Provided by: manpages-dev_4.04-2_all bug

NAME

       iopl - change I/O privilege level

SYNOPSIS

       #include <sys/io.h>

       int iopl(int level);

DESCRIPTION

       iopl()  changes the I/O privilege level of the calling process, as specified by the two least significant
       bits in level.

       This call is necessary to allow 8514-compatible X servers to run under  Linux.   Since  these  X  servers
       require access to all 65536 I/O ports, the ioperm(2) call is not sufficient.

       In addition to granting unrestricted I/O port access, running at a higher I/O privilege level also allows
       the process to disable interrupts.  This will probably crash the system, and is not recommended.

       Permissions are inherited by fork(2) and execve(2).

       The I/O privilege level for a normal process is 0.

       This call is mostly for the i386 architecture.  On many other architectures it does  not  exist  or  will
       always return an error.

RETURN VALUE

       On success, zero is returned.  On error, -1 is returned, and errno is set appropriately.

ERRORS

       EINVAL level is greater than 3.

       ENOSYS This call is unimplemented.

       EPERM  The  calling  process  has  insufficient privilege to call iopl(); the CAP_SYS_RAWIO capability is
              required to raise the I/O privilege level above its current value.

CONFORMING TO

       iopl() is Linux-specific and should not be used in programs that are intended to be portable.

NOTES

       Glibc2 has a prototype both in <sys/io.h> and in <sys/perm.h>.  Avoid the latter, it is available on i386
       only.

SEE ALSO

       ioperm(2), outb(2), capabilities(7)

COLOPHON

       This  page  is  part  of  release  4.04  of  the  Linux man-pages project.  A description of the project,
       information  about  reporting  bugs,  and  the  latest  version  of  this   page,   can   be   found   at
       http://www.kernel.org/doc/man-pages/.