[PATCH] Added syscall_intercept.

OpenSubmitted by Gerd Heber.
Details
One participant
  • Gerd Heber
Owner
unassigned
Severity
normal
G
G
Gerd Heber wrote on 21 Feb 23:42 +0100
(address . guix-patches@gnu.org)(name . Gerd Heber)(address . gheber@hdfgroup.org)
20210221224210.6557-1-gheber@hdfgroup.org
--- gnu/packages/engineering.scm | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+)
Toggle diff (42 lines)diff --git a/gnu/packages/engineering.scm b/gnu/packages/engineering.scmindex 034dabc3f9..626338b868 100644--- a/gnu/packages/engineering.scm+++ b/gnu/packages/engineering.scm@@ -2996,3 +2996,35 @@ and drilling of PCBs. It takes Gerber files as input and outputs G-code files for the milling of PCBs. It also includes an autoleveller for the automatic dynamic calibration of the milling depth.") (license license:gpl3+)))++(define-public syscall_intercept+ (package+ (name "syscall_intercept")+ (version "0.1.0")+ (source+ (origin+ (method git-fetch)+ (uri+ (git-reference+ (url "https://github.com/pmem/syscall_intercept/")+ (commit "304404581c57d43478438d175099d20260bae74e")))+ (file-name (git-file-name name version))+ (sha256+ (base32+ "17sw78xp5wjzv25adpbq3khl8fi0avj7bgpi57q3jnvl3c68xy5z"))))+ (inputs+ `(("capstone" ,capstone)))+ (native-inputs+ `(("perl" ,perl)+ ("pkg-config" ,pkg-config)))+ (build-system cmake-build-system)+ (arguments+ `(#:build-type "Release"+ #:tests? #f))+ (synopsis "The system call intercepting library")+ (description "The system call intercepting library provides a low-level+interface for hooking Linux system calls in user space. This is achieved by+hotpatching the machine code of the standard C library in the memory of a+process.")+ (home-page "https://github.com/pmem/syscall_intercept")+ (license license:bsd-2)))-- 2.30.1
?