PR_MMAP(3PROC) Process Control Library Functions PR_MMAP(3PROC)

pr_mmapinject mmap system call into victim process

Process Control Library (libproc, -lproc)
#include <libproc.h>

pr_mmap(struct ps_prochandle *P, void *addr, size_t len, int prot, int flags, int fd, off_t off);

The () function injects the mmap(2) system call into the target process P by means of the agent LWP. If the process handle P is the value NULL then this will be equivalent to calling mmap(2) on the currently running process.

The arguments addr, len, prot, flags, fd, and off have the same meaning as in mmap(2). See mmap(2) for the full description and purpose of the system call and its arguments.

The () function only works on active processes. Process handles that correspond to core files, zombie processes, or ELF objects do not support system call injection.

Upon successful completion, the pr_mmap() function's return value is that described in mmap(2). Otherwise, is returned and is set to ENOSYS to indicate that the system call could not be injected.

For the full list of errors see the ERRORS section in mmap(2).

The pr_mmap() function will fail if:

An error occurred while trying to invoke the agent LWP and inject a system call in the process handle P or the process handle P does not support system call injection.

See in libproc(3LIB).

mmap(2), libproc(3LIB), proc(5)

May 11, 2016 OmniOS