[PATCH] Gunzip call fix for PPC kernel images >4MB

Benjamin Heyne benjamin.heyne at uni-dortmund.de
Wed Aug 16 19:31:37 EST 2006


If Kernel images for PPC grow >4MB inflating of the kernel fails.
Increasing the link/load address doesn't help. Problem is 
solved by replacing the fixed address of the gunzip() call in
misc-embedded.c with CONFIG_BOOT_LOAD.

Signed-off-by: Benjamin Heyne <benjamin.heyne at uni-dortmund.de>
---

--- arch/ppc/boot/simple/misc-embedded.c.orig 2006-08-16 10:56:10.000000000 +0200 
+++ arch/ppc/boot/simple/misc-embedded.c 2006-08-16 10:56:55.000000000 +0200 
@@ -213,7 +213,7 @@ load_kernel(unsigned long load_addr, int 
	*cp = 0;
 	puts("\nUncompressing Linux...");
 
-	gunzip(0, 0x400000, zimage_start, &zimage_size);
+	gunzip(0, CONFIG_BOOT_LOAD, zimage_start, &zimage_size);
 	flush_instruction_cache();
 	puts("done.\n");
 	{

-- 
Benjamin Heyne
=======================================================
 Arbeitsgebiet Datentechnik, Universitaet Dortmund
 Information Processing Lab, University of Dortmund

 Otto-Hahn-Strasse 4, 44227 Dortmund, Germany
 Fon: +49 231 755 7017, Fax: +49 231 755 7019
 www.dt.e-technik.uni-dortmund.de, Raum/Room P1-04-217



More information about the Linuxppc-dev mailing list