aboutsummaryrefslogtreecommitdiffstats
path: root/arch/powerpc/boot/wrapper
diff options
context:
space:
mode:
authorGeoff Levand <geoffrey.levand@am.sony.com>2008-03-27 16:41:45 -0400
committerPaul Mackerras <paulus@samba.org>2008-04-01 05:43:07 -0400
commit5761eaa3a5ae3c7ea796add73b86176b7c963cca (patch)
tree8b2b5f292059738216202b4b5480cdc02bd925d0 /arch/powerpc/boot/wrapper
parent23afcb4e0061c591776a3350db89512d085397c2 (diff)
[POWERPC] PS3: Bootwrapper improvements
Improve the debugging support of the PS3 bootwraper code: o Increase the size of the PS3 bootwrapper overlay from 256 to 512 bytes to allow for more debugging code in the overlay. o Use the dot symbol to set the size of __system_reset_overlay. The assembler will then emit an error if the overlay code is too big. o Remove some unused instructions. o Update the text describing the PS3 bootwrapper overlay. o Add a check for null pointer writes. o Change hcall return value from s64. Signed-off-by: Geoff Levand <geoffrey.levand@am.sony.com> Signed-off-by: Paul Mackerras <paulus@samba.org>
Diffstat (limited to 'arch/powerpc/boot/wrapper')
-rwxr-xr-xarch/powerpc/boot/wrapper21
1 files changed, 11 insertions, 10 deletions
diff --git a/arch/powerpc/boot/wrapper b/arch/powerpc/boot/wrapper
index 03b474bfe747..087e120e4904 100755
--- a/arch/powerpc/boot/wrapper
+++ b/arch/powerpc/boot/wrapper
@@ -298,15 +298,16 @@ treeboot*)
298 exit 0 298 exit 0
299 ;; 299 ;;
300ps3) 300ps3)
301 # The ps3's loader supports loading gzipped binary images from flash 301 # The ps3's loader supports loading a gzipped binary image from flash
302 # rom to addr zero. The loader enters the image at addr 0x100. A 302 # rom to ram addr zero. The loader then enters the system reset
303 # bootwrapper overlay is use to arrange for the kernel to be loaded 303 # vector at addr 0x100. A bootwrapper overlay is used to arrange for
304 # to addr zero and to have a suitable bootwrapper entry at 0x100. 304 # a binary image of the kernel to be at addr zero, and yet have a
305 # To construct the rom image, 0x100 bytes from offset 0x100 in the 305 # suitable bootwrapper entry at 0x100. To construct the final rom
306 # kernel is copied to the bootwrapper symbol __system_reset_kernel. 306 # image 512 bytes from offset 0x100 is copied to the bootwrapper
307 # The 0x100 bytes at the bootwrapper symbol __system_reset_overlay is 307 # place holder at symbol __system_reset_kernel. The 512 bytes of the
308 # then copied to offset 0x100. At runtime the bootwrapper program 308 # bootwrapper entry code at symbol __system_reset_overlay is then
309 # copies the 0x100 bytes at __system_reset_kernel to addr 0x100. 309 # copied to offset 0x100. At runtime the bootwrapper program copies
310 # the data at __system_reset_kernel back to addr 0x100.
310 311
311 system_reset_overlay=0x`${CROSS}nm "$ofile" \ 312 system_reset_overlay=0x`${CROSS}nm "$ofile" \
312 | grep ' __system_reset_overlay$' \ 313 | grep ' __system_reset_overlay$' \
@@ -317,7 +318,7 @@ ps3)
317 | cut -d' ' -f1` 318 | cut -d' ' -f1`
318 system_reset_kernel=`printf "%d" $system_reset_kernel` 319 system_reset_kernel=`printf "%d" $system_reset_kernel`
319 overlay_dest="256" 320 overlay_dest="256"
320 overlay_size="256" 321 overlay_size="512"
321 322
322 ${CROSS}objcopy -O binary "$ofile" "$ofile.bin" 323 ${CROSS}objcopy -O binary "$ofile" "$ofile.bin"
323 324