[PATCH] Gunzip call fix for PPC kernel images >4MB
Benjamin Heyne
benjamin.heyne at uni-dortmund.de
Wed Aug 16 19:31:37 EST 2006
If Kernel images for PPC grow >4MB inflating of the kernel fails.
Increasing the link/load address doesn't help. Problem is
solved by replacing the fixed address of the gunzip() call in
misc-embedded.c with CONFIG_BOOT_LOAD.
Signed-off-by: Benjamin Heyne <benjamin.heyne at uni-dortmund.de>
---
--- arch/ppc/boot/simple/misc-embedded.c.orig 2006-08-16 10:56:10.000000000 +0200
+++ arch/ppc/boot/simple/misc-embedded.c 2006-08-16 10:56:55.000000000 +0200
@@ -213,7 +213,7 @@ load_kernel(unsigned long load_addr, int
*cp = 0;
puts("\nUncompressing Linux...");
- gunzip(0, 0x400000, zimage_start, &zimage_size);
+ gunzip(0, CONFIG_BOOT_LOAD, zimage_start, &zimage_size);
flush_instruction_cache();
puts("done.\n");
{
--
Benjamin Heyne
=======================================================
Arbeitsgebiet Datentechnik, Universitaet Dortmund
Information Processing Lab, University of Dortmund
Otto-Hahn-Strasse 4, 44227 Dortmund, Germany
Fon: +49 231 755 7017, Fax: +49 231 755 7019
www.dt.e-technik.uni-dortmund.de, Raum/Room P1-04-217
More information about the Linuxppc-dev
mailing list