GNU bug report logs - #46698
[PATCH] Added syscall_intercept.

Previous Next

Package: guix-patches;

Reported by: Gerd Heber <gerd.heber <at> gmail.com>

Date: Mon, 22 Feb 2021 02:40:03 UTC

Severity: normal

Tags: patch

Done: Nicolas Goaziou <mail <at> nicolasgoaziou.fr>

Bug is archived. No further changes may be made.

To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 46698 in the body.
You can then email your comments to 46698 AT debbugs.gnu.org in the normal way.

Toggle the display of automated, internal messages from the tracker.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to guix-patches <at> gnu.org:
bug#46698; Package guix-patches. (Mon, 22 Feb 2021 02:40:03 GMT) Full text and rfc822 format available.

Acknowledgement sent to Gerd Heber <gerd.heber <at> gmail.com>:
New bug report received and forwarded. Copy sent to guix-patches <at> gnu.org. (Mon, 22 Feb 2021 02:40:03 GMT) Full text and rfc822 format available.

Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):

From: Gerd Heber <gerd.heber <at> gmail.com>
To: guix-patches <at> gnu.org
Cc: Gerd Heber <gheber <at> hdfgroup.org>
Subject: [PATCH] Added syscall_intercept.
Date: Sun, 21 Feb 2021 16:42:10 -0600
---
 gnu/packages/engineering.scm | 32 ++++++++++++++++++++++++++++++++
 1 file changed, 32 insertions(+)

diff --git a/gnu/packages/engineering.scm b/gnu/packages/engineering.scm
index 034dabc3f9..626338b868 100644
--- a/gnu/packages/engineering.scm
+++ b/gnu/packages/engineering.scm
@@ -2996,3 +2996,35 @@ and drilling of PCBs.  It takes Gerber files as input and outputs G-code files
 for the milling of PCBs.  It also includes an autoleveller for the automatic
 dynamic calibration of the milling depth.")
      (license license:gpl3+)))
+
+(define-public syscall_intercept
+  (package
+   (name "syscall_intercept")
+   (version "0.1.0")
+   (source
+    (origin
+     (method git-fetch)
+     (uri
+      (git-reference
+       (url "https://github.com/pmem/syscall_intercept/")
+       (commit "304404581c57d43478438d175099d20260bae74e")))
+     (file-name (git-file-name name version))
+     (sha256
+      (base32
+       "17sw78xp5wjzv25adpbq3khl8fi0avj7bgpi57q3jnvl3c68xy5z"))))
+   (inputs
+    `(("capstone" ,capstone)))
+   (native-inputs
+     `(("perl" ,perl)
+       ("pkg-config" ,pkg-config)))
+   (build-system cmake-build-system)
+   (arguments
+    `(#:build-type "Release"
+      #:tests? #f))
+   (synopsis "The system call intercepting library")
+   (description "The system call intercepting library provides a low-level
+interface for hooking Linux system calls in user space. This is achieved by
+hotpatching the machine code of the standard C library in the memory of a
+process.")
+   (home-page "https://github.com/pmem/syscall_intercept")
+   (license license:bsd-2)))
-- 
2.30.1





Reply sent to Nicolas Goaziou <mail <at> nicolasgoaziou.fr>:
You have taken responsibility. (Sat, 13 Mar 2021 14:15:02 GMT) Full text and rfc822 format available.

Notification sent to Gerd Heber <gerd.heber <at> gmail.com>:
bug acknowledged by developer. (Sat, 13 Mar 2021 14:15:02 GMT) Full text and rfc822 format available.

Message #10 received at 46698-done <at> debbugs.gnu.org (full text, mbox):

From: Nicolas Goaziou <mail <at> nicolasgoaziou.fr>
To: Gerd Heber <gerd.heber <at> gmail.com>
Cc: Gerd Heber <gheber <at> hdfgroup.org>, 46698-done <at> debbugs.gnu.org
Subject: Re: [bug#46698] [PATCH] Added syscall_intercept.
Date: Sat, 13 Mar 2021 15:14:05 +0100
Hello,

Gerd Heber <gerd.heber <at> gmail.com> writes:

> +(define-public syscall_intercept

Thank you.

I added a comment explaining why we are using a specific untagged
commit, and another one explaining there is currently a test failing.

I also added a copyright line for you and a proper commit message.

Note that I renamed the package as syscall-intercept, as we usually do
not use underscore in package names.

Regards,
-- 
Nicolas Goaziou




bug archived. Request was from Debbugs Internal Request <help-debbugs <at> gnu.org> to internal_control <at> debbugs.gnu.org. (Sun, 11 Apr 2021 11:24:09 GMT) Full text and rfc822 format available.

This bug report was last modified 3 years and 13 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.