PR_MUNMAP(3PROC) Process Control Library Functions PR_MUNMAP(3PROC)

inject munmap system call into victim process

Process Control Library (libproc, -lproc)
#include <libproc.h>

pr_munmap(struct ps_prochandle *P, void *addr, size_t len);

The pr_munmap() function injects the munmap(2) system call into the target process P by means of the agent LWP. If the process handle P is the value NULL then this will be equivalent to calling munmap(2) on the currently running process.

The arguments addr and len have the same meaning as in munmap(2). See munmap(2) for the full description and purpose of the munmap system call and its arguments.

The pr_munmap() function only works on active processes. Process handles that correspond to core files, zombie processes, or ELF objects do not support system call injection.

Upon successful completion, the pr_munmap() function's return value is that described in munmap(2). Otherwise, -1 is returned and errno is set to ENOSYS to indicate that the system call could not be injected.

For the full list of errors see the ERRORS section in munmap(2).

The pr_munmap() function will fail if:

An error occurred while trying to invoke the agent LWP and inject a system call in the process handle P or the process handle P does not support system call injection.


See LOCKING in libproc(3LIB).

munmap(2), libproc(3LIB), proc(5)
May 11, 2016 OmniOS