PR_MMAP(3PROC) Process Control Library Functions PR_MMAP(3PROC)

pr_mmap
inject mmap system call into victim process

Process Control Library (libproc, -lproc)
#include <libproc.h>

int
pr_mmap(struct ps_prochandle *P, void *addr, size_t len, int prot, int flags, int fd, off_t off);

The pr_mmap() function injects the mmap(2) system call into the target process P by means of the agent LWP. If the process handle P is the value NULL then this will be equivalent to calling mmap(2) on the currently running process.

The arguments addr, len, prot, flags, fd, and off have the same meaning as in mmap(2). See mmap(2) for the full description and purpose of the mmap system call and its arguments.

The pr_mmap() function only works on active processes. Process handles that correspond to core files, zombie processes, or ELF objects do not support system call injection.

Upon successful completion, the pr_mmap() function's return value is that described in mmap(2). Otherwise, -1 is returned and errno is set to ENOSYS to indicate that the system call could not be injected.

For the full list of errors see the ERRORS section in mmap(2).

The pr_mmap() function will fail if:

An error occurred while trying to invoke the agent LWP and inject a system call in the process handle P or the process handle P does not support system call injection.

Uncommitted

See LOCKING in libproc(3LIB).

mmap(2), libproc(3LIB), proc(5)
May 11, 2016 OmniOS