GNU bug report logs -
#46698
[PATCH] Added syscall_intercept.
Previous Next
Reported by: Gerd Heber <gerd.heber <at> gmail.com>
Date: Mon, 22 Feb 2021 02:40:03 UTC
Severity: normal
Tags: patch
Done: Nicolas Goaziou <mail <at> nicolasgoaziou.fr>
Bug is archived. No further changes may be made.
To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 46698 in the body.
You can then email your comments to 46698 AT debbugs.gnu.org in the normal way.
Toggle the display of automated, internal messages from the tracker.
Report forwarded
to
guix-patches <at> gnu.org
:
bug#46698
; Package
guix-patches
.
(Mon, 22 Feb 2021 02:40:03 GMT)
Full text and
rfc822 format available.
Acknowledgement sent
to
Gerd Heber <gerd.heber <at> gmail.com>
:
New bug report received and forwarded. Copy sent to
guix-patches <at> gnu.org
.
(Mon, 22 Feb 2021 02:40:03 GMT)
Full text and
rfc822 format available.
Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):
---
gnu/packages/engineering.scm | 32 ++++++++++++++++++++++++++++++++
1 file changed, 32 insertions(+)
diff --git a/gnu/packages/engineering.scm b/gnu/packages/engineering.scm
index 034dabc3f9..626338b868 100644
--- a/gnu/packages/engineering.scm
+++ b/gnu/packages/engineering.scm
@@ -2996,3 +2996,35 @@ and drilling of PCBs. It takes Gerber files as input and outputs G-code files
for the milling of PCBs. It also includes an autoleveller for the automatic
dynamic calibration of the milling depth.")
(license license:gpl3+)))
+
+(define-public syscall_intercept
+ (package
+ (name "syscall_intercept")
+ (version "0.1.0")
+ (source
+ (origin
+ (method git-fetch)
+ (uri
+ (git-reference
+ (url "https://github.com/pmem/syscall_intercept/")
+ (commit "304404581c57d43478438d175099d20260bae74e")))
+ (file-name (git-file-name name version))
+ (sha256
+ (base32
+ "17sw78xp5wjzv25adpbq3khl8fi0avj7bgpi57q3jnvl3c68xy5z"))))
+ (inputs
+ `(("capstone" ,capstone)))
+ (native-inputs
+ `(("perl" ,perl)
+ ("pkg-config" ,pkg-config)))
+ (build-system cmake-build-system)
+ (arguments
+ `(#:build-type "Release"
+ #:tests? #f))
+ (synopsis "The system call intercepting library")
+ (description "The system call intercepting library provides a low-level
+interface for hooking Linux system calls in user space. This is achieved by
+hotpatching the machine code of the standard C library in the memory of a
+process.")
+ (home-page "https://github.com/pmem/syscall_intercept")
+ (license license:bsd-2)))
--
2.30.1
Reply sent
to
Nicolas Goaziou <mail <at> nicolasgoaziou.fr>
:
You have taken responsibility.
(Sat, 13 Mar 2021 14:15:02 GMT)
Full text and
rfc822 format available.
Notification sent
to
Gerd Heber <gerd.heber <at> gmail.com>
:
bug acknowledged by developer.
(Sat, 13 Mar 2021 14:15:02 GMT)
Full text and
rfc822 format available.
Message #10 received at 46698-done <at> debbugs.gnu.org (full text, mbox):
Hello,
Gerd Heber <gerd.heber <at> gmail.com> writes:
> +(define-public syscall_intercept
Thank you.
I added a comment explaining why we are using a specific untagged
commit, and another one explaining there is currently a test failing.
I also added a copyright line for you and a proper commit message.
Note that I renamed the package as syscall-intercept, as we usually do
not use underscore in package names.
Regards,
--
Nicolas Goaziou
bug archived.
Request was from
Debbugs Internal Request <help-debbugs <at> gnu.org>
to
internal_control <at> debbugs.gnu.org
.
(Sun, 11 Apr 2021 11:24:09 GMT)
Full text and
rfc822 format available.
This bug report was last modified 3 years and 13 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.