PR_IOCTL(3PROC) Process Control Library Functions PR_IOCTL(3PROC)
pr_ioctl - inject ioctl system call into victim process
Process Control Library (libproc, -lproc)
#include <libproc.h>
int
pr_ioctl(struct ps_prochandle *P, int fd, int code, void *buf,
size_t size);
The pr_ioctl() function injects the ioctl(2) system call into the
target process P by means of the agent LWP. If the process handle P is
the value NULL then this will be equivalent to calling ioctl(2) on the
currently running process.
The arguments fd, code, and buf have the same meaning as in ioctl(2).
See ioctl(2) for the full description and purpose of the ioctl system
call and its arguments.
Unlike the traditional ioctl(2) system call, the pr_ioctl() function
needs to know the maximum size of the buffer buf such that it can be
properly injected into the address space of the target process.
The pr_ioctl() function only works on active processes. Process
handles that correspond to core files, zombie processes, or ELF objects
do not support system call injection.
Upon successful completion, the pr_ioctl() function's return value is
that described in ioctl(2). Otherwise, -1 is returned and errno is set
to ENOSYS to indicate that the system call could not be injected.
For the full list of errors see the ERRORS section in ioctl(2).
The pr_ioctl() function will fail if:
ENOSYS An error occurred while trying to invoke the agent
LWP and inject a system call in the process handle P
or the process handle P does not support system call
injection.
Uncommitted
MT-LEVEL
See LOCKING in libproc(3LIB).
ioctl(2), libproc(3LIB), proc(5)
illumos November 27, 2023 illumos
NAME
pr_ioctl - inject ioctl system call into victim process
LIBRARY
Process Control Library (libproc, -lproc)
SYNOPSIS
#include <libproc.h>
int
pr_ioctl(struct ps_prochandle *P, int fd, int code, void *buf,
size_t size);
DESCRIPTION
The pr_ioctl() function injects the ioctl(2) system call into the
target process P by means of the agent LWP. If the process handle P is
the value NULL then this will be equivalent to calling ioctl(2) on the
currently running process.
The arguments fd, code, and buf have the same meaning as in ioctl(2).
See ioctl(2) for the full description and purpose of the ioctl system
call and its arguments.
Unlike the traditional ioctl(2) system call, the pr_ioctl() function
needs to know the maximum size of the buffer buf such that it can be
properly injected into the address space of the target process.
The pr_ioctl() function only works on active processes. Process
handles that correspond to core files, zombie processes, or ELF objects
do not support system call injection.
RETURN VALUES
Upon successful completion, the pr_ioctl() function's return value is
that described in ioctl(2). Otherwise, -1 is returned and errno is set
to ENOSYS to indicate that the system call could not be injected.
ERRORS
For the full list of errors see the ERRORS section in ioctl(2).
The pr_ioctl() function will fail if:
ENOSYS An error occurred while trying to invoke the agent
LWP and inject a system call in the process handle P
or the process handle P does not support system call
injection.
INTERFACE STABILITY
Uncommitted
MT-LEVEL
See LOCKING in libproc(3LIB).
SEE ALSO
ioctl(2), libproc(3LIB), proc(5)
illumos November 27, 2023 illumos