Exciting to see that #DasUBoot has joined @conservancy as a member project!

Odds are you have used (or you own) a device that boots with U-Boot. It's another reason to consider supporting Software Freedom Conservancy if you are able.

Become a Sustainer today (if you can)!

#SFC #FOSS #OSS #UBoot #Bootloader #SoftwareFreedom #Sustainable

https://sfconservancy.org/news/2025/dec/29/u-boot-has-joined-sfc/

U-Boot has joined Software Freedom Conservancy

We're so happy to announce that Das U-Boot, the Universal Bootloader, will be joining SFC! U-Boot is the most popular generic-purpose bootloader and is critical to ensuring that devices remain as open and free as possible. U-Boot has been essential for embedded linux products and is the de facto standard across various processor architectures.

Software Freedom Conservancy
#UBoot 2025.07 has been released (#DasUBoot / #UniversalBootLoader / #BootLoader) https://denx.de/wiki/U-Boot/
The U-Boot Documentation — Das U-Boot unknown version documentation

Das U-Boot - Wikipedia

Any #uboot (the #bootloader) experts here? I’m trying to boot a #PetaLinux image, but I get

Verifying Hash Integrity ... sha256 error!
Bad hash value for 'hash-1' hash node in 'ramdisk-1' image node
Bad Data Hash
Ramdisk image is corrupt or invalid
Booting using Fit image failed

even though when I extract the image (no matter whether with dd or dumpimage), the resulting SHA256 _does_ match the checksum listed in the #FIT. What’s going on?

#Yocto #DasUBoot #askFedi #embedded #Xilinx

Linux Arcade Cab Gives Up Its Secrets Too Easily

Sometimes reverse engineering embedded systems can be a right old faff, with you needing to resort to all kinds of tricks such as power glitching in order to poke a tiny hole in the armour, giving you an way in. And, sometimes the door is just plain wide open. This detailed exploration of an off-the-shelf retro arcade machine, is definitely in that second camp, for an unknown reason. [Matthew Alt] of VoidStar Security, took a detailed look into how this unit works, which reads as a great introduction to how embedded Linux is constructed on these minimal systems.

Could this debug serial port be more obvious?

The hardware is the usual bartop cabinet, with dual controls and an LCD display, with just enough inside a metal enclosure to drive the show. Inside this, the main PCB has the expected minimal ARM-based application processor with its supporting circuit. The processor is the Rockchip RK3128, sporting a quad-core ARM Neon and a Mali400 GPU, but the main selling point is the excellent Linux support. You'll likely see this chip or its relatives powering cheap Android TV boxes, and it's the core of this nice looking 'mini PC' platform from firefly. Maybe something to consider seeing as though Raspberry Pis are currently so hard to come by?

Anyway, we digress a little, [Matthew] breaks it down for us in a very methodical way, first by identifying the main ICs and downloading the appropriate datasheets. Next he moves on to connectors, locating an internal non-user-facing USB micro port, which is definitely going to be of interest. Finally, the rather obvious un-populated 3-pin header is clearly identified as a serial port. This was captured using a Saleae clone, to verify it indeed was a UART interface and measure the baud rate. After doing that, he hooked it into a Raspberry Pi UART and by attaching the standard screen utility to the serial device, low-and-behold a boot log and a root prompt! This thing really is barn-door wide-open.

Is that a root prompt you have for me? Oh why yes it is!

Simply by plugging in a USB stick, the entire flash memory was copied over, partitions and all, giving a full backup in case subsequent hacking messed things up. Being based on U-Boot, it was a trivial matter of just keying in 'Ctrl-C' at boot time, and he was dropped straight into the U-Boot command line, and all configuration could be easily read out. By using U-Boot to low-level dump the SPI flash to an external USB device, via a RAM copy, he proved he could do the reverse and write the same image back to flash without breaking something, so it was now possible to reverse engineer the software, make changes and write it back. Automation of the process was done using Depthcharge on the Raspberry Pi, which was also good to read about. We will keep an eye on the blog for what he does with it next!

As we've covered earlier, embedded Linux really is everywhere, and once you've got hardware access and some software support, hacking in new tricks is not so hard either.

#linuxhacks #softwarehacks #dasuboot #depthcharge #embeddedlinux #flashstorage #retroarcade #reverseengineering #spi

Linux Arcade Cab Gives Up Its Secrets Too Easily

Sometimes reverse engineering embedded systems can be a right old faff, with you needing to resort to all kinds of tricks such as power glitching in order to poke a tiny hole in the armour, giving …

Hackaday