unofficial mirror of guix-patches@gnu.org 
 help / color / mirror / code / Atom feed
* [bug#46698] [PATCH] Added syscall_intercept.
@ 2021-02-21 22:42 Gerd Heber
  2021-03-13 14:14 ` bug#46698: " Nicolas Goaziou
  0 siblings, 1 reply; 2+ messages in thread
From: Gerd Heber @ 2021-02-21 22:42 UTC (permalink / raw)
  To: 46698; +Cc: Gerd Heber

---
 gnu/packages/engineering.scm | 32 ++++++++++++++++++++++++++++++++
 1 file changed, 32 insertions(+)

diff --git a/gnu/packages/engineering.scm b/gnu/packages/engineering.scm
index 034dabc3f9..626338b868 100644
--- a/gnu/packages/engineering.scm
+++ b/gnu/packages/engineering.scm
@@ -2996,3 +2996,35 @@ and drilling of PCBs.  It takes Gerber files as input and outputs G-code files
 for the milling of PCBs.  It also includes an autoleveller for the automatic
 dynamic calibration of the milling depth.")
      (license license:gpl3+)))
+
+(define-public syscall_intercept
+  (package
+   (name "syscall_intercept")
+   (version "0.1.0")
+   (source
+    (origin
+     (method git-fetch)
+     (uri
+      (git-reference
+       (url "https://github.com/pmem/syscall_intercept/")
+       (commit "304404581c57d43478438d175099d20260bae74e")))
+     (file-name (git-file-name name version))
+     (sha256
+      (base32
+       "17sw78xp5wjzv25adpbq3khl8fi0avj7bgpi57q3jnvl3c68xy5z"))))
+   (inputs
+    `(("capstone" ,capstone)))
+   (native-inputs
+     `(("perl" ,perl)
+       ("pkg-config" ,pkg-config)))
+   (build-system cmake-build-system)
+   (arguments
+    `(#:build-type "Release"
+      #:tests? #f))
+   (synopsis "The system call intercepting library")
+   (description "The system call intercepting library provides a low-level
+interface for hooking Linux system calls in user space. This is achieved by
+hotpatching the machine code of the standard C library in the memory of a
+process.")
+   (home-page "https://github.com/pmem/syscall_intercept")
+   (license license:bsd-2)))
-- 
2.30.1





^ permalink raw reply related	[flat|nested] 2+ messages in thread

* bug#46698: [PATCH] Added syscall_intercept.
  2021-02-21 22:42 [bug#46698] [PATCH] Added syscall_intercept Gerd Heber
@ 2021-03-13 14:14 ` Nicolas Goaziou
  0 siblings, 0 replies; 2+ messages in thread
From: Nicolas Goaziou @ 2021-03-13 14:14 UTC (permalink / raw)
  To: Gerd Heber; +Cc: Gerd Heber, 46698-done

Hello,

Gerd Heber <gerd.heber@gmail.com> writes:

> +(define-public syscall_intercept

Thank you.

I added a comment explaining why we are using a specific untagged
commit, and another one explaining there is currently a test failing.

I also added a copyright line for you and a proper commit message.

Note that I renamed the package as syscall-intercept, as we usually do
not use underscore in package names.

Regards,
-- 
Nicolas Goaziou




^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-03-13 14:15 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-02-21 22:42 [bug#46698] [PATCH] Added syscall_intercept Gerd Heber
2021-03-13 14:14 ` bug#46698: " Nicolas Goaziou

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).