PR_IOCTL(3PROC) Process Control Library Functions PR_IOCTL(3PROC)


pr_ioctl - inject ioctl system call into victim process


Process Control Library (libproc, -lproc)
#include <libproc.h>

pr_ioctl(struct ps_prochandle *P, int fd, int code, void *buf,
size_t size);


The pr_ioctl() function injects the ioctl(2) system call into the target
process P by means of the agent LWP. If the process handle P is the value
NULL then this will be equivalent to calling ioctl(2) on the currently
running process.

The arguments fd, code, and buf have the same meaning as in ioctl(2). See
ioctl(2) for the full description and purpose of the ioctl system call and
its arguments.

Unlike the traditional ioctl(2) system call, the pr_ioctl() function needs
to know the maximum size of the buffer buf such that it can be properly
injected into the address space of the target process.

The pr_ioctl() function only works on active processes. Process handles
that correspond to core files, zombie processes, or ELF objects do not
support system call injection.


Upon successful completion, the pr_ioctl() function's return value is that
described in ioctl(2). Otherwise, -1 is returned and errno is set to
ENOSYS to indicate that the system call could not be injected.


For the full list of errors see the ERRORS section in ioctl(2).

The pr_ioctl() function will fail if:

ENOSYS An error occurred while trying to invoke the agent LWP
and inject a system call in the process handle P or the
process handle P does not support system call injection.



See LOCKING in libproc(3LIB).


ioctl(2), libproc(3LIB), proc(4)

illumos May 11, 2016 illumos