2019-06-04 15:11:30 +07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2007-07-12 02:18:50 +07:00
|
|
|
/* -*- linux-c -*- ------------------------------------------------------- *
|
|
|
|
*
|
|
|
|
* Copyright (C) 1991, 1992 Linus Torvalds
|
|
|
|
* Copyright 2007 rPath, Inc. - All Rights Reserved
|
2009-03-29 03:53:26 +07:00
|
|
|
* Copyright 2009 Intel Corporation; author H. Peter Anvin
|
2007-07-12 02:18:50 +07:00
|
|
|
*
|
|
|
|
* ----------------------------------------------------------------------- */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Memory detection code
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "boot.h"
|
|
|
|
|
|
|
|
#define SMAP 0x534d4150 /* ASCII "SMAP" */
|
|
|
|
|
2018-11-02 21:56:22 +07:00
|
|
|
static void detect_memory_e820(void)
|
2007-07-12 02:18:50 +07:00
|
|
|
{
|
2007-09-27 04:11:43 +07:00
|
|
|
int count = 0;
|
2009-04-02 08:13:46 +07:00
|
|
|
struct biosregs ireg, oreg;
|
2017-01-29 18:56:13 +07:00
|
|
|
struct boot_e820_entry *desc = boot_params.e820_table;
|
|
|
|
static struct boot_e820_entry buf; /* static so it is zeroed */
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2009-04-02 08:13:46 +07:00
|
|
|
initregs(&ireg);
|
|
|
|
ireg.ax = 0xe820;
|
2018-10-28 19:58:28 +07:00
|
|
|
ireg.cx = sizeof(buf);
|
2009-04-02 08:13:46 +07:00
|
|
|
ireg.edx = SMAP;
|
|
|
|
ireg.di = (size_t)&buf;
|
|
|
|
|
2009-04-02 01:35:00 +07:00
|
|
|
/*
|
2009-05-22 01:46:16 +07:00
|
|
|
* Note: at least one BIOS is known which assumes that the
|
|
|
|
* buffer pointed to by one e820 call is the same one as
|
|
|
|
* the previous call, and only changes modified fields. Therefore,
|
|
|
|
* we use a temporary buffer and copy the results entry by entry.
|
|
|
|
*
|
|
|
|
* This routine deliberately does not try to account for
|
|
|
|
* ACPI 3+ extended attributes. This is because there are
|
|
|
|
* BIOSes in the field which report zero for the valid bit for
|
|
|
|
* all ranges, and we don't currently make any use of the
|
|
|
|
* other attribute bits. Revisit this if we see the extended
|
|
|
|
* attribute bits deployed in a meaningful way in the future.
|
2009-04-02 01:35:00 +07:00
|
|
|
*/
|
|
|
|
|
2007-07-12 02:18:50 +07:00
|
|
|
do {
|
2009-04-02 08:13:46 +07:00
|
|
|
intcall(0x15, &ireg, &oreg);
|
|
|
|
ireg.ebx = oreg.ebx; /* for next iteration... */
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2008-02-14 02:16:46 +07:00
|
|
|
/* BIOSes which terminate the chain with CF = 1 as opposed
|
|
|
|
to %ebx = 0 don't always report the SMAP signature on
|
|
|
|
the final, failing, probe. */
|
2009-04-02 08:13:46 +07:00
|
|
|
if (oreg.eflags & X86_EFLAGS_CF)
|
2008-02-14 02:16:46 +07:00
|
|
|
break;
|
|
|
|
|
2007-09-27 04:11:43 +07:00
|
|
|
/* Some BIOSes stop returning SMAP in the middle of
|
|
|
|
the search loop. We don't know exactly how the BIOS
|
|
|
|
screwed up the map at that point, we might have a
|
|
|
|
partial map, the full map, or complete garbage, so
|
|
|
|
just return failure. */
|
2009-04-02 08:13:46 +07:00
|
|
|
if (oreg.eax != SMAP) {
|
2007-09-27 04:11:43 +07:00
|
|
|
count = 0;
|
2007-07-12 02:18:50 +07:00
|
|
|
break;
|
2007-09-27 04:11:43 +07:00
|
|
|
}
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2009-05-22 01:46:16 +07:00
|
|
|
*desc++ = buf;
|
2007-09-27 04:11:43 +07:00
|
|
|
count++;
|
2017-01-27 19:54:38 +07:00
|
|
|
} while (ireg.ebx && count < ARRAY_SIZE(boot_params.e820_table));
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2018-11-02 21:56:22 +07:00
|
|
|
boot_params.e820_entries = count;
|
2007-07-12 02:18:50 +07:00
|
|
|
}
|
|
|
|
|
2018-11-02 21:56:22 +07:00
|
|
|
static void detect_memory_e801(void)
|
2007-07-12 02:18:50 +07:00
|
|
|
{
|
2009-04-02 08:13:46 +07:00
|
|
|
struct biosregs ireg, oreg;
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2009-04-02 08:13:46 +07:00
|
|
|
initregs(&ireg);
|
|
|
|
ireg.ax = 0xe801;
|
|
|
|
intcall(0x15, &ireg, &oreg);
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2009-04-02 08:13:46 +07:00
|
|
|
if (oreg.eflags & X86_EFLAGS_CF)
|
2018-11-02 21:56:22 +07:00
|
|
|
return;
|
2007-07-12 02:18:50 +07:00
|
|
|
|
|
|
|
/* Do we really need to do this? */
|
2009-04-02 08:13:46 +07:00
|
|
|
if (oreg.cx || oreg.dx) {
|
|
|
|
oreg.ax = oreg.cx;
|
|
|
|
oreg.bx = oreg.dx;
|
2007-07-12 02:18:50 +07:00
|
|
|
}
|
|
|
|
|
2009-04-02 08:13:46 +07:00
|
|
|
if (oreg.ax > 15*1024) {
|
2018-11-02 21:56:22 +07:00
|
|
|
return; /* Bogus! */
|
2009-04-02 08:13:46 +07:00
|
|
|
} else if (oreg.ax == 15*1024) {
|
2011-04-26 04:52:37 +07:00
|
|
|
boot_params.alt_mem_k = (oreg.bx << 6) + oreg.ax;
|
2009-04-02 08:13:46 +07:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* This ignores memory above 16MB if we have a memory
|
|
|
|
* hole there. If someone actually finds a machine
|
|
|
|
* with a memory hole at 16MB and no support for
|
|
|
|
* 0E820h they should probably generate a fake e820
|
|
|
|
* map.
|
|
|
|
*/
|
|
|
|
boot_params.alt_mem_k = oreg.ax;
|
|
|
|
}
|
2007-07-12 02:18:50 +07:00
|
|
|
}
|
|
|
|
|
2018-11-02 21:56:22 +07:00
|
|
|
static void detect_memory_88(void)
|
2007-07-12 02:18:50 +07:00
|
|
|
{
|
2009-04-02 08:13:46 +07:00
|
|
|
struct biosregs ireg, oreg;
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2009-04-02 08:13:46 +07:00
|
|
|
initregs(&ireg);
|
|
|
|
ireg.ah = 0x88;
|
|
|
|
intcall(0x15, &ireg, &oreg);
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2009-04-02 08:13:46 +07:00
|
|
|
boot_params.screen_info.ext_mem_k = oreg.ax;
|
2007-07-12 02:18:50 +07:00
|
|
|
}
|
|
|
|
|
2018-11-02 21:56:22 +07:00
|
|
|
void detect_memory(void)
|
2007-07-12 02:18:50 +07:00
|
|
|
{
|
2018-11-02 21:56:22 +07:00
|
|
|
detect_memory_e820();
|
2007-09-27 04:11:43 +07:00
|
|
|
|
2018-11-02 21:56:22 +07:00
|
|
|
detect_memory_e801();
|
2007-07-12 02:18:50 +07:00
|
|
|
|
2018-11-02 21:56:22 +07:00
|
|
|
detect_memory_88();
|
2007-07-12 02:18:50 +07:00
|
|
|
}
|