PR_MMAP(3PROC) | Process Control Library Functions | PR_MMAP(3PROC) |
pr_mmap
— inject
mmap system call into victim process
Process Control Library (libproc, -lproc)
#include
<libproc.h>
int
pr_mmap
(struct ps_prochandle *P,
void *addr, size_t len,
int prot, int flags,
int fd, off_t off);
The
pr_mmap
()
function injects the mmap(2) system call
into the target process P by means of the agent LWP.
If the process handle P is the value
NULL
then this will be equivalent to calling
mmap(2) on the currently running
process.
The arguments addr, len, prot, flags, fd, and off have the same meaning as in mmap(2). See mmap(2) for the full description and purpose of the mmap system call and its arguments.
The
pr_mmap
()
function only works on active processes. Process handles that correspond to
core files, zombie processes, or ELF objects do not support system call
injection.
Upon successful completion, the pr_mmap
()
function's return value is that described in
mmap(2). Otherwise,
-1 is returned
and
errno is
set to ENOSYS
to indicate that the system call could
not be injected.
For the full list of errors see the ERRORS section in mmap(2).
The pr_mmap
() function will fail if:
ENOSYS
See LOCKING in libproc(3LIB).
November 27, 2023 | OmniOS |