亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? bootpz.c

?? 底層驅動開發
?? C
字號:
/* * arch/alpha/boot/bootpz.c * * Copyright (C) 1997 Jay Estabrook * * This file is used for creating a compressed BOOTP file for the * Linux/AXP kernel * * based significantly on the arch/alpha/boot/main.c of Linus Torvalds * and the decompression code from MILO. */#include <linux/kernel.h>#include <linux/string.h>#include <linux/version.h>#include <linux/mm.h>#include <asm/system.h>#include <asm/console.h>#include <asm/hwrpb.h>#include <asm/pgtable.h>#include <asm/io.h>#include <stdarg.h>#include "kzsize.h"/* FIXME FIXME FIXME */#define MALLOC_AREA_SIZE 0x200000 /* 2MB for now *//* FIXME FIXME FIXME *//*  WARNING NOTE  It is very possible that turning on additional messages may cause  kernel image corruption due to stack usage to do the printing.*/#undef DEBUG_CHECK_RANGE#undef DEBUG_ADDRESSES#undef DEBUG_LAST_STEPSextern unsigned long switch_to_osf_pal(unsigned long nr,	struct pcb_struct * pcb_va, struct pcb_struct * pcb_pa,	unsigned long *vptb);extern int decompress_kernel(void* destination, void *source,			     size_t ksize, size_t kzsize);extern void move_stack(unsigned long new_stack);struct hwrpb_struct *hwrpb = INIT_HWRPB;static struct pcb_struct pcb_va[1];/* * Find a physical address of a virtual object.. * * This is easy using the virtual page table address. */#define VPTB	((unsigned long *) 0x200000000)static inline unsigned longfind_pa(unsigned long address){	unsigned long result;	result = VPTB[address >> 13];	result >>= 32;	result <<= 13;	result |= address & 0x1fff;	return result;}	intcheck_range(unsigned long vstart, unsigned long vend,	    unsigned long kstart, unsigned long kend){	unsigned long vaddr, kaddr;#ifdef DEBUG_CHECK_RANGE	srm_printk("check_range: V[0x%lx:0x%lx] K[0x%lx:0x%lx]\n",		   vstart, vend, kstart, kend);#endif	/* do some range checking for detecting an overlap... */	for (vaddr = vstart; vaddr <= vend; vaddr += PAGE_SIZE)	{		kaddr = (find_pa(vaddr) | PAGE_OFFSET);		if (kaddr >= kstart && kaddr <= kend)		{#ifdef DEBUG_CHECK_RANGE			srm_printk("OVERLAP: vaddr 0x%lx kaddr 0x%lx"				   " [0x%lx:0x%lx]\n",				   vaddr, kaddr, kstart, kend);#endif			return 1;		}	}	return 0;}/* * This function moves into OSF/1 pal-code, and has a temporary * PCB for that. The kernel proper should replace this PCB with * the real one as soon as possible. * * The page table muckery in here depends on the fact that the boot * code has the L1 page table identity-map itself in the second PTE * in the L1 page table. Thus the L1-page is virtually addressable * itself (through three levels) at virtual address 0x200802000. */#define L1	((unsigned long *) 0x200802000)voidpal_init(void){	unsigned long i, rev;	struct percpu_struct * percpu;	struct pcb_struct * pcb_pa;	/* Create the dummy PCB.  */	pcb_va->ksp = 0;	pcb_va->usp = 0;	pcb_va->ptbr = L1[1] >> 32;	pcb_va->asn = 0;	pcb_va->pcc = 0;	pcb_va->unique = 0;	pcb_va->flags = 1;	pcb_va->res1 = 0;	pcb_va->res2 = 0;	pcb_pa = (struct pcb_struct *)find_pa((unsigned long)pcb_va);	/*	 * a0 = 2 (OSF)	 * a1 = return address, but we give the asm the vaddr of the PCB	 * a2 = physical addr of PCB	 * a3 = new virtual page table pointer	 * a4 = KSP (but the asm sets it)	 */	srm_printk("Switching to OSF PAL-code... ");	i = switch_to_osf_pal(2, pcb_va, pcb_pa, VPTB);	if (i) {		srm_printk("failed, code %ld\n", i);		__halt();	}	percpu = (struct percpu_struct *)		(INIT_HWRPB->processor_offset + (unsigned long) INIT_HWRPB);	rev = percpu->pal_revision = percpu->palcode_avail[2];	srm_printk("OK (rev %lx)\n", rev);	tbia(); /* do it directly in case we are SMP */}/* * Start the kernel. */static inline voidrunkernel(void){	__asm__ __volatile__(		"bis %0,%0,$27\n\t"		"jmp ($27)"		: /* no outputs: it doesn't even return */		: "r" (START_ADDR));}/* Must record the SP (it is virtual) on entry, so we can make sure   not to overwrite it during movement or decompression. */unsigned long SP_on_entry;/* Calculate the kernel image address based on the end of the BOOTP   bootstrapper (ie this program).*/extern char _end;#define KERNEL_ORIGIN \	((((unsigned long)&_end) + 511) & ~511)/* Round address to next higher page boundary. */#define NEXT_PAGE(a)	(((a) | (PAGE_SIZE - 1)) + 1)#ifdef INITRD_IMAGE_SIZE# define REAL_INITRD_SIZE INITRD_IMAGE_SIZE#else# define REAL_INITRD_SIZE 0#endif/* Defines from include/asm-alpha/system.h	BOOT_ADDR	Virtual address at which the consoles loads			the BOOTP image.	KERNEL_START    KSEG address at which the kernel is built to run,			which includes some initial data pages before the			code.	START_ADDR	KSEG address of the entry point of kernel code.	ZERO_PGE	KSEG address of page full of zeroes, but 			upon entry to kerne cvan be expected			to hold the parameter list and possible			INTRD information.   These are used in the local defines below.*/  /* Virtual addresses for the BOOTP image. Note that this includes the   bootstrapper code as well as the compressed kernel image, and   possibly the INITRD image.   Oh, and do NOT forget the STACK, which appears to be placed virtually   beyond the end of the loaded image.*/#define V_BOOT_IMAGE_START	BOOT_ADDR#define V_BOOT_IMAGE_END	SP_on_entry/* Virtual addresses for just the bootstrapper part of the BOOTP image. */#define V_BOOTSTRAPPER_START	BOOT_ADDR#define V_BOOTSTRAPPER_END	KERNEL_ORIGIN/* Virtual addresses for just the data part of the BOOTP   image. This may also include the INITRD image, but always   includes the STACK.*/#define V_DATA_START		KERNEL_ORIGIN#define V_INITRD_START		(KERNEL_ORIGIN + KERNEL_Z_SIZE)#define V_INTRD_END		(V_INITRD_START + REAL_INITRD_SIZE)#define V_DATA_END	 	V_BOOT_IMAGE_END/* KSEG addresses for the uncompressed kernel.   Note that the end address includes workspace for the decompression.   Note also that the DATA_START address is ZERO_PGE, to which we write   just before jumping to the kernel image at START_ADDR. */#define K_KERNEL_DATA_START	ZERO_PGE#define K_KERNEL_IMAGE_START	START_ADDR#define K_KERNEL_IMAGE_END	(START_ADDR + KERNEL_SIZE)/* Define to where we may have to decompress the kernel image, before   we move it to the final position, in case of overlap. This will be   above the final position of the kernel.   Regardless of overlap, we move the INITRD image to the end of this   copy area, because there needs to be a buffer area after the kernel   for "bootmem" anyway.*/#define K_COPY_IMAGE_START	NEXT_PAGE(K_KERNEL_IMAGE_END)/* Reserve one page below INITRD for the new stack. */#define K_INITRD_START \    NEXT_PAGE(K_COPY_IMAGE_START + KERNEL_SIZE + PAGE_SIZE)#define K_COPY_IMAGE_END \    (K_INITRD_START + REAL_INITRD_SIZE + MALLOC_AREA_SIZE)#define K_COPY_IMAGE_SIZE \    NEXT_PAGE(K_COPY_IMAGE_END - K_COPY_IMAGE_START)voidstart_kernel(void){	int must_move = 0;	/* Initialize these for the decompression-in-place situation,	   which is the smallest amount of work and most likely to	   occur when using the normal START_ADDR of the kernel	   (currently set to 16MB, to clear all console code.	*/	unsigned long uncompressed_image_start = K_KERNEL_IMAGE_START;	unsigned long uncompressed_image_end = K_KERNEL_IMAGE_END;	unsigned long initrd_image_start = K_INITRD_START;	/*	 * Note that this crufty stuff with static and envval	 * and envbuf is because:	 *	 * 1. Frequently, the stack is short, and we don't want to overrun;	 * 2. Frequently the stack is where we are going to copy the kernel to;	 * 3. A certain SRM console required the GET_ENV output to stack.	 *    ??? A comment in the aboot sources indicates that the GET_ENV	 *    destination must be quadword aligned.  Might this explain the	 *    behaviour, rather than requiring output to the stack, which	 *    seems rather far-fetched.	 */	static long nbytes;	static char envval[256] __attribute__((aligned(8)));	register unsigned long asm_sp asm("30");	SP_on_entry = asm_sp;	srm_printk("Linux/Alpha BOOTPZ Loader for Linux " UTS_RELEASE "\n");	/* Validity check the HWRPB. */	if (INIT_HWRPB->pagesize != 8192) {		srm_printk("Expected 8kB pages, got %ldkB\n",		           INIT_HWRPB->pagesize >> 10);		return;	}	if (INIT_HWRPB->vptb != (unsigned long) VPTB) {		srm_printk("Expected vptb at %p, got %p\n",			   VPTB, (void *)INIT_HWRPB->vptb);		return;	}	/* PALcode (re)initialization. */	pal_init();	/* Get the parameter list from the console environment variable. */	nbytes = callback_getenv(ENV_BOOTED_OSFLAGS, envval, sizeof(envval));	if (nbytes < 0 || nbytes >= sizeof(envval)) {		nbytes = 0;	}	envval[nbytes] = '\0';#ifdef DEBUG_ADDRESSES	srm_printk("START_ADDR 0x%lx\n", START_ADDR);	srm_printk("KERNEL_ORIGIN 0x%lx\n", KERNEL_ORIGIN);	srm_printk("KERNEL_SIZE 0x%x\n", KERNEL_SIZE);	srm_printk("KERNEL_Z_SIZE 0x%x\n", KERNEL_Z_SIZE);#endif	/* Since all the SRM consoles load the BOOTP image at virtual	 * 0x20000000, we have to ensure that the physical memory	 * pages occupied by that image do NOT overlap the physical	 * address range where the kernel wants to be run.  This	 * causes real problems when attempting to cdecompress the	 * former into the latter... :-(	 *	 * So, we may have to decompress/move the kernel/INITRD image	 * virtual-to-physical someplace else first before moving	 * kernel /INITRD to their final resting places... ;-}	 *	 * Sigh...	 */	/* First, check to see if the range of addresses occupied by	   the bootstrapper part of the BOOTP image include any of the	   physical pages into which the kernel will be placed for	   execution.	   We only need check on the final kernel image range, since we	   will put the INITRD someplace that we can be sure is not	   in conflict.	 */	if (check_range(V_BOOTSTRAPPER_START, V_BOOTSTRAPPER_END,			K_KERNEL_DATA_START, K_KERNEL_IMAGE_END))	{		srm_printk("FATAL ERROR: overlap of bootstrapper code\n");		__halt();	}	/* Next, check to see if the range of addresses occupied by	   the compressed kernel/INITRD/stack portion of the BOOTP	   image include any of the physical pages into which the	   decompressed kernel or the INITRD will be placed for	   execution.	 */	if (check_range(V_DATA_START, V_DATA_END,			K_KERNEL_IMAGE_START, K_COPY_IMAGE_END))	{#ifdef DEBUG_ADDRESSES		srm_printk("OVERLAP: cannot decompress in place\n");#endif		uncompressed_image_start = K_COPY_IMAGE_START;		uncompressed_image_end = K_COPY_IMAGE_END;		must_move = 1;		/* Finally, check to see if the range of addresses		   occupied by the compressed kernel/INITRD part of		   the BOOTP image include any of the physical pages		   into which that part is to be copied for		   decompression.		*/		while (check_range(V_DATA_START, V_DATA_END,				   uncompressed_image_start,				   uncompressed_image_end))		{#if 0			uncompressed_image_start += K_COPY_IMAGE_SIZE;			uncompressed_image_end += K_COPY_IMAGE_SIZE;			initrd_image_start += K_COPY_IMAGE_SIZE;#else			/* Keep as close as possible to end of BOOTP image. */			uncompressed_image_start += PAGE_SIZE;			uncompressed_image_end += PAGE_SIZE;			initrd_image_start += PAGE_SIZE;#endif		}	}	srm_printk("Starting to load the kernel with args '%s'\n", envval);#ifdef DEBUG_ADDRESSES	srm_printk("Decompressing the kernel...\n"		   "...from 0x%lx to 0x%lx size 0x%x\n",		   V_DATA_START,		   uncompressed_image_start,		   KERNEL_SIZE);#endif        decompress_kernel((void *)uncompressed_image_start,			  (void *)V_DATA_START,			  KERNEL_SIZE, KERNEL_Z_SIZE);	/*	 * Now, move things to their final positions, if/as required.	 */#ifdef INITRD_IMAGE_SIZE	/* First, we always move the INITRD image, if present. */#ifdef DEBUG_ADDRESSES	srm_printk("Moving the INITRD image...\n"		   " from 0x%lx to 0x%lx size 0x%x\n",		   V_INITRD_START,		   initrd_image_start,		   INITRD_IMAGE_SIZE);#endif	memcpy((void *)initrd_image_start, (void *)V_INITRD_START,	       INITRD_IMAGE_SIZE);#endif /* INITRD_IMAGE_SIZE */	/* Next, we may have to move the uncompressed kernel to the	   final destination.	 */	if (must_move) {#ifdef DEBUG_ADDRESSES		srm_printk("Moving the uncompressed kernel...\n"			   "...from 0x%lx to 0x%lx size 0x%x\n",			   uncompressed_image_start,			   K_KERNEL_IMAGE_START,			   (unsigned)KERNEL_SIZE);#endif		/*		 * Move the stack to a safe place to ensure it won't be		 * overwritten by kernel image.		 */		move_stack(initrd_image_start - PAGE_SIZE);		memcpy((void *)K_KERNEL_IMAGE_START,		       (void *)uncompressed_image_start, KERNEL_SIZE);	}		/* Clear the zero page, then move the argument list in. */#ifdef DEBUG_LAST_STEPS	srm_printk("Preparing ZERO_PGE...\n");#endif	memset((char*)ZERO_PGE, 0, PAGE_SIZE);	strcpy((char*)ZERO_PGE, envval);#ifdef INITRD_IMAGE_SIZE#ifdef DEBUG_LAST_STEPS	srm_printk("Preparing INITRD info...\n");#endif	/* Finally, set the INITRD paramenters for the kernel. */	((long *)(ZERO_PGE+256))[0] = initrd_image_start;	((long *)(ZERO_PGE+256))[1] = INITRD_IMAGE_SIZE;#endif /* INITRD_IMAGE_SIZE */#ifdef DEBUG_LAST_STEPS	srm_printk("Doing 'runkernel()'...\n");#endif	runkernel();}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久综合99re88久久爱| 日本一二三不卡| 欧美国产精品专区| av不卡在线播放| 国产91丝袜在线18| 国产成人精品免费| 韩国成人在线视频| 国产精品99久久久久久宅男| 久久99热99| 国产精品资源在线观看| 国产福利不卡视频| 99精品久久免费看蜜臀剧情介绍| 99久久精品国产一区| 91成人在线精品| 欧美精品日韩一本| 7777精品伊人久久久大香线蕉最新版| 7777精品伊人久久久大香线蕉经典版下载 | 欧美一区二区在线不卡| 欧美人xxxx| 久久综合九色综合欧美98 | 日韩美女啊v在线免费观看| 亚洲私人黄色宅男| 日韩黄色片在线观看| 国内精品伊人久久久久av影院| 大胆欧美人体老妇| 日本道在线观看一区二区| 欧美自拍丝袜亚洲| 欧美精品一区二区三区高清aⅴ | 欧美tickling网站挠脚心| 久久久久亚洲蜜桃| 亚洲日本中文字幕区| 午夜精彩视频在线观看不卡| 国产综合色在线| 91麻豆成人久久精品二区三区| 欧美久久久久久蜜桃| 久久久综合精品| 亚洲精品乱码久久久久久黑人| 丝袜亚洲另类丝袜在线| 麻豆成人91精品二区三区| 欧美精品一区男女天堂| 亚洲精品国产高清久久伦理二区| 日本va欧美va瓶| 91亚洲国产成人精品一区二三| 欧美精品在线观看播放| 国产精品久久午夜夜伦鲁鲁| 日韩精彩视频在线观看| 国产不卡免费视频| 欧美在线免费视屏| 国产精品久久久久久久久免费桃花 | 国产精品网站一区| 亚洲国产成人高清精品| 国内不卡的二区三区中文字幕 | 欧美久久久影院| 中文字幕乱码久久午夜不卡 | 成人av在线电影| 欧美成人video| 亚洲国产精品久久人人爱| 久久99深爱久久99精品| 欧美日韩三级在线| 亚洲欧美视频一区| 国产高清一区日本| 日韩精品在线一区| 日本欧美一区二区三区乱码| 91福利国产成人精品照片| 国产日韩欧美精品一区| 麻豆视频观看网址久久| 8x8x8国产精品| 偷拍自拍另类欧美| 精品视频色一区| 亚洲一区二区欧美| 亚洲国产精品久久一线不卡| 日本精品裸体写真集在线观看| 午夜久久久久久久久| 97se亚洲国产综合自在线不卡| 欧美xxxxx牲另类人与| 日韩精品每日更新| 欧美一区二区三区免费观看视频| 一区二区三区在线播| 91免费版在线| 亚洲精品高清在线观看| 色综合色狠狠综合色| 亚洲视频中文字幕| 色琪琪一区二区三区亚洲区| 亚洲激情第一区| 欧美日韩国产在线播放网站| 丝袜美腿亚洲色图| 精品少妇一区二区三区日产乱码 | 国产色产综合产在线视频| 国产在线观看免费一区| 国产亚洲精品精华液| 国产成人在线视频网站| 成人欧美一区二区三区黑人麻豆| 91婷婷韩国欧美一区二区| 亚洲人吸女人奶水| 伊人色综合久久天天人手人婷| 99re视频这里只有精品| 69堂成人精品免费视频| 久久99热狠狠色一区二区| 久久免费精品国产久精品久久久久| 国产精品中文欧美| 亚洲欧美日韩一区| 欧美日韩国产欧美日美国产精品| 美女免费视频一区| 欧美韩日一区二区三区四区| 在线精品视频免费观看| 美女视频黄a大片欧美| 精品成人一区二区三区| 99re66热这里只有精品3直播 | 国产老妇另类xxxxx| 国产精品短视频| 欧美精品在线观看一区二区| 成人黄色综合网站| 午夜精品成人在线| 欧美国产乱子伦| 日韩丝袜美女视频| 99re热这里只有精品免费视频| 蜜桃在线一区二区三区| 国产精品国产自产拍在线| 日韩一区二区免费视频| a4yy欧美一区二区三区| 青娱乐精品视频在线| 成人欧美一区二区三区黑人麻豆 | 亚洲福利电影网| 国产片一区二区三区| 欧美男生操女生| 成人ar影院免费观看视频| 久久成人综合网| 一区二区久久久| 中文字幕av一区 二区| 91精品国模一区二区三区| 色综合天天综合网天天狠天天| 久久电影网站中文字幕| 亚洲国产精品欧美一二99| 国产精品毛片高清在线完整版| 欧美v日韩v国产v| 欧美高清视频一二三区| 色综合视频一区二区三区高清| 国产精品一区二区你懂的| 五月激情丁香一区二区三区| 亚洲制服丝袜在线| 亚洲天堂网中文字| 国产精品久久久久久久午夜片| 欧美一区二区三区婷婷月色| 欧美无砖砖区免费| 欧洲精品一区二区| 色哟哟一区二区三区| 99麻豆久久久国产精品免费 | 婷婷国产v国产偷v亚洲高清| 亚洲最大成人综合| 亚洲激情在线播放| 亚洲天堂久久久久久久| 综合在线观看色| 亚洲免费在线观看视频| 一级女性全黄久久生活片免费| 亚洲欧洲国产日本综合| 最新欧美精品一区二区三区| 亚洲欧洲成人自拍| 亚洲欧美一区二区视频| 亚洲欧美日韩精品久久久久| 中文一区在线播放| 亚洲男人的天堂一区二区| 一二三四社区欧美黄| 亚洲mv在线观看| 日韩精品91亚洲二区在线观看| 久久精品国产亚洲a| 韩国欧美国产1区| 国产69精品久久久久777| 99精品视频免费在线观看| eeuss鲁片一区二区三区| 色哟哟国产精品| 欧美精品一级二级三级| 日韩欧美国产一区二区在线播放| 91精品国产综合久久婷婷香蕉| 精品国产乱码久久| 中文字幕一区视频| 首页国产丝袜综合| 国产乱码一区二区三区| 日本道色综合久久| 欧美一区二区三区播放老司机| www国产成人| 亚洲乱码日产精品bd| 日韩成人精品在线观看| 国产成a人无v码亚洲福利| 大胆亚洲人体视频| 欧美日韩国产综合一区二区| 欧美日韩国产高清一区二区三区| 欧美videossexotv100| 中文字幕一区av| 一区二区中文视频| 午夜在线成人av| 懂色av噜噜一区二区三区av | 日韩电影在线看| 国产精品一级片| 欧美三级电影一区| 亚洲国产高清在线| 久久综合综合久久综合| 99国产麻豆精品| 久久综合色8888| 亚洲国产成人91porn| 国产**成人网毛片九色|