PR_IOCTL(3PROC) Process Control Library Functions PR_IOCTL(3PROC)

pr_ioctlinject ioctl system call into victim process

Process Control Library (libproc, -lproc)
#include <libproc.h>

pr_ioctl(struct ps_prochandle *P, int fd, int code, void *buf, size_t size);

The () function injects the ioctl(2) system call into the target process P by means of the agent LWP. If the process handle P is the value NULL then this will be equivalent to calling ioctl(2) on the currently running process.

The arguments fd, code, and buf have the same meaning as in ioctl(2). See ioctl(2) for the full description and purpose of the system call and its arguments.

Unlike the traditional ioctl(2) system call, the () function needs to know the maximum size of the buffer buf such that it can be properly injected into the address space of the target process.

The () function only works on active processes. Process handles that correspond to core files, zombie processes, or ELF objects do not support system call injection.

Upon successful completion, the pr_ioctl() function's return value is that described in ioctl(2). Otherwise, is returned and is set to ENOSYS to indicate that the system call could not be injected.

For the full list of errors see the ERRORS section in ioctl(2).

The pr_ioctl() function will fail if:

An error occurred while trying to invoke the agent LWP and inject a system call in the process handle P or the process handle P does not support system call injection.

See in libproc(3LIB).

ioctl(2), libproc(3LIB), proc(5)

May 11, 2016 OmniOS