arm64: dts: Revert "specify console via command line"
[linux/fpc-iii.git] / arch / x86 / boot / memory.c
blobb0422b79debc3d4e1d4a6e22027e782e5a80fbd0
1 // SPDX-License-Identifier: GPL-2.0-only
2 /* -*- linux-c -*- ------------------------------------------------------- *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 * Copyright 2007 rPath, Inc. - All Rights Reserved
6 * Copyright 2009 Intel Corporation; author H. Peter Anvin
8 * ----------------------------------------------------------------------- */
11 * Memory detection code
14 #include "boot.h"
16 #define SMAP 0x534d4150 /* ASCII "SMAP" */
18 static void detect_memory_e820(void)
20 int count = 0;
21 struct biosregs ireg, oreg;
22 struct boot_e820_entry *desc = boot_params.e820_table;
23 static struct boot_e820_entry buf; /* static so it is zeroed */
25 initregs(&ireg);
26 ireg.ax = 0xe820;
27 ireg.cx = sizeof(buf);
28 ireg.edx = SMAP;
29 ireg.di = (size_t)&buf;
32 * Note: at least one BIOS is known which assumes that the
33 * buffer pointed to by one e820 call is the same one as
34 * the previous call, and only changes modified fields. Therefore,
35 * we use a temporary buffer and copy the results entry by entry.
37 * This routine deliberately does not try to account for
38 * ACPI 3+ extended attributes. This is because there are
39 * BIOSes in the field which report zero for the valid bit for
40 * all ranges, and we don't currently make any use of the
41 * other attribute bits. Revisit this if we see the extended
42 * attribute bits deployed in a meaningful way in the future.
45 do {
46 intcall(0x15, &ireg, &oreg);
47 ireg.ebx = oreg.ebx; /* for next iteration... */
49 /* BIOSes which terminate the chain with CF = 1 as opposed
50 to %ebx = 0 don't always report the SMAP signature on
51 the final, failing, probe. */
52 if (oreg.eflags & X86_EFLAGS_CF)
53 break;
55 /* Some BIOSes stop returning SMAP in the middle of
56 the search loop. We don't know exactly how the BIOS
57 screwed up the map at that point, we might have a
58 partial map, the full map, or complete garbage, so
59 just return failure. */
60 if (oreg.eax != SMAP) {
61 count = 0;
62 break;
65 *desc++ = buf;
66 count++;
67 } while (ireg.ebx && count < ARRAY_SIZE(boot_params.e820_table));
69 boot_params.e820_entries = count;
72 static void detect_memory_e801(void)
74 struct biosregs ireg, oreg;
76 initregs(&ireg);
77 ireg.ax = 0xe801;
78 intcall(0x15, &ireg, &oreg);
80 if (oreg.eflags & X86_EFLAGS_CF)
81 return;
83 /* Do we really need to do this? */
84 if (oreg.cx || oreg.dx) {
85 oreg.ax = oreg.cx;
86 oreg.bx = oreg.dx;
89 if (oreg.ax > 15*1024) {
90 return; /* Bogus! */
91 } else if (oreg.ax == 15*1024) {
92 boot_params.alt_mem_k = (oreg.bx << 6) + oreg.ax;
93 } else {
95 * This ignores memory above 16MB if we have a memory
96 * hole there. If someone actually finds a machine
97 * with a memory hole at 16MB and no support for
98 * 0E820h they should probably generate a fake e820
99 * map.
101 boot_params.alt_mem_k = oreg.ax;
105 static void detect_memory_88(void)
107 struct biosregs ireg, oreg;
109 initregs(&ireg);
110 ireg.ah = 0x88;
111 intcall(0x15, &ireg, &oreg);
113 boot_params.screen_info.ext_mem_k = oreg.ax;
116 void detect_memory(void)
118 detect_memory_e820();
120 detect_memory_e801();
122 detect_memory_88();