From owner-freebsd-hackers Thu Jan 15 19:45:10 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA18907 for hackers-outgoing; Thu, 15 Jan 1998 19:45:10 -0800 (PST) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from teel.info-noire.com (XP11-1-4-10.interlinx.qc.ca [207.253.79.90]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA18868 for ; Thu, 15 Jan 1998 19:44:50 -0800 (PST) (envelope-from alex@gel.usherb.ca) Received: from localhost (alex@localhost) by teel.info-noire.com (8.8.8/8.8.8) with SMTP id WAA11876 for ; Thu, 15 Jan 1998 22:52:33 -0500 (EST) (envelope-from alex@teel.info-noire.com) Date: Thu, 15 Jan 1998 22:52:33 -0500 (EST) From: Alex Boisvert Reply-To: boia01@gel.usherb.ca To: freebsd-hackers@FreeBSD.ORG Subject: procfs: intercept calls? Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk I've just read in a USENIX abstract that it's possible "to intercept specific system calls" with the /proc filesystem, and service the call with a user-level program. Is this feasible on FreeBSD? I've just read the procfs man page a few times and can't see any mention about this. I suppose that one doesn't manually overwrite the process' text segment where the syscalls are made... Maybe it's source-code documented? ;-) Alex.