PR_SIGACTION(3PROC) Process Control Library Functions PR_SIGACTION(3PROC)
pr_sigaction - inject sigaction system call into victim process
Process Control Library (libproc, -lproc)
#include <libproc.h>
int
pr_sigaction(struct ps_prochandle *P, int sig,
const struct sigaction *act, struct sigaction *oact);
The pr_sigaction() function injects the sigaction(2) system call into
the target process P by means of the agent LWP. If the process handle
P is the value NULL then this will be equivalent to calling
sigaction(2) on the currently running process.
The arguments sig, act, and oact have the same meaning as in
sigaction(2). See sigaction(2) for the full description and purpose of
the sigaction system call and its arguments.
The pr_sigaction() function only works on active processes. Process
handles that correspond to core files, zombie processes, or ELF objects
do not support system call injection.
Upon successful completion, the pr_sigaction() function's return value
is that described in sigaction(2). Otherwise, -1 is returned and errno
is set to ENOSYS to indicate that the system call could not be
injected.
For the full list of errors see the ERRORS section in sigaction(2).
The pr_sigaction() function will fail if:
ENOSYS An error occurred while trying to invoke the agent
LWP and inject a system call in the process handle P
or the process handle P does not support system call
injection.
Uncommitted
MT-LEVEL
See LOCKING in libproc(3LIB).
sigaction(2), libproc(3LIB), proc(5)
illumos November 27, 2023 illumos
NAME
pr_sigaction - inject sigaction system call into victim process
LIBRARY
Process Control Library (libproc, -lproc)
SYNOPSIS
#include <libproc.h>
int
pr_sigaction(struct ps_prochandle *P, int sig,
const struct sigaction *act, struct sigaction *oact);
DESCRIPTION
The pr_sigaction() function injects the sigaction(2) system call into
the target process P by means of the agent LWP. If the process handle
P is the value NULL then this will be equivalent to calling
sigaction(2) on the currently running process.
The arguments sig, act, and oact have the same meaning as in
sigaction(2). See sigaction(2) for the full description and purpose of
the sigaction system call and its arguments.
The pr_sigaction() function only works on active processes. Process
handles that correspond to core files, zombie processes, or ELF objects
do not support system call injection.
RETURN VALUES
Upon successful completion, the pr_sigaction() function's return value
is that described in sigaction(2). Otherwise, -1 is returned and errno
is set to ENOSYS to indicate that the system call could not be
injected.
ERRORS
For the full list of errors see the ERRORS section in sigaction(2).
The pr_sigaction() function will fail if:
ENOSYS An error occurred while trying to invoke the agent
LWP and inject a system call in the process handle P
or the process handle P does not support system call
injection.
INTERFACE STABILITY
Uncommitted
MT-LEVEL
See LOCKING in libproc(3LIB).
SEE ALSO
sigaction(2), libproc(3LIB), proc(5)
illumos November 27, 2023 illumos