b4e7de0f35
The 601 processor will generate an alignment exception for accesses which cross a page boundary. In the boot wrapper code, OF is still handling all exceptions, and it doesn't have an alignment exception handler that emulates the instruction and continues. This changes the memcpy and memmove routines in the boot wrapper to avoid doing unaligned accesses. If the source and destination are misaligned with respect to each other, we just copy one byte at a time. Signed-off-by: Paul Mackerras <paulus@samba.org> |
||
---|---|---|
.. | ||
.gitignore | ||
addnote.c | ||
addRamDisk.c | ||
crt0.S | ||
div64.S | ||
elf.h | ||
hack-coff.c | ||
install.sh | ||
main.c | ||
Makefile | ||
page.h | ||
ppc_asm.h | ||
prom.c | ||
prom.h | ||
README | ||
rs6000.h | ||
stdio.c | ||
stdio.h | ||
string.h | ||
string.S | ||
zImage.coff.lds | ||
zImage.lds |
To extract the kernel vmlinux, System.map, .config or initrd from the zImage binary: objcopy -j .kernel:vmlinux -O binary zImage vmlinux.gz objcopy -j .kernel:System.map -O binary zImage System.map.gz objcopy -j .kernel:.config -O binary zImage config.gz objcopy -j .kernel:initrd -O binary zImage.initrd initrd.gz Peter