亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? bootpz.c

?? h內核
?? C
字號:
/* * arch/alpha/boot/bootpz.c * * Copyright (C) 1997 Jay Estabrook * * This file is used for creating a compressed BOOTP file for the * Linux/AXP kernel * * based significantly on the arch/alpha/boot/main.c of Linus Torvalds * and the decompression code from MILO. */#include <linux/kernel.h>#include <linux/string.h>#include <linux/version.h>#include <linux/mm.h>#include <asm/system.h>#include <asm/console.h>#include <asm/hwrpb.h>#include <asm/pgtable.h>#include <asm/io.h>#include <stdarg.h>#include "kzsize.h"/* FIXME FIXME FIXME */#define MALLOC_AREA_SIZE 0x200000 /* 2MB for now *//* FIXME FIXME FIXME *//*  WARNING NOTE  It is very possible that turning on additional messages may cause  kernel image corruption due to stack usage to do the printing.*/#undef DEBUG_CHECK_RANGE#undef DEBUG_ADDRESSES#undef DEBUG_LAST_STEPSextern unsigned long switch_to_osf_pal(unsigned long nr,	struct pcb_struct * pcb_va, struct pcb_struct * pcb_pa,	unsigned long *vptb);extern int decompress_kernel(void* destination, void *source,			     size_t ksize, size_t kzsize);extern void move_stack(unsigned long new_stack);struct hwrpb_struct *hwrpb = INIT_HWRPB;static struct pcb_struct pcb_va[1];/* * Find a physical address of a virtual object.. * * This is easy using the virtual page table address. */#define VPTB	((unsigned long *) 0x200000000)static inline unsigned longfind_pa(unsigned long address){	unsigned long result;	result = VPTB[address >> 13];	result >>= 32;	result <<= 13;	result |= address & 0x1fff;	return result;}	intcheck_range(unsigned long vstart, unsigned long vend,	    unsigned long kstart, unsigned long kend){	unsigned long vaddr, kaddr;#ifdef DEBUG_CHECK_RANGE	srm_printk("check_range: V[0x%lx:0x%lx] K[0x%lx:0x%lx]\n",		   vstart, vend, kstart, kend);#endif	/* do some range checking for detecting an overlap... */	for (vaddr = vstart; vaddr <= vend; vaddr += PAGE_SIZE)	{		kaddr = (find_pa(vaddr) | PAGE_OFFSET);		if (kaddr >= kstart && kaddr <= kend)		{#ifdef DEBUG_CHECK_RANGE			srm_printk("OVERLAP: vaddr 0x%lx kaddr 0x%lx"				   " [0x%lx:0x%lx]\n",				   vaddr, kaddr, kstart, kend);#endif			return 1;		}	}	return 0;}/* * This function moves into OSF/1 pal-code, and has a temporary * PCB for that. The kernel proper should replace this PCB with * the real one as soon as possible. * * The page table muckery in here depends on the fact that the boot * code has the L1 page table identity-map itself in the second PTE * in the L1 page table. Thus the L1-page is virtually addressable * itself (through three levels) at virtual address 0x200802000. */#define L1	((unsigned long *) 0x200802000)voidpal_init(void){	unsigned long i, rev;	struct percpu_struct * percpu;	struct pcb_struct * pcb_pa;	/* Create the dummy PCB.  */	pcb_va->ksp = 0;	pcb_va->usp = 0;	pcb_va->ptbr = L1[1] >> 32;	pcb_va->asn = 0;	pcb_va->pcc = 0;	pcb_va->unique = 0;	pcb_va->flags = 1;	pcb_va->res1 = 0;	pcb_va->res2 = 0;	pcb_pa = (struct pcb_struct *)find_pa((unsigned long)pcb_va);	/*	 * a0 = 2 (OSF)	 * a1 = return address, but we give the asm the vaddr of the PCB	 * a2 = physical addr of PCB	 * a3 = new virtual page table pointer	 * a4 = KSP (but the asm sets it)	 */	srm_printk("Switching to OSF PAL-code... ");	i = switch_to_osf_pal(2, pcb_va, pcb_pa, VPTB);	if (i) {		srm_printk("failed, code %ld\n", i);		__halt();	}	percpu = (struct percpu_struct *)		(INIT_HWRPB->processor_offset + (unsigned long) INIT_HWRPB);	rev = percpu->pal_revision = percpu->palcode_avail[2];	srm_printk("OK (rev %lx)\n", rev);	tbia(); /* do it directly in case we are SMP */}/* * Start the kernel. */static inline voidrunkernel(void){	__asm__ __volatile__(		"bis %0,%0,$27\n\t"		"jmp ($27)"		: /* no outputs: it doesn't even return */		: "r" (START_ADDR));}/* Must record the SP (it is virtual) on entry, so we can make sure   not to overwrite it during movement or decompression. */unsigned long SP_on_entry;/* Calculate the kernel image address based on the end of the BOOTP   bootstrapper (ie this program).*/extern char _end;#define KERNEL_ORIGIN \	((((unsigned long)&_end) + 511) & ~511)/* Round address to next higher page boundary. */#define NEXT_PAGE(a)	(((a) | (PAGE_SIZE - 1)) + 1)#ifdef INITRD_IMAGE_SIZE# define REAL_INITRD_SIZE INITRD_IMAGE_SIZE#else# define REAL_INITRD_SIZE 0#endif/* Defines from include/asm-alpha/system.h	BOOT_ADDR	Virtual address at which the consoles loads			the BOOTP image.	KERNEL_START    KSEG address at which the kernel is built to run,			which includes some initial data pages before the			code.	START_ADDR	KSEG address of the entry point of kernel code.	ZERO_PGE	KSEG address of page full of zeroes, but 			upon entry to kerne cvan be expected			to hold the parameter list and possible			INTRD information.   These are used in the local defines below.*/  /* Virtual addresses for the BOOTP image. Note that this includes the   bootstrapper code as well as the compressed kernel image, and   possibly the INITRD image.   Oh, and do NOT forget the STACK, which appears to be placed virtually   beyond the end of the loaded image.*/#define V_BOOT_IMAGE_START	BOOT_ADDR#define V_BOOT_IMAGE_END	SP_on_entry/* Virtual addresses for just the bootstrapper part of the BOOTP image. */#define V_BOOTSTRAPPER_START	BOOT_ADDR#define V_BOOTSTRAPPER_END	KERNEL_ORIGIN/* Virtual addresses for just the data part of the BOOTP   image. This may also include the INITRD image, but always   includes the STACK.*/#define V_DATA_START		KERNEL_ORIGIN#define V_INITRD_START		(KERNEL_ORIGIN + KERNEL_Z_SIZE)#define V_INTRD_END		(V_INITRD_START + REAL_INITRD_SIZE)#define V_DATA_END	 	V_BOOT_IMAGE_END/* KSEG addresses for the uncompressed kernel.   Note that the end address includes workspace for the decompression.   Note also that the DATA_START address is ZERO_PGE, to which we write   just before jumping to the kernel image at START_ADDR. */#define K_KERNEL_DATA_START	ZERO_PGE#define K_KERNEL_IMAGE_START	START_ADDR#define K_KERNEL_IMAGE_END	(START_ADDR + KERNEL_SIZE)/* Define to where we may have to decompress the kernel image, before   we move it to the final position, in case of overlap. This will be   above the final position of the kernel.   Regardless of overlap, we move the INITRD image to the end of this   copy area, because there needs to be a buffer area after the kernel   for "bootmem" anyway.*/#define K_COPY_IMAGE_START	NEXT_PAGE(K_KERNEL_IMAGE_END)/* Reserve one page below INITRD for the new stack. */#define K_INITRD_START \    NEXT_PAGE(K_COPY_IMAGE_START + KERNEL_SIZE + PAGE_SIZE)#define K_COPY_IMAGE_END \    (K_INITRD_START + REAL_INITRD_SIZE + MALLOC_AREA_SIZE)#define K_COPY_IMAGE_SIZE \    NEXT_PAGE(K_COPY_IMAGE_END - K_COPY_IMAGE_START)voidstart_kernel(void){	int must_move = 0;	/* Initialize these for the decompression-in-place situation,	   which is the smallest amount of work and most likely to	   occur when using the normal START_ADDR of the kernel	   (currently set to 16MB, to clear all console code.	*/	unsigned long uncompressed_image_start = K_KERNEL_IMAGE_START;	unsigned long uncompressed_image_end = K_KERNEL_IMAGE_END;	unsigned long initrd_image_start = K_INITRD_START;	/*	 * Note that this crufty stuff with static and envval	 * and envbuf is because:	 *	 * 1. Frequently, the stack is short, and we don't want to overrun;	 * 2. Frequently the stack is where we are going to copy the kernel to;	 * 3. A certain SRM console required the GET_ENV output to stack.	 *    ??? A comment in the aboot sources indicates that the GET_ENV	 *    destination must be quadword aligned.  Might this explain the	 *    behaviour, rather than requiring output to the stack, which	 *    seems rather far-fetched.	 */	static long nbytes;	static char envval[256] __attribute__((aligned(8)));	register unsigned long asm_sp asm("30");	SP_on_entry = asm_sp;	srm_printk("Linux/Alpha BOOTPZ Loader for Linux " UTS_RELEASE "\n");	/* Validity check the HWRPB. */	if (INIT_HWRPB->pagesize != 8192) {		srm_printk("Expected 8kB pages, got %ldkB\n",		           INIT_HWRPB->pagesize >> 10);		return;	}	if (INIT_HWRPB->vptb != (unsigned long) VPTB) {		srm_printk("Expected vptb at %p, got %p\n",			   VPTB, (void *)INIT_HWRPB->vptb);		return;	}	/* PALcode (re)initialization. */	pal_init();	/* Get the parameter list from the console environment variable. */	nbytes = callback_getenv(ENV_BOOTED_OSFLAGS, envval, sizeof(envval));	if (nbytes < 0 || nbytes >= sizeof(envval)) {		nbytes = 0;	}	envval[nbytes] = '\0';#ifdef DEBUG_ADDRESSES	srm_printk("START_ADDR 0x%lx\n", START_ADDR);	srm_printk("KERNEL_ORIGIN 0x%lx\n", KERNEL_ORIGIN);	srm_printk("KERNEL_SIZE 0x%x\n", KERNEL_SIZE);	srm_printk("KERNEL_Z_SIZE 0x%x\n", KERNEL_Z_SIZE);#endif	/* Since all the SRM consoles load the BOOTP image at virtual	 * 0x20000000, we have to ensure that the physical memory	 * pages occupied by that image do NOT overlap the physical	 * address range where the kernel wants to be run.  This	 * causes real problems when attempting to cdecompress the	 * former into the latter... :-(	 *	 * So, we may have to decompress/move the kernel/INITRD image	 * virtual-to-physical someplace else first before moving	 * kernel /INITRD to their final resting places... ;-}	 *	 * Sigh...	 */	/* First, check to see if the range of addresses occupied by	   the bootstrapper part of the BOOTP image include any of the	   physical pages into which the kernel will be placed for	   execution.	   We only need check on the final kernel image range, since we	   will put the INITRD someplace that we can be sure is not	   in conflict.	 */	if (check_range(V_BOOTSTRAPPER_START, V_BOOTSTRAPPER_END,			K_KERNEL_DATA_START, K_KERNEL_IMAGE_END))	{		srm_printk("FATAL ERROR: overlap of bootstrapper code\n");		__halt();	}	/* Next, check to see if the range of addresses occupied by	   the compressed kernel/INITRD/stack portion of the BOOTP	   image include any of the physical pages into which the	   decompressed kernel or the INITRD will be placed for	   execution.	 */	if (check_range(V_DATA_START, V_DATA_END,			K_KERNEL_IMAGE_START, K_COPY_IMAGE_END))	{#ifdef DEBUG_ADDRESSES		srm_printk("OVERLAP: cannot decompress in place\n");#endif		uncompressed_image_start = K_COPY_IMAGE_START;		uncompressed_image_end = K_COPY_IMAGE_END;		must_move = 1;		/* Finally, check to see if the range of addresses		   occupied by the compressed kernel/INITRD part of		   the BOOTP image include any of the physical pages		   into which that part is to be copied for		   decompression.		*/		while (check_range(V_DATA_START, V_DATA_END,				   uncompressed_image_start,				   uncompressed_image_end))		{#if 0			uncompressed_image_start += K_COPY_IMAGE_SIZE;			uncompressed_image_end += K_COPY_IMAGE_SIZE;			initrd_image_start += K_COPY_IMAGE_SIZE;#else			/* Keep as close as possible to end of BOOTP image. */			uncompressed_image_start += PAGE_SIZE;			uncompressed_image_end += PAGE_SIZE;			initrd_image_start += PAGE_SIZE;#endif		}	}	srm_printk("Starting to load the kernel with args '%s'\n", envval);#ifdef DEBUG_ADDRESSES	srm_printk("Decompressing the kernel...\n"		   "...from 0x%lx to 0x%lx size 0x%x\n",		   V_DATA_START,		   uncompressed_image_start,		   KERNEL_SIZE);#endif        decompress_kernel((void *)uncompressed_image_start,			  (void *)V_DATA_START,			  KERNEL_SIZE, KERNEL_Z_SIZE);	/*	 * Now, move things to their final positions, if/as required.	 */#ifdef INITRD_IMAGE_SIZE	/* First, we always move the INITRD image, if present. */#ifdef DEBUG_ADDRESSES	srm_printk("Moving the INITRD image...\n"		   " from 0x%lx to 0x%lx size 0x%x\n",		   V_INITRD_START,		   initrd_image_start,		   INITRD_IMAGE_SIZE);#endif	memcpy((void *)initrd_image_start, (void *)V_INITRD_START,	       INITRD_IMAGE_SIZE);#endif /* INITRD_IMAGE_SIZE */	/* Next, we may have to move the uncompressed kernel to the	   final destination.	 */	if (must_move) {#ifdef DEBUG_ADDRESSES		srm_printk("Moving the uncompressed kernel...\n"			   "...from 0x%lx to 0x%lx size 0x%x\n",			   uncompressed_image_start,			   K_KERNEL_IMAGE_START,			   (unsigned)KERNEL_SIZE);#endif		/*		 * Move the stack to a safe place to ensure it won't be		 * overwritten by kernel image.		 */		move_stack(initrd_image_start - PAGE_SIZE);		memcpy((void *)K_KERNEL_IMAGE_START,		       (void *)uncompressed_image_start, KERNEL_SIZE);	}		/* Clear the zero page, then move the argument list in. */#ifdef DEBUG_LAST_STEPS	srm_printk("Preparing ZERO_PGE...\n");#endif	memset((char*)ZERO_PGE, 0, PAGE_SIZE);	strcpy((char*)ZERO_PGE, envval);#ifdef INITRD_IMAGE_SIZE#ifdef DEBUG_LAST_STEPS	srm_printk("Preparing INITRD info...\n");#endif	/* Finally, set the INITRD paramenters for the kernel. */	((long *)(ZERO_PGE+256))[0] = initrd_image_start;	((long *)(ZERO_PGE+256))[1] = INITRD_IMAGE_SIZE;#endif /* INITRD_IMAGE_SIZE */#ifdef DEBUG_LAST_STEPS	srm_printk("Doing 'runkernel()'...\n");#endif	runkernel();}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产剧情一区二区| 精品国产欧美一区二区| 日韩精品一区二区在线| 日韩一区欧美一区| 秋霞电影网一区二区| 色综合中文字幕国产 | 91.com视频| 国产精品入口麻豆原神| 裸体健美xxxx欧美裸体表演| 欧洲一区二区三区在线| 国产精品国产三级国产有无不卡 | 在线一区二区三区四区五区| 精品国产免费久久| 日本女优在线视频一区二区| 在线观看欧美日本| 亚洲色图第一区| 福利91精品一区二区三区| 欧美一区二区三区啪啪| 一区二区三区蜜桃网| 96av麻豆蜜桃一区二区| 国产精品日韩成人| 国产成人免费高清| 在线看日本不卡| 日韩精品五月天| 色老汉一区二区三区| 国产精品网曝门| 国产资源精品在线观看| 91精品国产福利| 午夜国产精品影院在线观看| 在线看国产日韩| 亚洲欧美日韩国产综合| aaa亚洲精品一二三区| 中文字幕精品在线不卡| 国产精品资源网| 久久久久久久久久久久久久久99| 美日韩一区二区三区| 日韩精品一区二区在线| 紧缚捆绑精品一区二区| 精品福利在线导航| 国产成人欧美日韩在线电影| 久久久午夜精品| 国产.欧美.日韩| 国产精品福利电影一区二区三区四区| 国产91丝袜在线观看| 国产目拍亚洲精品99久久精品| 国产激情一区二区三区桃花岛亚洲| 久久久久久久久久电影| 国产99精品视频| 亚洲卡通欧美制服中文| 欧美唯美清纯偷拍| 麻豆成人久久精品二区三区小说| 欧美成人免费网站| 成人中文字幕在线| 一个色妞综合视频在线观看| 欧美一区二区精美| 风间由美一区二区av101| 樱花影视一区二区| 欧美大片一区二区| 成人av午夜影院| 亚洲专区一二三| 久久影院视频免费| 一本色道久久综合亚洲aⅴ蜜桃| 亚洲图片欧美一区| 久久久亚洲欧洲日产国码αv| 99国产精品国产精品毛片| 亚洲va天堂va国产va久| 久久美女高清视频| 欧美视频一区二区三区| 激情久久五月天| 一区二区三区四区高清精品免费观看| 欧美一区二区三区系列电影| 国产jizzjizz一区二区| 日韩精品乱码免费| 亚洲天堂成人网| 337p日本欧洲亚洲大胆精品| 色综合网色综合| 激情综合网天天干| 亚洲综合久久av| 国产亚洲成av人在线观看导航| 91女厕偷拍女厕偷拍高清| 男人的j进女人的j一区| 亚洲人成网站精品片在线观看| 日韩精品一区二区三区四区视频 | 国产精品亚洲视频| 一区二区三区在线免费视频| 久久精品夜色噜噜亚洲aⅴ| 欧美日韩三级一区二区| 岛国精品在线观看| 免费久久99精品国产| 亚洲伦理在线免费看| 久久麻豆一区二区| 日韩免费视频一区| 欧美高清激情brazzers| 色哟哟精品一区| 成年人国产精品| 国内成人自拍视频| 免费人成精品欧美精品| 天天综合色天天综合色h| 亚洲日本在线天堂| 国产精品家庭影院| 日本一区二区三区久久久久久久久不| 91精品国产色综合久久久蜜香臀| 91精品福利在线| 日本韩国一区二区三区| 色哟哟亚洲精品| 91香蕉视频污| 91老司机福利 在线| 99riav一区二区三区| 成人av片在线观看| www.爱久久.com| 成人av网站大全| 欧美一区日本一区韩国一区| 欧美影院一区二区| 欧美亚洲动漫另类| 欧美视频一区二区在线观看| 91高清视频免费看| 日本高清成人免费播放| 在线免费观看日本一区| 欧美在线你懂得| 欧美精品久久久久久久久老牛影院| 在线观看欧美日本| 91精品国产综合久久久久久久 | 国产在线播精品第三| 免费xxxx性欧美18vr| 日本亚洲电影天堂| 免费xxxx性欧美18vr| 麻豆成人综合网| 国产一区 二区 三区一级| 国产成人精品免费一区二区| 国产成人精品一区二| av在线不卡观看免费观看| 一本大道久久a久久综合婷婷| 色94色欧美sute亚洲线路一久| 在线观看免费视频综合| 欧美日韩在线播放三区四区| 欧美成人午夜电影| 国产精品三级视频| 一区二区欧美精品| 美女免费视频一区二区| 国产99一区视频免费| 91美女片黄在线观看91美女| 欧美视频在线不卡| 欧美大白屁股肥臀xxxxxx| 久久久久国色av免费看影院| 亚洲三级视频在线观看| 视频一区二区三区入口| 国产成人免费在线视频| 欧洲在线/亚洲| 久久久蜜桃精品| 亚洲欧美激情一区二区| 奇米色777欧美一区二区| 国产精品一二三四| 欧美三区在线观看| 国产三级精品三级在线专区| 亚洲国产一区二区三区青草影视| 另类小说色综合网站| 9i在线看片成人免费| 7878成人国产在线观看| 中文字幕免费观看一区| 丝袜亚洲另类丝袜在线| 国产精品一区三区| 欧美日韩黄视频| 欧美韩国日本一区| 蜜桃精品视频在线观看| 91丨porny丨中文| 精品久久国产字幕高潮| 夜夜操天天操亚洲| 成人午夜激情影院| 日韩欧美色综合网站| 亚洲人成网站影音先锋播放| 国产一区二区视频在线播放| 欧美影片第一页| 国产精品传媒入口麻豆| 久草在线在线精品观看| 欧美亚洲动漫制服丝袜| 亚洲欧美视频在线观看| 国产麻豆日韩欧美久久| 欧美一级精品大片| 一区二区视频在线| 成人看片黄a免费看在线| 欧美电影免费提供在线观看| 亚洲一区二区在线免费看| 国产成人激情av| 久久久久九九视频| 日本欧美一区二区| 欧美日本免费一区二区三区| 最新日韩在线视频| 丁香五精品蜜臀久久久久99网站 | 国产69精品久久久久777| 欧美一区在线视频| 石原莉奈在线亚洲三区| 欧美性生活一区| 亚洲一区二三区| 欧美午夜精品一区二区蜜桃| 一区二区三区久久久| 91免费观看视频| 最新中文字幕一区二区三区| 成人app在线观看| 国产精品久久久99| 成人久久18免费网站麻豆|