PR_GETSOCKOPT(3PROC) Process Control Library Functions PR_GETSOCKOPT(3PROC)

pr_getsockoptinject getsockopt library call call into victim process

Process Control Library (libproc, -lproc)

#include <libproc.h>

pr_getsockopt(struct ps_prochandle *P, int sock, int level, int optname, void *optval, int *optlen);

The () function injects the getsockopt(3SOCKET) library call call into the target process P by means of the agent lwp. If the process handle P is the value NULL then this will be equivalent to calling getsockopt(3SOCKET) on the currently running process.

The arguments sock, level, optname, optval, and optlen have the same meaning as in getsockopt(3SOCKET), see getsockopt(3SOCKET) for the full description and purpose of the system call and its arguments.

The () function only works on active processes. Process handles that correspond to core files, zombie processes, or ELF objects do not support system call injection.

Upon successful completion, the pr_getsockopt() function's return value is that described in getsockopt(3SOCKET). Otherwise, is returned and is set to ENOSYS to indicate that the system call could not be injected.

For the full list of errors see the ERRORS section in getsockopt(3SOCKET).

The pr_getsockopt() function will fail if:

An error occurred while trying to invoke the agent lwp and inject a system call in the process handle P or the process handle P does not support system call injection.

See in libproc(3LIB).

libproc(3LIB), getsockopt(3SOCKET), proc(5)

November 27, 2023 OmniOS