1 #ifndef _ASM_X86_BOOTPARAM_H
2 #define _ASM_X86_BOOTPARAM_H
6 #define SETUP_E820_EXT 1
10 #define SETUP_APPLE_PROPERTIES 5
13 #define RAMDISK_IMAGE_START_MASK 0x07FF
14 #define RAMDISK_PROMPT_FLAG 0x8000
15 #define RAMDISK_LOAD_FLAG 0x4000
18 #define LOADED_HIGH (1<<0)
19 #define KASLR_FLAG (1<<1)
20 #define QUIET_FLAG (1<<5)
21 #define KEEP_SEGMENTS (1<<6)
22 #define CAN_USE_HEAP (1<<7)
25 #define XLF_KERNEL_64 (1<<0)
26 #define XLF_CAN_BE_LOADED_ABOVE_4G (1<<1)
27 #define XLF_EFI_HANDOVER_32 (1<<2)
28 #define XLF_EFI_HANDOVER_64 (1<<3)
29 #define XLF_EFI_KEXEC (1<<4)
33 #include <linux/types.h>
34 #include <linux/screen_info.h>
35 #include <linux/apm_bios.h>
36 #include <linux/edd.h>
39 #include <video/edid.h>
41 /* extensible setup data list node */
65 __u16 setup_move_size
;
69 __u32 bootsect_kludge
;
74 __u32 initrd_addr_max
;
75 __u32 kernel_alignment
;
76 __u8 relocatable_kernel
;
80 __u32 hardware_subarch
;
81 __u64 hardware_subarch_data
;
87 __u32 handover_offset
;
88 } __attribute__((packed
));
90 struct sys_desc_table
{
95 /* Gleaned from OFW's set-parameters in cpu/x86/pc/linux.fth */
96 struct olpc_ofw_header
{
97 __u32 ofw_magic
; /* OFW signature */
99 __u32 cif_handler
; /* callback into OFW */
100 __u32 irq_desc_table
;
101 } __attribute__((packed
));
104 __u32 efi_loader_signature
;
106 __u32 efi_memdesc_size
;
107 __u32 efi_memdesc_version
;
109 __u32 efi_memmap_size
;
114 /* The so-called "zeropage" */
116 struct screen_info screen_info
; /* 0x000 */
117 struct apm_bios_info apm_bios_info
; /* 0x040 */
118 __u8 _pad2
[4]; /* 0x054 */
119 __u64 tboot_addr
; /* 0x058 */
120 struct ist_info ist_info
; /* 0x060 */
121 __u8 _pad3
[16]; /* 0x070 */
122 __u8 hd0_info
[16]; /* obsolete! */ /* 0x080 */
123 __u8 hd1_info
[16]; /* obsolete! */ /* 0x090 */
124 struct sys_desc_table sys_desc_table
; /* obsolete! */ /* 0x0a0 */
125 struct olpc_ofw_header olpc_ofw_header
; /* 0x0b0 */
126 __u32 ext_ramdisk_image
; /* 0x0c0 */
127 __u32 ext_ramdisk_size
; /* 0x0c4 */
128 __u32 ext_cmd_line_ptr
; /* 0x0c8 */
129 __u8 _pad4
[116]; /* 0x0cc */
130 struct edid_info edid_info
; /* 0x140 */
131 struct efi_info efi_info
; /* 0x1c0 */
132 __u32 alt_mem_k
; /* 0x1e0 */
133 __u32 scratch
; /* Scratch field! */ /* 0x1e4 */
134 __u8 e820_entries
; /* 0x1e8 */
135 __u8 eddbuf_entries
; /* 0x1e9 */
136 __u8 edd_mbr_sig_buf_entries
; /* 0x1ea */
137 __u8 kbd_status
; /* 0x1eb */
138 __u8 secure_boot
; /* 0x1ec */
139 __u8 _pad5
[2]; /* 0x1ed */
141 * The sentinel is set to a nonzero value (0xff) in header.S.
143 * A bootloader is supposed to only take setup_header and put
144 * it into a clean boot_params buffer. If it turns out that
145 * it is clumsy or too generous with the buffer, it most
146 * probably will pick up the sentinel variable too. The fact
147 * that this variable then is still 0xff will let kernel
148 * know that some variables in boot_params are invalid and
149 * kernel should zero out certain portions of boot_params.
151 __u8 sentinel
; /* 0x1ef */
152 __u8 _pad6
[1]; /* 0x1f0 */
153 struct setup_header hdr
; /* setup header */ /* 0x1f1 */
154 __u8 _pad7
[0x290-0x1f1-sizeof(struct setup_header
)];
155 __u32 edd_mbr_sig_buffer
[EDD_MBR_SIG_MAX
]; /* 0x290 */
156 struct e820entry e820_map
[E820MAX
]; /* 0x2d0 */
157 __u8 _pad8
[48]; /* 0xcd0 */
158 struct edd_info eddbuf
[EDDMAXNR
]; /* 0xd00 */
159 __u8 _pad9
[276]; /* 0xeec */
160 } __attribute__((packed
));
163 * enum x86_hardware_subarch - x86 hardware subarchitecture
165 * The x86 hardware_subarch and hardware_subarch_data were added as of the x86
166 * boot protocol 2.07 to help distinguish and support custom x86 boot
167 * sequences. This enum represents accepted values for the x86
168 * hardware_subarch. Custom x86 boot sequences (not X86_SUBARCH_PC) do not
169 * have or simply *cannot* make use of natural stubs like BIOS or EFI, the
170 * hardware_subarch can be used on the Linux entry path to revector to a
171 * subarchitecture stub when needed. This subarchitecture stub can be used to
172 * set up Linux boot parameters or for special care to account for nonstandard
173 * handling of page tables.
175 * These enums should only ever be used by x86 code, and the code that uses
176 * it should be well contained and compartamentalized.
178 * KVM and Xen HVM do not have a subarch as these are expected to follow
179 * standard x86 boot entries. If there is a genuine need for "hypervisor" type
180 * that should be considered separately in the future. Future guest types
181 * should seriously consider working with standard x86 boot stubs such as
182 * the BIOS or EFI boot stubs.
184 * WARNING: this enum is only used for legacy hacks, for platform features that
185 * are not easily enumerated or discoverable. You should not ever use
186 * this for new features.
188 * @X86_SUBARCH_PC: Should be used if the hardware is enumerable using standard
189 * PC mechanisms (PCI, ACPI) and doesn't need a special boot flow.
190 * @X86_SUBARCH_LGUEST: Used for x86 hypervisor demo, lguest
191 * @X86_SUBARCH_XEN: Used for Xen guest types which follow the PV boot path,
192 * which start at asm startup_xen() entry point and later jump to the C
193 * xen_start_kernel() entry point. Both domU and dom0 type of guests are
194 * currently supportd through this PV boot path.
195 * @X86_SUBARCH_INTEL_MID: Used for Intel MID (Mobile Internet Device) platform
196 * systems which do not have the PCI legacy interfaces.
197 * @X86_SUBARCH_CE4100: Used for Intel CE media processor (CE4100) SoC for
198 * for settop boxes and media devices, the use of a subarch for CE4100
199 * is more of a hack...
201 enum x86_hardware_subarch
{
205 X86_SUBARCH_INTEL_MID
,
210 #endif /* __ASSEMBLY__ */
212 #endif /* _ASM_X86_BOOTPARAM_H */