Hello,

As I explained in another message, I am writing some graphics code (both for fun and 
educational purposes) and need to access memory below 1 MB. I have tried it by opening 
/dev/mem, calling mmap, i386_vm86 and even opening /dev/io to change permission 
levels. However, the program (and actually the physical terminal) hangs when doing the 
interruption call.

I attach the test program within this mail. If attachments are not part of this list's 
etiquette, sorry, it will not happen again. Compile with "gcc -o whatever vesainfo.c" 
if you want to have a look (you will need root privileges to execute it).

Well, I am completely desperate. I tried everything I could, but for some magical 
reasons, this low-level access does not work. Any ideas?


Thank you in advance,

Alex


vesastructs.h:
#ifndef __VESASTRUCTS_H
#define __VESASTRUCTS_H

typedef unsigned char byte;
typedef unsigned short word;
typedef unsigned int dword;

struct VesaInfo
{
   byte signature[4];
   word version;
   char *oemName;
   dword capabilities;
   word *suppModes;
   word total64kBlocks;
   word oemSoftVersion;
   byte *vendorName;
   byte *productName;
   byte *productRev;
   word VBEAFVersion;
   word *accelSuppModes;
   byte reserved[216];
   byte oemStrings[256];
};


#endif


vesainfo.c:
#include <sys/types.h>
#include <sys/mman.h>
#include <machine/sysarch.h>
#include <machine/vm86.h>
#include <stdio.h>
#include <string.h>
#include <unistd.h>
#include <fcntl.h>
#include "vesastructs.h"

int main (void)
{
   struct vm86_init_args vm86init;
   struct vm86_intcall_args intargs;
   struct VesaInfo *vbeInfo;
   char c;
   int f, io;
   unsigned int len=0x400;
   int ioperm=0;
   
   f=open("/dev/mem", O_RDWR);
   if (f==-1)
     {
        printf("Could Not Access Memory\n");
        return -1;
     }
   
   vbeInfo=(struct VesaInfo*)mmap((void*)0x10000, 0x1000, 
                                  PROT_READ|PROT_WRITE|PROT_EXEC, 
                                  MAP_FIXED|MAP_SHARED,
                                  f, 0x10000);
   
   if (vbeInfo==MAP_FAILED)
     {
        printf("Peta mmap\n");
        return -1;
     }

   memset(&vm86init, 0, sizeof(struct vm86_init_args));
   memset(&intargs, 0, sizeof(struct vm86_intcall_args));
   memset(vbeInfo, 0, sizeof(struct VesaInfo));
   
   printf("vbeInfo = %p\n", vbeInfo);
   vbeInfo->signature[0]='V';
   vbeInfo->signature[1]='B';
   vbeInfo->signature[2]='E';
   vbeInfo->signature[3]='2';
   
   printf("vbeSig = %c%c%c%c\n",
          vbeInfo->signature[0],
          vbeInfo->signature[1],
          vbeInfo->signature[2],
          vbeInfo->signature[3]);
   
//   sleep(1);
   if (!i386_vm86(VM86_INIT, &vm86init))
     {
        printf("VM86_INIT successful\n");
     }
   
   intargs.intnum=0x10;
   intargs.vmf.vmf_ax=0x4f00;
   intargs.vmf.vmf_es=(((dword)vbeInfo)&0xf0000)>>4; /*0x1000;*/
   intargs.vmf.vmf_di=((dword)vbeInfo)&0xffff; /*0x0000;*/
   
   i386_set_ioperm(0, 0x400, 1);
   i386_get_ioperm(0, &len, &ioperm);
   printf("len=%x perm=%x\n", len, ioperm);
//   return -1;
   
   io=open("/dev/io", 0);
   if (io==-1)
     {
        printf("io pef\n");
        return -1;
     }
   
   
//   sleep(1);
   printf("INTCALL (0x%x, ax=0x%.04x, es:di=%.04x:%.04x)\n",
          intargs.intnum, intargs.vmf.vmf_ax,
          intargs.vmf.vmf_es, intargs.vmf.edi.r_ex);
   
   if (!i386_vm86(VM86_INTCALL, &intargs))
     {
        printf("VM86_INTCALL successful (ax=%.04x)\n", intargs.vmf.vmf_ax);
     }
//   sleep(1);
   
   printf("vbeVer\n");
//   sleep(1);
   
   printf("VESA signature: %c%c%c%c\nVESA Version: 0x%.04x\n",
          vbeInfo->signature[0],
          vbeInfo->signature[1],
          vbeInfo->signature[2],
          vbeInfo->signature[3],
          vbeInfo->version);
   return 0;
}


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to