1e9084b23SNiklaus Giger /* 2e9084b23SNiklaus Giger * (C) Copyright 2008 3e9084b23SNiklaus Giger * Niklaus Giger, niklaus.giger@member.fsf.org 4e9084b23SNiklaus Giger * 51a459660SWolfgang Denk * SPDX-License-Identifier: GPL-2.0+ 6e9084b23SNiklaus Giger */ 7e9084b23SNiklaus Giger 8e9084b23SNiklaus Giger #ifndef _VXWORKS_H_ 9e9084b23SNiklaus Giger #define _VXWORKS_H_ 10e9084b23SNiklaus Giger 11*b90ff0fdSBin Meng /* 12*b90ff0fdSBin Meng * VxWorks x86 E820 related stuff 13*b90ff0fdSBin Meng * 14*b90ff0fdSBin Meng * VxWorks on x86 gets E820 information from pre-defined address @ 15*b90ff0fdSBin Meng * 0x4a00 and 0x4000. At 0x4a00 it's an information table defined 16*b90ff0fdSBin Meng * by VxWorks and the actual E820 table entries starts from 0x4000. 17*b90ff0fdSBin Meng * As defined by the BIOS E820 spec, the maximum number of E820 table 18*b90ff0fdSBin Meng * entries is 128 and each entry occupies 20 bytes, so it's 128 * 20 19*b90ff0fdSBin Meng * = 2560 (0xa00) bytes in total. That's where VxWorks stores some 20*b90ff0fdSBin Meng * information that is retrieved from the BIOS E820 call and saved 21*b90ff0fdSBin Meng * later for sanity test during the kernel boot-up. 22*b90ff0fdSBin Meng */ 23*b90ff0fdSBin Meng #define VXWORKS_E820_DATA_ADDR 0x4000 24*b90ff0fdSBin Meng #define VXWORKS_E820_INFO_ADDR 0x4a00 25*b90ff0fdSBin Meng 26*b90ff0fdSBin Meng /* E820 info signatiure "SMAP" - System MAP */ 27*b90ff0fdSBin Meng #define E820_SIGNATURE 0x534d4150 28*b90ff0fdSBin Meng 29*b90ff0fdSBin Meng struct e820info { 30*b90ff0fdSBin Meng u32 sign; /* "SMAP" signature */ 31*b90ff0fdSBin Meng u32 x0; /* don't care, used by VxWorks */ 32*b90ff0fdSBin Meng u32 x1; /* don't care, used by VxWorks */ 33*b90ff0fdSBin Meng u32 x2; /* don't care, used by VxWorks */ 34*b90ff0fdSBin Meng u32 addr; /* last e820 table entry addr */ 35*b90ff0fdSBin Meng u32 x3; /* don't care, used by VxWorks */ 36*b90ff0fdSBin Meng u32 entries; /* e820 table entry count */ 37*b90ff0fdSBin Meng u32 error; /* must be zero */ 38*b90ff0fdSBin Meng }; 39*b90ff0fdSBin Meng 4054841ab5SWolfgang Denk int do_bootvx(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[]); 41871a57bbSMiao Yan void boot_prep_vxworks(bootm_headers_t *images); 42871a57bbSMiao Yan void boot_jump_vxworks(bootm_headers_t *images); 43871a57bbSMiao Yan void do_bootvx_fdt(bootm_headers_t *images); 44e9084b23SNiklaus Giger 45e9084b23SNiklaus Giger #endif 46