PR_SIGACTION(3PROC) Process Control Library Functions PR_SIGACTION(3PROC)
- inject sigaction system call into victim process
Process Control Library (libproc, -lproc) #include <libproc.h> int pr_sigaction
(struct ps_prochandle *P
, int sig
, const struct sigaction *act
, struct sigaction *oact
() function injects the sigaction(2)
system call into the
target process P
by means of the agent LWP. If the process handle P
value NULL then this will be equivalent to calling sigaction(2)
currently running process.
The arguments sig
, and oact
have the same meaning as in sigaction(2)
for the full description and purpose of the sigaction
system call and its arguments.
() function only works on active processes. Process
handles that correspond to core files, zombie processes, or ELF objects do
not support system call injection.
Upon successful completion, the pr_sigaction
() function's return value is
that described in sigaction(2)
. Otherwise, -1
is returned and errno
to ENOSYS to indicate that the system call could not be injected.
For the full list of errors see the ERRORS
section in sigaction(2)
() function will fail if:
ENOSYS An error occurred while trying to invoke the agent LWP
and inject a system call in the process handle P
process handle P
does not support system call injection.
INTERFACE STABILITY UncommittedMT-LEVEL
SEE ALSO sigaction(2)
illumos May 11, 2016 illumos