xref: /OK3568_Linux_fs/kernel/arch/x86/include/asm/setup.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0 */
2*4882a593Smuzhiyun #ifndef _ASM_X86_SETUP_H
3*4882a593Smuzhiyun #define _ASM_X86_SETUP_H
4*4882a593Smuzhiyun 
5*4882a593Smuzhiyun #include <uapi/asm/setup.h>
6*4882a593Smuzhiyun 
7*4882a593Smuzhiyun #define COMMAND_LINE_SIZE 2048
8*4882a593Smuzhiyun 
9*4882a593Smuzhiyun #include <linux/linkage.h>
10*4882a593Smuzhiyun #include <asm/page_types.h>
11*4882a593Smuzhiyun 
12*4882a593Smuzhiyun #ifdef __i386__
13*4882a593Smuzhiyun 
14*4882a593Smuzhiyun #include <linux/pfn.h>
15*4882a593Smuzhiyun /*
16*4882a593Smuzhiyun  * Reserved space for vmalloc and iomap - defined in asm/page.h
17*4882a593Smuzhiyun  */
18*4882a593Smuzhiyun #define MAXMEM_PFN	PFN_DOWN(MAXMEM)
19*4882a593Smuzhiyun #define MAX_NONPAE_PFN	(1 << 20)
20*4882a593Smuzhiyun 
21*4882a593Smuzhiyun #endif /* __i386__ */
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun #define PARAM_SIZE 4096		/* sizeof(struct boot_params) */
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun #define OLD_CL_MAGIC		0xA33F
26*4882a593Smuzhiyun #define OLD_CL_ADDRESS		0x020	/* Relative to real mode data */
27*4882a593Smuzhiyun #define NEW_CL_POINTER		0x228	/* Relative to real mode data */
28*4882a593Smuzhiyun 
29*4882a593Smuzhiyun #ifndef __ASSEMBLY__
30*4882a593Smuzhiyun #include <asm/bootparam.h>
31*4882a593Smuzhiyun #include <asm/x86_init.h>
32*4882a593Smuzhiyun 
33*4882a593Smuzhiyun extern u64 relocated_ramdisk;
34*4882a593Smuzhiyun 
35*4882a593Smuzhiyun /* Interrupt control for vSMPowered x86_64 systems */
36*4882a593Smuzhiyun #ifdef CONFIG_X86_64
37*4882a593Smuzhiyun void vsmp_init(void);
38*4882a593Smuzhiyun #else
vsmp_init(void)39*4882a593Smuzhiyun static inline void vsmp_init(void) { }
40*4882a593Smuzhiyun #endif
41*4882a593Smuzhiyun 
42*4882a593Smuzhiyun struct pt_regs;
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun void setup_bios_corruption_check(void);
45*4882a593Smuzhiyun void early_platform_quirks(void);
46*4882a593Smuzhiyun 
47*4882a593Smuzhiyun extern unsigned long saved_video_mode;
48*4882a593Smuzhiyun 
49*4882a593Smuzhiyun extern void reserve_standard_io_resources(void);
50*4882a593Smuzhiyun extern void i386_reserve_resources(void);
51*4882a593Smuzhiyun extern unsigned long __startup_64(unsigned long physaddr, struct boot_params *bp);
52*4882a593Smuzhiyun extern unsigned long __startup_secondary_64(void);
53*4882a593Smuzhiyun extern void startup_64_setup_env(unsigned long physbase);
54*4882a593Smuzhiyun extern void early_setup_idt(void);
55*4882a593Smuzhiyun extern void __init do_early_exception(struct pt_regs *regs, int trapnr);
56*4882a593Smuzhiyun 
57*4882a593Smuzhiyun #ifdef CONFIG_X86_INTEL_MID
58*4882a593Smuzhiyun extern void x86_intel_mid_early_setup(void);
59*4882a593Smuzhiyun #else
x86_intel_mid_early_setup(void)60*4882a593Smuzhiyun static inline void x86_intel_mid_early_setup(void) { }
61*4882a593Smuzhiyun #endif
62*4882a593Smuzhiyun 
63*4882a593Smuzhiyun #ifdef CONFIG_X86_INTEL_CE
64*4882a593Smuzhiyun extern void x86_ce4100_early_setup(void);
65*4882a593Smuzhiyun #else
x86_ce4100_early_setup(void)66*4882a593Smuzhiyun static inline void x86_ce4100_early_setup(void) { }
67*4882a593Smuzhiyun #endif
68*4882a593Smuzhiyun 
69*4882a593Smuzhiyun #ifndef _SETUP
70*4882a593Smuzhiyun 
71*4882a593Smuzhiyun #include <asm/espfix.h>
72*4882a593Smuzhiyun #include <linux/kernel.h>
73*4882a593Smuzhiyun 
74*4882a593Smuzhiyun /*
75*4882a593Smuzhiyun  * This is set up by the setup-routine at boot-time
76*4882a593Smuzhiyun  */
77*4882a593Smuzhiyun extern struct boot_params boot_params;
78*4882a593Smuzhiyun extern char _text[];
79*4882a593Smuzhiyun 
kaslr_enabled(void)80*4882a593Smuzhiyun static inline bool kaslr_enabled(void)
81*4882a593Smuzhiyun {
82*4882a593Smuzhiyun 	return IS_ENABLED(CONFIG_RANDOMIZE_MEMORY) &&
83*4882a593Smuzhiyun 		!!(boot_params.hdr.loadflags & KASLR_FLAG);
84*4882a593Smuzhiyun }
85*4882a593Smuzhiyun 
86*4882a593Smuzhiyun /*
87*4882a593Smuzhiyun  * Apply no randomization if KASLR was disabled at boot or if KASAN
88*4882a593Smuzhiyun  * is enabled. KASAN shadow mappings rely on regions being PGD aligned.
89*4882a593Smuzhiyun  */
kaslr_memory_enabled(void)90*4882a593Smuzhiyun static inline bool kaslr_memory_enabled(void)
91*4882a593Smuzhiyun {
92*4882a593Smuzhiyun 	return kaslr_enabled() && !IS_ENABLED(CONFIG_KASAN);
93*4882a593Smuzhiyun }
94*4882a593Smuzhiyun 
kaslr_offset(void)95*4882a593Smuzhiyun static inline unsigned long kaslr_offset(void)
96*4882a593Smuzhiyun {
97*4882a593Smuzhiyun 	return (unsigned long)&_text - __START_KERNEL;
98*4882a593Smuzhiyun }
99*4882a593Smuzhiyun 
100*4882a593Smuzhiyun /*
101*4882a593Smuzhiyun  * Do NOT EVER look at the BIOS memory size location.
102*4882a593Smuzhiyun  * It does not work on many machines.
103*4882a593Smuzhiyun  */
104*4882a593Smuzhiyun #define LOWMEMSIZE()	(0x9f000)
105*4882a593Smuzhiyun 
106*4882a593Smuzhiyun /* exceedingly early brk-like allocator */
107*4882a593Smuzhiyun extern unsigned long _brk_end;
108*4882a593Smuzhiyun void *extend_brk(size_t size, size_t align);
109*4882a593Smuzhiyun 
110*4882a593Smuzhiyun /*
111*4882a593Smuzhiyun  * Reserve space in the brk section.  The name must be unique within
112*4882a593Smuzhiyun  * the file, and somewhat descriptive.  The size is in bytes.  Must be
113*4882a593Smuzhiyun  * used at file scope.
114*4882a593Smuzhiyun  *
115*4882a593Smuzhiyun  * (This uses a temp function to wrap the asm so we can pass it the
116*4882a593Smuzhiyun  * size parameter; otherwise we wouldn't be able to.  We can't use a
117*4882a593Smuzhiyun  * "section" attribute on a normal variable because it always ends up
118*4882a593Smuzhiyun  * being @progbits, which ends up allocating space in the vmlinux
119*4882a593Smuzhiyun  * executable.)
120*4882a593Smuzhiyun  */
121*4882a593Smuzhiyun #define RESERVE_BRK(name,sz)						\
122*4882a593Smuzhiyun 	static void __section(".discard.text") __used notrace		\
123*4882a593Smuzhiyun 	__brk_reservation_fn_##name##__(void) {				\
124*4882a593Smuzhiyun 		asm volatile (						\
125*4882a593Smuzhiyun 			".pushsection .brk_reservation,\"aw\",@nobits;" \
126*4882a593Smuzhiyun 			".brk." #name ":"				\
127*4882a593Smuzhiyun 			" 1:.skip %c0;"					\
128*4882a593Smuzhiyun 			" .size .brk." #name ", . - 1b;"		\
129*4882a593Smuzhiyun 			" .popsection"					\
130*4882a593Smuzhiyun 			: : "i" (sz));					\
131*4882a593Smuzhiyun 	}
132*4882a593Smuzhiyun 
133*4882a593Smuzhiyun /* Helper for reserving space for arrays of things */
134*4882a593Smuzhiyun #define RESERVE_BRK_ARRAY(type, name, entries)		\
135*4882a593Smuzhiyun 	type *name;					\
136*4882a593Smuzhiyun 	RESERVE_BRK(name, sizeof(type) * entries)
137*4882a593Smuzhiyun 
138*4882a593Smuzhiyun extern void probe_roms(void);
139*4882a593Smuzhiyun #ifdef __i386__
140*4882a593Smuzhiyun 
141*4882a593Smuzhiyun asmlinkage void __init i386_start_kernel(void);
142*4882a593Smuzhiyun 
143*4882a593Smuzhiyun #else
144*4882a593Smuzhiyun asmlinkage void __init x86_64_start_kernel(char *real_mode);
145*4882a593Smuzhiyun asmlinkage void __init x86_64_start_reservations(char *real_mode_data);
146*4882a593Smuzhiyun 
147*4882a593Smuzhiyun #endif /* __i386__ */
148*4882a593Smuzhiyun #endif /* _SETUP */
149*4882a593Smuzhiyun #else
150*4882a593Smuzhiyun #define RESERVE_BRK(name,sz)				\
151*4882a593Smuzhiyun 	.pushsection .brk_reservation,"aw",@nobits;	\
152*4882a593Smuzhiyun .brk.name:						\
153*4882a593Smuzhiyun 1:	.skip sz;					\
154*4882a593Smuzhiyun 	.size .brk.name,.-1b;				\
155*4882a593Smuzhiyun 	.popsection
156*4882a593Smuzhiyun #endif /* __ASSEMBLY__ */
157*4882a593Smuzhiyun #endif /* _ASM_X86_SETUP_H */
158