guix-patches
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[bug#46698] [PATCH] Added syscall_intercept.


From: Gerd Heber
Subject: [bug#46698] [PATCH] Added syscall_intercept.
Date: Sun, 21 Feb 2021 16:42:10 -0600

---
 gnu/packages/engineering.scm | 32 ++++++++++++++++++++++++++++++++
 1 file changed, 32 insertions(+)

diff --git a/gnu/packages/engineering.scm b/gnu/packages/engineering.scm
index 034dabc3f9..626338b868 100644
--- a/gnu/packages/engineering.scm
+++ b/gnu/packages/engineering.scm
@@ -2996,3 +2996,35 @@ and drilling of PCBs.  It takes Gerber files as input 
and outputs G-code files
 for the milling of PCBs.  It also includes an autoleveller for the automatic
 dynamic calibration of the milling depth.")
      (license license:gpl3+)))
+
+(define-public syscall_intercept
+  (package
+   (name "syscall_intercept")
+   (version "0.1.0")
+   (source
+    (origin
+     (method git-fetch)
+     (uri
+      (git-reference
+       (url "https://github.com/pmem/syscall_intercept/";)
+       (commit "304404581c57d43478438d175099d20260bae74e")))
+     (file-name (git-file-name name version))
+     (sha256
+      (base32
+       "17sw78xp5wjzv25adpbq3khl8fi0avj7bgpi57q3jnvl3c68xy5z"))))
+   (inputs
+    `(("capstone" ,capstone)))
+   (native-inputs
+     `(("perl" ,perl)
+       ("pkg-config" ,pkg-config)))
+   (build-system cmake-build-system)
+   (arguments
+    `(#:build-type "Release"
+      #:tests? #f))
+   (synopsis "The system call intercepting library")
+   (description "The system call intercepting library provides a low-level
+interface for hooking Linux system calls in user space. This is achieved by
+hotpatching the machine code of the standard C library in the memory of a
+process.")
+   (home-page "https://github.com/pmem/syscall_intercept";)
+   (license license:bsd-2)))
-- 
2.30.1






reply via email to

[Prev in Thread] Current Thread [Next in Thread]