mirror of
https://review.coreboot.org/flashrom.git
synced 2025-07-02 14:33:18 +02:00
hwaccess: move x86 port I/O related code into own files
Allow port I/O related code to be compiled independent from memory mapping functionality. This enables for a better selection of needed hardware access types. Change-Id: I372b4a409f036da766c42bc406b596bc41b0f75a Signed-off-by: Thomas Heijligen <thomas.heijligen@secunet.com> Reviewed-on: https://review.coreboot.org/c/flashrom/+/60110 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Nico Huber <nico.h@gmx.de>
This commit is contained in:

committed by
Nico Huber

parent
88c871e74c
commit
49d758698a
62
hwaccess.c
62
hwaccess.c
@ -25,17 +25,8 @@
|
||||
#include <fcntl.h>
|
||||
#endif
|
||||
#include "flash.h"
|
||||
#include "programmer.h"
|
||||
#include "hwaccess.h"
|
||||
|
||||
#if USE_IOPERM
|
||||
#include <sys/io.h>
|
||||
#endif
|
||||
|
||||
#if (defined (__i386__) || defined (__x86_64__) || defined(__amd64__)) && USE_DEV_IO
|
||||
int io_fd;
|
||||
#endif
|
||||
|
||||
/* Prevent reordering and/or merging of reads/writes to hardware.
|
||||
* Such reordering and/or merging would break device accesses which depend on the exact access order.
|
||||
*/
|
||||
@ -70,59 +61,6 @@ static inline void sync_primitive(void)
|
||||
#endif
|
||||
}
|
||||
|
||||
#if (defined (__i386__) || defined (__x86_64__) || defined(__amd64__)) && !(defined(__DJGPP__) || defined(__LIBPAYLOAD__))
|
||||
static int release_io_perms(void *p)
|
||||
{
|
||||
#if defined (__sun)
|
||||
sysi86(SI86V86, V86SC_IOPL, 0);
|
||||
#elif USE_DEV_IO
|
||||
close(io_fd);
|
||||
#elif USE_IOPERM
|
||||
ioperm(0, 65536, 0);
|
||||
#elif USE_IOPL
|
||||
iopl(0);
|
||||
#endif
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Get I/O permissions with automatic permission release on shutdown. */
|
||||
int rget_io_perms(void)
|
||||
{
|
||||
#if defined (__sun)
|
||||
if (sysi86(SI86V86, V86SC_IOPL, PS_IOPL) != 0) {
|
||||
#elif USE_DEV_IO
|
||||
if ((io_fd = open("/dev/io", O_RDWR)) < 0) {
|
||||
#elif USE_IOPERM
|
||||
if (ioperm(0, 65536, 1) != 0) {
|
||||
#elif USE_IOPL
|
||||
if (iopl(3) != 0) {
|
||||
#endif
|
||||
msg_perr("ERROR: Could not get I/O privileges (%s).\n", strerror(errno));
|
||||
msg_perr("You need to be root.\n");
|
||||
#if defined (__OpenBSD__)
|
||||
msg_perr("If you are root already please set securelevel=-1 in /etc/rc.securelevel and\n"
|
||||
"reboot, or reboot into single user mode.\n");
|
||||
#elif defined(__NetBSD__)
|
||||
msg_perr("If you are root already please reboot into single user mode or make sure\n"
|
||||
"that your kernel configuration has the option INSECURE enabled.\n");
|
||||
#endif
|
||||
return 1;
|
||||
} else {
|
||||
register_shutdown(release_io_perms, NULL);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
#else
|
||||
|
||||
/* DJGPP and libpayload environments have full PCI port I/O permissions by default. */
|
||||
/* PCI port I/O support is unimplemented on PPC/MIPS and unavailable on ARM. */
|
||||
int rget_io_perms(void)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
|
||||
void mmio_writeb(uint8_t val, void *addr)
|
||||
{
|
||||
*(volatile uint8_t *) addr = val;
|
||||
|
Reference in New Issue
Block a user