1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
2 #ifndef _ASM_X86_BOOTPARAM_H
3 #define _ASM_X86_BOOTPARAM_H
5 /* setup_data/setup_indirect types */
7 #define SETUP_E820_EXT 1
11 #define SETUP_APPLE_PROPERTIES 5
12 #define SETUP_JAILHOUSE 6
13 #define SETUP_CC_BLOB 7
15 #define SETUP_RNG_SEED 9
16 #define SETUP_ENUM_MAX SETUP_RNG_SEED
18 #define SETUP_INDIRECT (1<<31)
19 #define SETUP_TYPE_MAX (SETUP_ENUM_MAX | SETUP_INDIRECT)
22 #define RAMDISK_IMAGE_START_MASK 0x07FF
23 #define RAMDISK_PROMPT_FLAG 0x8000
24 #define RAMDISK_LOAD_FLAG 0x4000
27 #define LOADED_HIGH (1<<0)
28 #define KASLR_FLAG (1<<1)
29 #define QUIET_FLAG (1<<5)
30 #define KEEP_SEGMENTS (1<<6)
31 #define CAN_USE_HEAP (1<<7)
34 #define XLF_KERNEL_64 (1<<0)
35 #define XLF_CAN_BE_LOADED_ABOVE_4G (1<<1)
36 #define XLF_EFI_HANDOVER_32 (1<<2)
37 #define XLF_EFI_HANDOVER_64 (1<<3)
38 #define XLF_EFI_KEXEC (1<<4)
39 #define XLF_5LEVEL (1<<5)
40 #define XLF_5LEVEL_ENABLED (1<<6)
44 #include <linux/types.h>
45 #include <linux/screen_info.h>
46 #include <linux/apm_bios.h>
47 #include <linux/edd.h>
49 #include <video/edid.h>
51 /* extensible setup data list node */
59 /* extensible setup indirect data node */
60 struct setup_indirect {
62 __u32 reserved; /* Reserved, must be set to zero. */
83 __u16 setup_move_size;
87 __u32 bootsect_kludge;
92 __u32 initrd_addr_max;
93 __u32 kernel_alignment;
94 __u8 relocatable_kernel;
98 __u32 hardware_subarch;
99 __u64 hardware_subarch_data;
100 __u32 payload_offset;
101 __u32 payload_length;
105 __u32 handover_offset;
106 __u32 kernel_info_offset;
107 } __attribute__((packed));
109 struct sys_desc_table {
114 /* Gleaned from OFW's set-parameters in cpu/x86/pc/linux.fth */
115 struct olpc_ofw_header {
116 __u32 ofw_magic; /* OFW signature */
118 __u32 cif_handler; /* callback into OFW */
119 __u32 irq_desc_table;
120 } __attribute__((packed));
123 __u32 efi_loader_signature;
125 __u32 efi_memdesc_size;
126 __u32 efi_memdesc_version;
128 __u32 efi_memmap_size;
134 * This is the maximum number of entries in struct boot_params::e820_table
135 * (the zeropage), which is part of the x86 boot protocol ABI:
137 #define E820_MAX_ENTRIES_ZEROPAGE 128
140 * The E820 memory region entry of the boot protocol ABI:
142 struct boot_e820_entry {
146 } __attribute__((packed));
149 * Smallest compatible version of jailhouse_setup_data required by this kernel.
151 #define JAILHOUSE_SETUP_REQUIRED_VERSION 1
154 * The boot loader is passing platform information via this Jailhouse-specific
155 * setup data structure.
157 struct jailhouse_setup_data {
160 __u16 compatible_version;
161 } __attribute__((packed)) hdr;
163 __u16 pm_timer_address;
165 __u64 pci_mmconfig_base;
168 __u8 standard_ioapic;
170 } __attribute__((packed)) v1;
173 } __attribute__((packed)) v2;
174 } __attribute__((packed));
177 * IMA buffer setup data information from the previous kernel during kexec
179 struct ima_setup_data {
182 } __attribute__((packed));
184 /* The so-called "zeropage" */
186 struct screen_info screen_info; /* 0x000 */
187 struct apm_bios_info apm_bios_info; /* 0x040 */
188 __u8 _pad2[4]; /* 0x054 */
189 __u64 tboot_addr; /* 0x058 */
190 struct ist_info ist_info; /* 0x060 */
191 __u64 acpi_rsdp_addr; /* 0x070 */
192 __u8 _pad3[8]; /* 0x078 */
193 __u8 hd0_info[16]; /* obsolete! */ /* 0x080 */
194 __u8 hd1_info[16]; /* obsolete! */ /* 0x090 */
195 struct sys_desc_table sys_desc_table; /* obsolete! */ /* 0x0a0 */
196 struct olpc_ofw_header olpc_ofw_header; /* 0x0b0 */
197 __u32 ext_ramdisk_image; /* 0x0c0 */
198 __u32 ext_ramdisk_size; /* 0x0c4 */
199 __u32 ext_cmd_line_ptr; /* 0x0c8 */
200 __u8 _pad4[112]; /* 0x0cc */
201 __u32 cc_blob_address; /* 0x13c */
202 struct edid_info edid_info; /* 0x140 */
203 struct efi_info efi_info; /* 0x1c0 */
204 __u32 alt_mem_k; /* 0x1e0 */
205 __u32 scratch; /* Scratch field! */ /* 0x1e4 */
206 __u8 e820_entries; /* 0x1e8 */
207 __u8 eddbuf_entries; /* 0x1e9 */
208 __u8 edd_mbr_sig_buf_entries; /* 0x1ea */
209 __u8 kbd_status; /* 0x1eb */
210 __u8 secure_boot; /* 0x1ec */
211 __u8 _pad5[2]; /* 0x1ed */
213 * The sentinel is set to a nonzero value (0xff) in header.S.
215 * A bootloader is supposed to only take setup_header and put
216 * it into a clean boot_params buffer. If it turns out that
217 * it is clumsy or too generous with the buffer, it most
218 * probably will pick up the sentinel variable too. The fact
219 * that this variable then is still 0xff will let kernel
220 * know that some variables in boot_params are invalid and
221 * kernel should zero out certain portions of boot_params.
223 __u8 sentinel; /* 0x1ef */
224 __u8 _pad6[1]; /* 0x1f0 */
225 struct setup_header hdr; /* setup header */ /* 0x1f1 */
226 __u8 _pad7[0x290-0x1f1-sizeof(struct setup_header)];
227 __u32 edd_mbr_sig_buffer[EDD_MBR_SIG_MAX]; /* 0x290 */
228 struct boot_e820_entry e820_table[E820_MAX_ENTRIES_ZEROPAGE]; /* 0x2d0 */
229 __u8 _pad8[48]; /* 0xcd0 */
230 struct edd_info eddbuf[EDDMAXNR]; /* 0xd00 */
231 __u8 _pad9[276]; /* 0xeec */
232 } __attribute__((packed));
235 * enum x86_hardware_subarch - x86 hardware subarchitecture
237 * The x86 hardware_subarch and hardware_subarch_data were added as of the x86
238 * boot protocol 2.07 to help distinguish and support custom x86 boot
239 * sequences. This enum represents accepted values for the x86
240 * hardware_subarch. Custom x86 boot sequences (not X86_SUBARCH_PC) do not
241 * have or simply *cannot* make use of natural stubs like BIOS or EFI, the
242 * hardware_subarch can be used on the Linux entry path to revector to a
243 * subarchitecture stub when needed. This subarchitecture stub can be used to
244 * set up Linux boot parameters or for special care to account for nonstandard
245 * handling of page tables.
247 * These enums should only ever be used by x86 code, and the code that uses
248 * it should be well contained and compartmentalized.
250 * KVM and Xen HVM do not have a subarch as these are expected to follow
251 * standard x86 boot entries. If there is a genuine need for "hypervisor" type
252 * that should be considered separately in the future. Future guest types
253 * should seriously consider working with standard x86 boot stubs such as
254 * the BIOS or EFI boot stubs.
256 * WARNING: this enum is only used for legacy hacks, for platform features that
257 * are not easily enumerated or discoverable. You should not ever use
258 * this for new features.
260 * @X86_SUBARCH_PC: Should be used if the hardware is enumerable using standard
261 * PC mechanisms (PCI, ACPI) and doesn't need a special boot flow.
262 * @X86_SUBARCH_LGUEST: Used for x86 hypervisor demo, lguest, deprecated
263 * @X86_SUBARCH_XEN: Used for Xen guest types which follow the PV boot path,
264 * which start at asm startup_xen() entry point and later jump to the C
265 * xen_start_kernel() entry point. Both domU and dom0 type of guests are
266 * currently supported through this PV boot path.
267 * @X86_SUBARCH_INTEL_MID: Used for Intel MID (Mobile Internet Device) platform
268 * systems which do not have the PCI legacy interfaces.
269 * @X86_SUBARCH_CE4100: Used for Intel CE media processor (CE4100) SoC
270 * for settop boxes and media devices, the use of a subarch for CE4100
271 * is more of a hack...
273 enum x86_hardware_subarch {
277 X86_SUBARCH_INTEL_MID,
282 #endif /* __ASSEMBLY__ */
284 #endif /* _ASM_X86_BOOTPARAM_H */