PR_MMAP(3PROC) Process Control Library Functions PR_MMAP(3PROC)
pr_mmap - inject mmap system call into victim process
Process Control Library (libproc, -lproc)
#include <libproc.h>
int
pr_mmap(struct ps_prochandle *P, void *addr, size_t len, int prot,
int flags, int fd, off_t off);
The pr_mmap() function injects the mmap(2) system call into the target
process P by means of the agent LWP. If the process handle P is the
value NULL then this will be equivalent to calling mmap(2) on the
currently running process.
The arguments addr, len, prot, flags, fd, and off have the same meaning
as in mmap(2). See mmap(2) for the full description and purpose of the
mmap system call and its arguments.
The pr_mmap() function only works on active processes. Process handles
that correspond to core files, zombie processes, or ELF objects do not
support system call injection.
Upon successful completion, the pr_mmap() function's return value is
that described in mmap(2). Otherwise, -1 is returned and errno is set
to ENOSYS to indicate that the system call could not be injected.
For the full list of errors see the ERRORS section in mmap(2).
The pr_mmap() function will fail if:
ENOSYS An error occurred while trying to invoke the agent
LWP and inject a system call in the process handle P
or the process handle P does not support system call
injection.
Uncommitted
MT-LEVEL
See LOCKING in libproc(3LIB).
mmap(2), libproc(3LIB), proc(5)
illumos November 27, 2023 illumos
NAME
pr_mmap - inject mmap system call into victim process
LIBRARY
Process Control Library (libproc, -lproc)
SYNOPSIS
#include <libproc.h>
int
pr_mmap(struct ps_prochandle *P, void *addr, size_t len, int prot,
int flags, int fd, off_t off);
DESCRIPTION
The pr_mmap() function injects the mmap(2) system call into the target
process P by means of the agent LWP. If the process handle P is the
value NULL then this will be equivalent to calling mmap(2) on the
currently running process.
The arguments addr, len, prot, flags, fd, and off have the same meaning
as in mmap(2). See mmap(2) for the full description and purpose of the
mmap system call and its arguments.
The pr_mmap() function only works on active processes. Process handles
that correspond to core files, zombie processes, or ELF objects do not
support system call injection.
RETURN VALUES
Upon successful completion, the pr_mmap() function's return value is
that described in mmap(2). Otherwise, -1 is returned and errno is set
to ENOSYS to indicate that the system call could not be injected.
ERRORS
For the full list of errors see the ERRORS section in mmap(2).
The pr_mmap() function will fail if:
ENOSYS An error occurred while trying to invoke the agent
LWP and inject a system call in the process handle P
or the process handle P does not support system call
injection.
INTERFACE STABILITY
Uncommitted
MT-LEVEL
See LOCKING in libproc(3LIB).
SEE ALSO
mmap(2), libproc(3LIB), proc(5)
illumos November 27, 2023 illumos