bootparam.h 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
  2. #ifndef _ASM_X86_BOOTPARAM_H
  3. #define _ASM_X86_BOOTPARAM_H
  4. /* setup_data types */
  5. #define SETUP_NONE 0
  6. #define SETUP_E820_EXT 1
  7. #define SETUP_DTB 2
  8. #define SETUP_PCI 3
  9. #define SETUP_EFI 4
  10. #define SETUP_APPLE_PROPERTIES 5
  11. #define SETUP_JAILHOUSE 6
  12. /* ram_size flags */
  13. #define RAMDISK_IMAGE_START_MASK 0x07FF
  14. #define RAMDISK_PROMPT_FLAG 0x8000
  15. #define RAMDISK_LOAD_FLAG 0x4000
  16. /* version flags */
  17. #define VERSION_WRITTEN 0x8000
  18. /* loadflags */
  19. #define LOADED_HIGH (1<<0)
  20. #define KASLR_FLAG (1<<1)
  21. #define QUIET_FLAG (1<<5)
  22. #define KEEP_SEGMENTS (1<<6)
  23. #define CAN_USE_HEAP (1<<7)
  24. /* xloadflags */
  25. #define XLF_KERNEL_64 (1<<0)
  26. #define XLF_CAN_BE_LOADED_ABOVE_4G (1<<1)
  27. #define XLF_EFI_HANDOVER_32 (1<<2)
  28. #define XLF_EFI_HANDOVER_64 (1<<3)
  29. #define XLF_EFI_KEXEC (1<<4)
  30. #ifndef __ASSEMBLY__
  31. #include <linux/types.h>
  32. #include <linux/screen_info.h>
  33. #include <linux/apm_bios.h>
  34. #include <linux/edd.h>
  35. #include <asm/ist.h>
  36. #include <video/edid.h>
  37. /* extensible setup data list node */
  38. struct setup_data {
  39. __u64 next;
  40. __u32 type;
  41. __u32 len;
  42. __u8 data[0];
  43. };
  44. struct setup_header {
  45. __u8 setup_sects;
  46. __u16 root_flags;
  47. __u32 syssize;
  48. __u16 ram_size;
  49. __u16 vid_mode;
  50. __u16 root_dev;
  51. __u16 boot_flag;
  52. __u16 jump;
  53. __u32 header;
  54. __u16 version;
  55. __u32 realmode_swtch;
  56. __u16 start_sys_seg;
  57. __u16 kernel_version;
  58. __u8 type_of_loader;
  59. __u8 loadflags;
  60. __u16 setup_move_size;
  61. __u32 code32_start;
  62. __u32 ramdisk_image;
  63. __u32 ramdisk_size;
  64. __u32 bootsect_kludge;
  65. __u16 heap_end_ptr;
  66. __u8 ext_loader_ver;
  67. __u8 ext_loader_type;
  68. __u32 cmd_line_ptr;
  69. __u32 initrd_addr_max;
  70. __u32 kernel_alignment;
  71. __u8 relocatable_kernel;
  72. __u8 min_alignment;
  73. __u16 xloadflags;
  74. __u32 cmdline_size;
  75. __u32 hardware_subarch;
  76. __u64 hardware_subarch_data;
  77. __u32 payload_offset;
  78. __u32 payload_length;
  79. __u64 setup_data;
  80. __u64 pref_address;
  81. __u32 init_size;
  82. __u32 handover_offset;
  83. __u64 acpi_rsdp_addr;
  84. } __attribute__((packed));
  85. struct sys_desc_table {
  86. __u16 length;
  87. __u8 table[14];
  88. };
  89. /* Gleaned from OFW's set-parameters in cpu/x86/pc/linux.fth */
  90. struct olpc_ofw_header {
  91. __u32 ofw_magic; /* OFW signature */
  92. __u32 ofw_version;
  93. __u32 cif_handler; /* callback into OFW */
  94. __u32 irq_desc_table;
  95. } __attribute__((packed));
  96. struct efi_info {
  97. __u32 efi_loader_signature;
  98. __u32 efi_systab;
  99. __u32 efi_memdesc_size;
  100. __u32 efi_memdesc_version;
  101. __u32 efi_memmap;
  102. __u32 efi_memmap_size;
  103. __u32 efi_systab_hi;
  104. __u32 efi_memmap_hi;
  105. };
  106. /*
  107. * This is the maximum number of entries in struct boot_params::e820_table
  108. * (the zeropage), which is part of the x86 boot protocol ABI:
  109. */
  110. #define E820_MAX_ENTRIES_ZEROPAGE 128
  111. /*
  112. * The E820 memory region entry of the boot protocol ABI:
  113. */
  114. struct boot_e820_entry {
  115. __u64 addr;
  116. __u64 size;
  117. __u32 type;
  118. } __attribute__((packed));
  119. /*
  120. * Smallest compatible version of jailhouse_setup_data required by this kernel.
  121. */
  122. #define JAILHOUSE_SETUP_REQUIRED_VERSION 1
  123. /*
  124. * The boot loader is passing platform information via this Jailhouse-specific
  125. * setup data structure.
  126. */
  127. struct jailhouse_setup_data {
  128. __u16 version;
  129. __u16 compatible_version;
  130. __u16 pm_timer_address;
  131. __u16 num_cpus;
  132. __u64 pci_mmconfig_base;
  133. __u32 tsc_khz;
  134. __u32 apic_khz;
  135. __u8 standard_ioapic;
  136. __u8 cpu_ids[255];
  137. } __attribute__((packed));
  138. /* The so-called "zeropage" */
  139. struct boot_params {
  140. struct screen_info screen_info; /* 0x000 */
  141. struct apm_bios_info apm_bios_info; /* 0x040 */
  142. __u8 _pad2[4]; /* 0x054 */
  143. __u64 tboot_addr; /* 0x058 */
  144. struct ist_info ist_info; /* 0x060 */
  145. __u8 _pad3[16]; /* 0x070 */
  146. __u8 hd0_info[16]; /* obsolete! */ /* 0x080 */
  147. __u8 hd1_info[16]; /* obsolete! */ /* 0x090 */
  148. struct sys_desc_table sys_desc_table; /* obsolete! */ /* 0x0a0 */
  149. struct olpc_ofw_header olpc_ofw_header; /* 0x0b0 */
  150. __u32 ext_ramdisk_image; /* 0x0c0 */
  151. __u32 ext_ramdisk_size; /* 0x0c4 */
  152. __u32 ext_cmd_line_ptr; /* 0x0c8 */
  153. __u8 _pad4[116]; /* 0x0cc */
  154. struct edid_info edid_info; /* 0x140 */
  155. struct efi_info efi_info; /* 0x1c0 */
  156. __u32 alt_mem_k; /* 0x1e0 */
  157. __u32 scratch; /* Scratch field! */ /* 0x1e4 */
  158. __u8 e820_entries; /* 0x1e8 */
  159. __u8 eddbuf_entries; /* 0x1e9 */
  160. __u8 edd_mbr_sig_buf_entries; /* 0x1ea */
  161. __u8 kbd_status; /* 0x1eb */
  162. __u8 secure_boot; /* 0x1ec */
  163. __u8 _pad5[2]; /* 0x1ed */
  164. /*
  165. * The sentinel is set to a nonzero value (0xff) in header.S.
  166. *
  167. * A bootloader is supposed to only take setup_header and put
  168. * it into a clean boot_params buffer. If it turns out that
  169. * it is clumsy or too generous with the buffer, it most
  170. * probably will pick up the sentinel variable too. The fact
  171. * that this variable then is still 0xff will let kernel
  172. * know that some variables in boot_params are invalid and
  173. * kernel should zero out certain portions of boot_params.
  174. */
  175. __u8 sentinel; /* 0x1ef */
  176. __u8 _pad6[1]; /* 0x1f0 */
  177. struct setup_header hdr; /* setup header */ /* 0x1f1 */
  178. __u8 _pad7[0x290-0x1f1-sizeof(struct setup_header)];
  179. __u32 edd_mbr_sig_buffer[EDD_MBR_SIG_MAX]; /* 0x290 */
  180. struct boot_e820_entry e820_table[E820_MAX_ENTRIES_ZEROPAGE]; /* 0x2d0 */
  181. __u8 _pad8[48]; /* 0xcd0 */
  182. struct edd_info eddbuf[EDDMAXNR]; /* 0xd00 */
  183. __u8 _pad9[276]; /* 0xeec */
  184. } __attribute__((packed));
  185. /**
  186. * enum x86_hardware_subarch - x86 hardware subarchitecture
  187. *
  188. * The x86 hardware_subarch and hardware_subarch_data were added as of the x86
  189. * boot protocol 2.07 to help distinguish and support custom x86 boot
  190. * sequences. This enum represents accepted values for the x86
  191. * hardware_subarch. Custom x86 boot sequences (not X86_SUBARCH_PC) do not
  192. * have or simply *cannot* make use of natural stubs like BIOS or EFI, the
  193. * hardware_subarch can be used on the Linux entry path to revector to a
  194. * subarchitecture stub when needed. This subarchitecture stub can be used to
  195. * set up Linux boot parameters or for special care to account for nonstandard
  196. * handling of page tables.
  197. *
  198. * These enums should only ever be used by x86 code, and the code that uses
  199. * it should be well contained and compartamentalized.
  200. *
  201. * KVM and Xen HVM do not have a subarch as these are expected to follow
  202. * standard x86 boot entries. If there is a genuine need for "hypervisor" type
  203. * that should be considered separately in the future. Future guest types
  204. * should seriously consider working with standard x86 boot stubs such as
  205. * the BIOS or EFI boot stubs.
  206. *
  207. * WARNING: this enum is only used for legacy hacks, for platform features that
  208. * are not easily enumerated or discoverable. You should not ever use
  209. * this for new features.
  210. *
  211. * @X86_SUBARCH_PC: Should be used if the hardware is enumerable using standard
  212. * PC mechanisms (PCI, ACPI) and doesn't need a special boot flow.
  213. * @X86_SUBARCH_LGUEST: Used for x86 hypervisor demo, lguest, deprecated
  214. * @X86_SUBARCH_XEN: Used for Xen guest types which follow the PV boot path,
  215. * which start at asm startup_xen() entry point and later jump to the C
  216. * xen_start_kernel() entry point. Both domU and dom0 type of guests are
  217. * currently supportd through this PV boot path.
  218. * @X86_SUBARCH_INTEL_MID: Used for Intel MID (Mobile Internet Device) platform
  219. * systems which do not have the PCI legacy interfaces.
  220. * @X86_SUBARCH_CE4100: Used for Intel CE media processor (CE4100) SoC for
  221. * for settop boxes and media devices, the use of a subarch for CE4100
  222. * is more of a hack...
  223. */
  224. enum x86_hardware_subarch {
  225. X86_SUBARCH_PC = 0,
  226. X86_SUBARCH_LGUEST,
  227. X86_SUBARCH_XEN,
  228. X86_SUBARCH_INTEL_MID,
  229. X86_SUBARCH_CE4100,
  230. X86_NR_SUBARCHS,
  231. };
  232. #endif /* __ASSEMBLY__ */
  233. #endif /* _ASM_X86_BOOTPARAM_H */