vimpostor / copycat

A library for intercepting system calls

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

README not helpful

sam9032 opened this issue · comments

commented

Hi there

I know you just started with the repo, but it would be nice if the readme was more helpful! So unfortunately I don't understand why this project eats up Github space.

Best
Sam

Hi Sam, thanks for your interest in this project.

This project is meant to provide an easily usable library for overwriting system calls.

For example consider a program called weird-program that uses a hardcoded config path and opens it at runtime, let's say that config is /etc/config. Now suppose that you want it to use another config file and don't have much time on your hand and don't like beating around the bush, so you absolutely don't want to edit the source code of that program and recompile it.
Instead with this library you can now do the following:

# Note that the syntax will probably change in the future
COPYCAT="/etc/config $HOME/.new-local-config" copycat -- weird-program

Tada, weird-program will now successfully use your new local config despite the hardcoded config and completely without recompiling. 🥳

The way that this is implemented at the moment, is by intercepting the openat() system call using LD_PRELOAD and dlsym(). This has effectively no performance impact but the disadvantage is that it will not work with all binaries (e.g. not with statically linked binaries).

To make this work for all binaries, I intend to implement optional ptrace support in the future, which would also work for static binaries, but would be much slower (much like running the binary through a debugger).

If you'd like to test it out, you can install the copycat-git package from the AUR.

I will keep this issue open for now as a reminder to add a proper README, thanks!

commented

Thank you so much for this unexpected but helpful answer!