zero-page.txt 1.7 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. The additional fields in struct boot_params as a part of 32-bit boot
  2. protocol of kernel. These should be filled by bootloader or 16-bit
  3. real-mode setup code of the kernel. References/settings to it mainly
  4. are in:
  5. arch/x86/include/uapi/asm/bootparam.h
  6. Offset Proto Name Meaning
  7. /Size
  8. 000/040 ALL screen_info Text mode or frame buffer information
  9. (struct screen_info)
  10. 040/014 ALL apm_bios_info APM BIOS information (struct apm_bios_info)
  11. 058/008 ALL tboot_addr Physical address of tboot shared page
  12. 060/010 ALL ist_info Intel SpeedStep (IST) BIOS support information
  13. (struct ist_info)
  14. 080/010 ALL hd0_info hd0 disk parameter, OBSOLETE!!
  15. 090/010 ALL hd1_info hd1 disk parameter, OBSOLETE!!
  16. 0A0/010 ALL sys_desc_table System description table (struct sys_desc_table),
  17. OBSOLETE!!
  18. 0B0/010 ALL olpc_ofw_header OLPC's OpenFirmware CIF and friends
  19. 0C0/004 ALL ext_ramdisk_image ramdisk_image high 32bits
  20. 0C4/004 ALL ext_ramdisk_size ramdisk_size high 32bits
  21. 0C8/004 ALL ext_cmd_line_ptr cmd_line_ptr high 32bits
  22. 140/080 ALL edid_info Video mode setup (struct edid_info)
  23. 1C0/020 ALL efi_info EFI 32 information (struct efi_info)
  24. 1E0/004 ALL alk_mem_k Alternative mem check, in KB
  25. 1E4/004 ALL scratch Scratch field for the kernel setup code
  26. 1E8/001 ALL e820_entries Number of entries in e820_map (below)
  27. 1E9/001 ALL eddbuf_entries Number of entries in eddbuf (below)
  28. 1EA/001 ALL edd_mbr_sig_buf_entries Number of entries in edd_mbr_sig_buffer
  29. (below)
  30. 1EF/001 ALL sentinel Used to detect broken bootloaders
  31. 290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
  32. 2D0/A00 ALL e820_map E820 memory map table
  33. (array of struct e820entry)
  34. D00/1EC ALL eddbuf EDD data (array of struct edd_info)