1997-07-31 02:53:50 +04:00
|
|
|
.\" $NetBSD: i386_iopl.2,v 1.6 1997/07/30 23:13:27 jtc Exp $
|
1996-02-28 01:57:17 +03:00
|
|
|
.\"
|
|
|
|
.\" Copyright (c) 1996 The NetBSD Foundation, Inc.
|
1995-10-15 05:25:07 +03:00
|
|
|
.\" All rights reserved.
|
|
|
|
.\"
|
1996-02-28 01:57:17 +03:00
|
|
|
.\" This code is derived from software contributed to The NetBSD Foundation
|
|
|
|
.\" by John T. Kohl and Charles M. Hannum.
|
|
|
|
.\"
|
1995-10-15 05:25:07 +03:00
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 3. All advertising materials mentioning features or use of this software
|
|
|
|
.\" must display the following acknowledgement:
|
1996-02-28 01:57:17 +03:00
|
|
|
.\" This product includes software developed by the NetBSD
|
|
|
|
.\" Foundation, Inc. and its contributors.
|
|
|
|
.\" 4. Neither the name of The NetBSD Foundation nor the names of its
|
|
|
|
.\" contributors may be used to endorse or promote products derived
|
|
|
|
.\" from this software without specific prior written permission.
|
1995-10-15 05:25:07 +03:00
|
|
|
.\"
|
1996-02-28 01:57:17 +03:00
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
1997-07-31 02:53:50 +04:00
|
|
|
.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
1996-02-28 01:57:17 +03:00
|
|
|
.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
.\" POSSIBILITY OF SUCH DAMAGE.
|
1995-10-15 05:25:07 +03:00
|
|
|
.\"
|
|
|
|
.Dd October 14, 1995
|
|
|
|
.Dt I386_IOPL 2
|
|
|
|
.Os NetBSD
|
|
|
|
.Sh NAME
|
|
|
|
.Nm i386_iopl
|
|
|
|
.Nd change the i386 I/O privilege level
|
|
|
|
.Sh SYNOPSIS
|
1996-01-05 17:56:42 +03:00
|
|
|
.Fd #include <sys/types.h>
|
1995-10-15 05:25:07 +03:00
|
|
|
.Fd #include <machine/sysarch.h>
|
|
|
|
.Ft int
|
|
|
|
.Fn i386_iopl "int iopl"
|
|
|
|
.Sh DESCRIPTION
|
|
|
|
.Fn i386_iopl
|
|
|
|
sets the i386 I/O privilege level to the value specified by
|
1996-05-28 17:34:39 +04:00
|
|
|
.Ar iopl .
|
1995-10-15 05:25:07 +03:00
|
|
|
This call is restricted to the super-user.
|
|
|
|
.Sh RETURN VALUES
|
|
|
|
Upon successful completion,
|
|
|
|
.Fn i386_iopl
|
|
|
|
returns 0.
|
|
|
|
Otherwise, a value of -1 is returned and the global
|
|
|
|
variable
|
|
|
|
.Va errno
|
|
|
|
is set to indicate the error.
|
|
|
|
.Sh ERRORS
|
|
|
|
.Fn i386_iopl
|
|
|
|
will fail if:
|
|
|
|
.Bl -tag -width [EINVAL]
|
|
|
|
.It Bq Er EPERM
|
1997-04-27 01:31:09 +04:00
|
|
|
The caller was not the super-user, or the operation was not permitted at the
|
|
|
|
current security level.
|
1995-10-15 05:25:07 +03:00
|
|
|
.El
|
1996-01-05 17:56:42 +03:00
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr i386_set_ioperm 2 ,
|
|
|
|
.Xr i386_get_ioperm 2 .
|
1995-10-15 05:25:07 +03:00
|
|
|
.Sh REFERENCES
|
|
|
|
i386 Microprocessor Programmer's Reference Manual, Intel
|
1996-01-05 17:56:42 +03:00
|
|
|
.Sh WARNING
|
|
|
|
You can really hose your machine if you enable user-level I/O and
|
|
|
|
write to hardware ports without care.
|