Provided by: manpages-dev_5.10-1ubuntu1_all bug

NAME

       iopl - change I/O privilege level

SYNOPSIS

       #include <sys/io.h>

       int iopl(int level);

DESCRIPTION

       iopl()  changes  the  I/O  privilege  level of the calling thread, as specified by the two
       least significant bits in level.

       The I/O privilege level for a normal thread is 0.  Permissions are inherited from  parents
       to children.

       This  call is deprecated, is significantly slower than ioperm(2), and is only provided for
       older X servers which require access to all 65536 I/O ports.  It is mostly  for  the  i386
       architecture.   On  many  other  architectures  it does not exist or will always return an
       error.

RETURN VALUE

       On success, zero is returned.  On error, -1 is returned, and errno is set appropriately.

ERRORS

       EINVAL level is greater than 3.

       ENOSYS This call is unimplemented.

       EPERM  The calling thread has insufficient privilege to  call  iopl();  the  CAP_SYS_RAWIO
              capability is required to raise the I/O privilege level above its current value.

CONFORMING TO

       iopl()  is  Linux-specific  and  should  not  be  used in programs that are intended to be
       portable.

NOTES

       Glibc2 has a prototype both in <sys/io.h> and in <sys/perm.h>.  Avoid the  latter,  it  is
       available on i386 only.

       Prior  to  Linux  5.5  iopl()  allowed the thread to disable interrupts while running at a
       higher I/O privilege level.  This will probably crash the system, and is not recommended.

       Prior to Linux 3.7, on some architectures (such as i386), permissions  were  inherited  by
       the  child  produced  by  fork(2)  and were preserved across execve(2).  This behavior was
       inadvertently changed in Linux 3.7, and won't be reinstated.

SEE ALSO

       ioperm(2), outb(2), capabilities(7)

COLOPHON

       This page is part of release 5.10 of the Linux man-pages project.  A  description  of  the
       project,  information  about  reporting  bugs, and the latest version of this page, can be
       found at https://www.kernel.org/doc/man-pages/.