PR_IOCTL(3PROC) | Process Control Library Functions | PR_IOCTL(3PROC) |
pr_ioctl
— inject
ioctl system call into victim process
Process Control Library (libproc, -lproc)
#include
<libproc.h>
int
pr_ioctl
(struct ps_prochandle
*P, int fd, int code,
void *buf, size_t size);
The
pr_ioctl
()
function injects the ioctl(2) system
call into the target process P by means of the agent
LWP. If the process handle P is the value
NULL
then this will be equivalent to calling
ioctl(2) on the currently running
process.
The arguments fd, code, and buf have the same meaning as in ioctl(2). See ioctl(2) for the full description and purpose of the ioctl system call and its arguments.
Unlike the traditional
ioctl(2) system call, the
pr_ioctl
()
function needs to know the maximum size of the buffer
buf such that it can be properly injected into the
address space of the target process.
The
pr_ioctl
()
function only works on active processes. Process handles that correspond to
core files, zombie processes, or ELF objects do not support system call
injection.
Upon successful completion, the pr_ioctl
()
function's return value is that described in
ioctl(2). Otherwise,
-1 is returned
and
errno is
set to ENOSYS
to indicate that the system call could
not be injected.
For the full list of errors see the ERRORS section in ioctl(2).
The pr_ioctl
() function will fail if:
ENOSYS
See LOCKING in libproc(3LIB).
November 27, 2023 | OmniOS |