emacs-bug-tracker
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

bug#46698: closed ([PATCH] Added syscall_intercept.)


From: GNU bug Tracking System
Subject: bug#46698: closed ([PATCH] Added syscall_intercept.)
Date: Sat, 13 Mar 2021 14:15:02 +0000

Your message dated Sat, 13 Mar 2021 15:14:05 +0100
with message-id <87ft0zw382.fsf@nicolasgoaziou.fr>
and subject line Re: [bug#46698] [PATCH] Added syscall_intercept.
has caused the debbugs.gnu.org bug report #46698,
regarding [PATCH] Added syscall_intercept.
to be marked as done.

(If you believe you have received this mail in error, please contact
help-debbugs@gnu.org.)


-- 
46698: http://debbugs.gnu.org/cgi/bugreport.cgi?bug=46698
GNU Bug Tracking System
Contact help-debbugs@gnu.org with problems
--- Begin Message --- Subject: [PATCH] Added syscall_intercept. Date: Sun, 21 Feb 2021 16:42:10 -0600
---
 gnu/packages/engineering.scm | 32 ++++++++++++++++++++++++++++++++
 1 file changed, 32 insertions(+)

diff --git a/gnu/packages/engineering.scm b/gnu/packages/engineering.scm
index 034dabc3f9..626338b868 100644
--- a/gnu/packages/engineering.scm
+++ b/gnu/packages/engineering.scm
@@ -2996,3 +2996,35 @@ and drilling of PCBs.  It takes Gerber files as input 
and outputs G-code files
 for the milling of PCBs.  It also includes an autoleveller for the automatic
 dynamic calibration of the milling depth.")
      (license license:gpl3+)))
+
+(define-public syscall_intercept
+  (package
+   (name "syscall_intercept")
+   (version "0.1.0")
+   (source
+    (origin
+     (method git-fetch)
+     (uri
+      (git-reference
+       (url "https://github.com/pmem/syscall_intercept/";)
+       (commit "304404581c57d43478438d175099d20260bae74e")))
+     (file-name (git-file-name name version))
+     (sha256
+      (base32
+       "17sw78xp5wjzv25adpbq3khl8fi0avj7bgpi57q3jnvl3c68xy5z"))))
+   (inputs
+    `(("capstone" ,capstone)))
+   (native-inputs
+     `(("perl" ,perl)
+       ("pkg-config" ,pkg-config)))
+   (build-system cmake-build-system)
+   (arguments
+    `(#:build-type "Release"
+      #:tests? #f))
+   (synopsis "The system call intercepting library")
+   (description "The system call intercepting library provides a low-level
+interface for hooking Linux system calls in user space. This is achieved by
+hotpatching the machine code of the standard C library in the memory of a
+process.")
+   (home-page "https://github.com/pmem/syscall_intercept";)
+   (license license:bsd-2)))
-- 
2.30.1




--- End Message ---
--- Begin Message --- Subject: Re: [bug#46698] [PATCH] Added syscall_intercept. Date: Sat, 13 Mar 2021 15:14:05 +0100 User-agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Hello,

Gerd Heber <gerd.heber@gmail.com> writes:

> +(define-public syscall_intercept

Thank you.

I added a comment explaining why we are using a specific untagged
commit, and another one explaining there is currently a test failing.

I also added a copyright line for you and a proper commit message.

Note that I renamed the package as syscall-intercept, as we usually do
not use underscore in package names.

Regards,
-- 
Nicolas Goaziou


--- End Message ---

reply via email to

[Prev in Thread] Current Thread [Next in Thread]