATA:n>+<CS:2>
NOTE: Power off/on or press the reset button for 1 sec
in order to get a valid USB device address.
NAND device: Manufacture ID: 0xec, Chip ID: 0x76 (Samsung K9D1208V0M)
Could not found stored vivi parameters. Use default vivi parameters.
Press Return to start the LINUX/Wince now, any other key for vivi
Copy linux kernel from 0x00050000 to 0x30008000, size = 0x00200000 ... done
Would like to find out how to backup the bootloader. Let me know if any other info is needed.
You will need to know in what part of non-volatile memory the bootloader is stored, and what method(s) are used to write to said memory. If the target host/board is intended to be used for OEMs to embed in other products, this information should be provided by the manufacturer as part of the product documentation. In the case of OEM-targeted products, they may also provide documentation or software tools to help you perform the operation of reloading/replacing the bootloader. Your challenge is not to backup the bootloader, but to restore it, if necessary.
Can you provide a make/model description of your target hardware? There may be someone with firsthand experience with your hardware that can provide specific answers.
--- rod.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.