PR_SIGACTION(3PROC) | Process Control Library Functions | PR_SIGACTION(3PROC) |
pr_sigaction
—
inject sigaction system call into victim process
Process Control Library (libproc, -lproc)
#include
<libproc.h>
int
pr_sigaction
(struct ps_prochandle
*P, int sig, const struct
sigaction *act, struct sigaction *oact);
The
pr_sigaction
()
function injects the sigaction(2)
system call into the target process P by means of the
agent LWP. If the process handle P is the value
NULL
then this will be equivalent to calling
sigaction(2) on the currently
running process.
The arguments sig, act, and oact have the same meaning as in sigaction(2). See sigaction(2) for the full description and purpose of the sigaction system call and its arguments.
The
pr_sigaction
()
function only works on active processes. Process handles that correspond to
core files, zombie processes, or ELF objects do not support system call
injection.
Upon successful completion, the
pr_sigaction
() function's return value is that
described in sigaction(2).
Otherwise, -1 is
returned and
errno is
set to ENOSYS
to indicate that the system call could
not be injected.
For the full list of errors see the ERRORS section in sigaction(2).
The pr_sigaction
() function will fail
if:
ENOSYS
See LOCKING in libproc(3LIB).
November 27, 2023 | OmniOS |