PR_SIGACTION(3PROC) Process Control Library Functions PR_SIGACTION(3PROC)

inject sigaction system call into victim process

Process Control Library (libproc, -lproc)
#include <libproc.h>

pr_sigaction(struct ps_prochandle *P, int sig, const struct sigaction *act, struct sigaction *oact);

The pr_sigaction() function injects the sigaction(2) system call into the target process P by means of the agent LWP. If the process handle P is the value NULL then this will be equivalent to calling sigaction(2) on the currently running process.

The arguments sig, act, and oact have the same meaning as in sigaction(2). See sigaction(2) for the full description and purpose of the sigaction system call and its arguments.

The pr_sigaction() function only works on active processes. Process handles that correspond to core files, zombie processes, or ELF objects do not support system call injection.

Upon successful completion, the pr_sigaction() function's return value is that described in sigaction(2). Otherwise, -1 is returned and errno is set to ENOSYS to indicate that the system call could not be injected.

For the full list of errors see the ERRORS section in sigaction(2).

The pr_sigaction() function will fail if:

An error occurred while trying to invoke the agent LWP and inject a system call in the process handle P or the process handle P does not support system call injection.


See LOCKING in libproc(3LIB).

sigaction(2), libproc(3LIB), proc(5)
May 11, 2016 OmniOS