Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5140346yba; Wed, 8 May 2019 08:29:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqzqnKgq8H6a+fc0ijjoU686UTuXDDxFSYD+8MG1GMFWJAp3pHnf4780YloV0Buif1/ZSg07 X-Received: by 2002:a17:902:b095:: with SMTP id p21mr48102697plr.40.1557329366602; Wed, 08 May 2019 08:29:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557329366; cv=none; d=google.com; s=arc-20160816; b=NHUKmmSUr0md8374FjT1o8lnlT2vlq4aGPx++Ps5hkpP4BSicloVWeoONekT4nik2t cnr8IQKS0LbQwTlG9rRgaiLWDGAuc00ioFW3qLI9ANXsZgFiYNYKSD9PvYqIK/xswJ5e bXoR1AWf1sS6x1kH4XExiDmK+DJY9uD/chMrv8K7reSbA0DME/id5Jgj2GeidFYQH5Ww jMyBHdYIMwTuE/IsqA0Wn91Dw9qiDo1NeVmtH2v0ox5dbaUY/4pdMd5IWdRyMeKd4hRr 8Z3hIpgbSmGW5wqwvfcgodI43nzjyywg03Ju9lwUlT/BzRwaxgT0n83LEEICOvZHVk1P W//w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=toejBubC2VyS9gb6UJ2Vq2aIqRrvIfX1XgP/QUj3iss=; b=ljEd+Zt+FPm0DdPzKj5yAZQ8WkcaPYzfemTBKlTTmfynkm1j3ctAIvDy77w+KVAHBK BPJCasrzSUJ/rrNcTM+CwgqNiJKw8o9Us7gdFF52s8Ptd2N0+2OwXesTcZbMTdRSkLWS kwJydnQWSD+bg3gzAWhrrP/3tgwJZ0yuSof6sW0hm6oR8G1Mha3lqNJOcXS4Cgcfq+r2 h2wZFCNUQTd2Gt5XHiOTei3y+/+FmR8N0L3ygYQ4tADtcPwHc21aiT7TR8oQZMLJR03v HgHSrkKCvC71QFRDCfjlXmEgxv7u4IWgGwfPSjFC0uGeyZDb2aNk5+pLBRrvwGSeNdlH Mpwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZsYg7Ke6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s78si23159026pfa.103.2019.05.08.08.29.09; Wed, 08 May 2019 08:29:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZsYg7Ke6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728037AbfEHPWw (ORCPT + 99 others); Wed, 8 May 2019 11:22:52 -0400 Received: from mail-pl1-f193.google.com ([209.85.214.193]:38652 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727481AbfEHPWv (ORCPT ); Wed, 8 May 2019 11:22:51 -0400 Received: by mail-pl1-f193.google.com with SMTP id a59so10082009pla.5; Wed, 08 May 2019 08:22:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=toejBubC2VyS9gb6UJ2Vq2aIqRrvIfX1XgP/QUj3iss=; b=ZsYg7Ke6+Fc/llocoKXtyMoCYKHSlndXDJIEbiXsOKoIBeXsZui72qU3hOqlmeDF59 5bTJYLQWi9IEwNf75Ei5XigdrPA8S+DfTKybbxAzcxqcC9vmr6d+MYyvJdsPIBu17vTl zUeNx8anUfACZCsToJ4HZn9e6Jp5C+If01DLDR9mskY/EqLqULbmcFv/MvNDYzGLhKRY zWQnPKCemOJ0CPqXUqib63BLt7GK4cMROiYB5H9riCCZJKM1pHMLPtZJxf06oKLyR1L4 pbtPdnuYfA0isW4CKyGxXfz3QD9AuhylrUH2pszT9oPnfY3OEDR9NZeRz+XyDgiHPNYX BLiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=toejBubC2VyS9gb6UJ2Vq2aIqRrvIfX1XgP/QUj3iss=; b=M4/x5k8ttZ0nhfF/acLui48WMuVobbh+WdsNWydgvFwLNL+jeQ230/rGvV0xq/6/Dl NHrlsJglwD2MzIz4Vj2rmWeQygaHyByOFlL5KU4gdFQLlMH9Cx+HWzp2IyhTk/pIGuhb yMKChoWac+HYSkHlZkTywjR7flGR9dfgKhID1zumx1ybRXJqUHE2CyZBgOMeyU14NVTA spjG7Coek/gbCAkGlu2k4QIEB+hR+GvwlcwOTif2o5Xisj2cs2XqA6n4+XtZ+T7s+ZI8 YEa9WGT+vnd6ZF/KFyJc7nYT9TfIXm2lzDMF3G+3/bL6GXajW3ysqWFQlZcPA0Rfi5qA YrJw== X-Gm-Message-State: APjAAAXaUVGeP+7JXELk8vzqEo8WiQTEb/CtrMbszb9MZfilGj6+uLqP wRCkj926hOPkJ7FEXm+R2iQ= X-Received: by 2002:a17:902:9898:: with SMTP id s24mr35563800plp.166.1557328970460; Wed, 08 May 2019 08:22:50 -0700 (PDT) Received: from localhost.localdomain ([104.238.181.70]) by smtp.gmail.com with ESMTPSA id o73sm7459360pfi.137.2019.05.08.08.22.44 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Wed, 08 May 2019 08:22:49 -0700 (PDT) From: Changbin Du To: corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de Cc: x86@kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Changbin Du , Mauro Carvalho Chehab Subject: [PATCH v4 08/27] Documentation: x86: convert zero-page.txt to reST Date: Wed, 8 May 2019 23:21:22 +0800 Message-Id: <20190508152141.8740-9-changbin.du@gmail.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190508152141.8740-1-changbin.du@gmail.com> References: <20190508152141.8740-1-changbin.du@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This converts the plain text documentation to reStructuredText format and add it to Sphinx TOC tree. No essential content change. Signed-off-by: Changbin Du Reviewed-by: Mauro Carvalho Chehab --- Documentation/x86/index.rst | 1 + Documentation/x86/zero-page.rst | 45 +++++++++++++++++++++++++++++++++ Documentation/x86/zero-page.txt | 40 ----------------------------- 3 files changed, 46 insertions(+), 40 deletions(-) create mode 100644 Documentation/x86/zero-page.rst delete mode 100644 Documentation/x86/zero-page.txt diff --git a/Documentation/x86/index.rst b/Documentation/x86/index.rst index d9ccc0f39279..e43aa9b31976 100644 --- a/Documentation/x86/index.rst +++ b/Documentation/x86/index.rst @@ -14,3 +14,4 @@ x86-specific Documentation kernel-stacks entry_64 earlyprintk + zero-page diff --git a/Documentation/x86/zero-page.rst b/Documentation/x86/zero-page.rst new file mode 100644 index 000000000000..f088f5881666 --- /dev/null +++ b/Documentation/x86/zero-page.rst @@ -0,0 +1,45 @@ +.. SPDX-License-Identifier: GPL-2.0 + +========= +Zero Page +========= +The additional fields in struct boot_params as a part of 32-bit boot +protocol of kernel. These should be filled by bootloader or 16-bit +real-mode setup code of the kernel. References/settings to it mainly +are in:: + + arch/x86/include/uapi/asm/bootparam.h + +=========== ===== ======================= ================================================= +Offset/Size Proto Name Meaning + +000/040 ALL screen_info Text mode or frame buffer information + (struct screen_info) +040/014 ALL apm_bios_info APM BIOS information (struct apm_bios_info) +058/008 ALL tboot_addr Physical address of tboot shared page +060/010 ALL ist_info Intel SpeedStep (IST) BIOS support information + (struct ist_info) +080/010 ALL hd0_info hd0 disk parameter, OBSOLETE!! +090/010 ALL hd1_info hd1 disk parameter, OBSOLETE!! +0A0/010 ALL sys_desc_table System description table (struct sys_desc_table), + OBSOLETE!! +0B0/010 ALL olpc_ofw_header OLPC's OpenFirmware CIF and friends +0C0/004 ALL ext_ramdisk_image ramdisk_image high 32bits +0C4/004 ALL ext_ramdisk_size ramdisk_size high 32bits +0C8/004 ALL ext_cmd_line_ptr cmd_line_ptr high 32bits +140/080 ALL edid_info Video mode setup (struct edid_info) +1C0/020 ALL efi_info EFI 32 information (struct efi_info) +1E0/004 ALL alt_mem_k Alternative mem check, in KB +1E4/004 ALL scratch Scratch field for the kernel setup code +1E8/001 ALL e820_entries Number of entries in e820_table (below) +1E9/001 ALL eddbuf_entries Number of entries in eddbuf (below) +1EA/001 ALL edd_mbr_sig_buf_entries Number of entries in edd_mbr_sig_buffer + (below) +1EB/001 ALL kbd_status Numlock is enabled +1EC/001 ALL secure_boot Secure boot is enabled in the firmware +1EF/001 ALL sentinel Used to detect broken bootloaders +290/040 ALL edd_mbr_sig_buffer EDD MBR signatures +2D0/A00 ALL e820_table E820 memory map table + (array of struct e820_entry) +D00/1EC ALL eddbuf EDD data (array of struct edd_info) +=========== ===== ======================= ================================================= diff --git a/Documentation/x86/zero-page.txt b/Documentation/x86/zero-page.txt deleted file mode 100644 index 68aed077f7b6..000000000000 --- a/Documentation/x86/zero-page.txt +++ /dev/null @@ -1,40 +0,0 @@ -The additional fields in struct boot_params as a part of 32-bit boot -protocol of kernel. These should be filled by bootloader or 16-bit -real-mode setup code of the kernel. References/settings to it mainly -are in: - - arch/x86/include/uapi/asm/bootparam.h - - -Offset Proto Name Meaning -/Size - -000/040 ALL screen_info Text mode or frame buffer information - (struct screen_info) -040/014 ALL apm_bios_info APM BIOS information (struct apm_bios_info) -058/008 ALL tboot_addr Physical address of tboot shared page -060/010 ALL ist_info Intel SpeedStep (IST) BIOS support information - (struct ist_info) -080/010 ALL hd0_info hd0 disk parameter, OBSOLETE!! -090/010 ALL hd1_info hd1 disk parameter, OBSOLETE!! -0A0/010 ALL sys_desc_table System description table (struct sys_desc_table), - OBSOLETE!! -0B0/010 ALL olpc_ofw_header OLPC's OpenFirmware CIF and friends -0C0/004 ALL ext_ramdisk_image ramdisk_image high 32bits -0C4/004 ALL ext_ramdisk_size ramdisk_size high 32bits -0C8/004 ALL ext_cmd_line_ptr cmd_line_ptr high 32bits -140/080 ALL edid_info Video mode setup (struct edid_info) -1C0/020 ALL efi_info EFI 32 information (struct efi_info) -1E0/004 ALL alt_mem_k Alternative mem check, in KB -1E4/004 ALL scratch Scratch field for the kernel setup code -1E8/001 ALL e820_entries Number of entries in e820_table (below) -1E9/001 ALL eddbuf_entries Number of entries in eddbuf (below) -1EA/001 ALL edd_mbr_sig_buf_entries Number of entries in edd_mbr_sig_buffer - (below) -1EB/001 ALL kbd_status Numlock is enabled -1EC/001 ALL secure_boot Secure boot is enabled in the firmware -1EF/001 ALL sentinel Used to detect broken bootloaders -290/040 ALL edd_mbr_sig_buffer EDD MBR signatures -2D0/A00 ALL e820_table E820 memory map table - (array of struct e820_entry) -D00/1EC ALL eddbuf EDD data (array of struct edd_info) -- 2.20.1