PR_GETSOCKOPT(3PROC) Process Control Library Functions PR_GETSOCKOPT(3PROC)

NAME


pr_getsockopt - inject getsockopt library call call into victim process

SYNOPSIS


Process Control Library (libproc, -lproc)
#include <libproc.h>

int
pr_getsockopt(struct ps_prochandle *P, int sock, int level, int optname,
void *optval, int *optlen);

DESCRIPTION


The pr_getsockopt() function injects the getsockopt(3SOCKET) library call
call into the target process P by means of the agent lwp. If the process
handle P is the value NULL then this will be equivalent to calling
getsockopt(3SOCKET) on the currently running process.

The arguments sock, level, optname, optval, and optlen have the same
meaning as in getsockopt(3SOCKET), see getsockopt(3SOCKET) for the full
description and purpose of the getsockopt system call and its arguments.

The pr_getsockopt() function only works on active processes. Process
handles that correspond to core files, zombie processes, or ELF objects do
not support system call injection.

RETURN VALUES


Upon successful completion, the pr_getsockopt() function's return value is
that described in getsockopt(3SOCKET). Otherwise, -1 is returned and errno
is set to ENOSYS to indicate that the system call could not be injected.

ERRORS


For the full list of errors see the ERRORS section in getsockopt(3SOCKET).

The pr_getsockopt() function will fail if:

ENOSYS An error occurred while trying to invoke the agent lwp
and inject a system call in the process handle P or the
process handle P does not support system call injection.

INTERFACE STABILITY


Uncommitted

MT-LEVEL
See LOCKING in libproc(3LIB).

SEE ALSO


libproc(3LIB), getsockopt(3SOCKET), proc(4)

illumos May 11, 2016 illumos