Package Details: interception-tools 0.2.1-1

Git Clone URL: https://aur.archlinux.org/interception-tools.git (read-only, click to copy)
Package Base: interception-tools
Description: A minimal composable infrastructure on top of libudev and libevdev
Upstream URL: https://gitlab.com/interception/linux/tools
Licenses: GPL3
Submitter: pepper_chico
Maintainer: pepper_chico
Last Packager: pepper_chico
Votes: 17
Popularity: 0.75
First Submitted: 2017-07-25 22:55
Last Updated: 2020-05-30 20:52

Latest Comments

1 2 3 Next › Last »

rharish commented on 2020-08-14 09:14

Hello, I was able to build and run this (and also interception-caps2esc) successfully on a laptop with the 'pentium4' architecture. Maybe you should test it out for this and the 'i686' architecture and add them to the PKGBUILD if they work.

brab commented on 2020-06-18 06:47

@pepper_chico. That was it, thanks a lot! I cleaned up the caches and all is well now. Sorry for the noise.

pepper_chico commented on 2020-06-18 00:53

@brab it is. Check artifacts on your cache, there was a problem with version bump that may be affected by some helper's cache. Clean and try again.

Just installed with yay without problems.

brab commented on 2020-06-17 15:48

Latest version does not seem valid:

==> Making package: interception-tools 0.2.1-1 (Wed 17 Jun 2020 05:47:45 PM CEST)
==> Retrieving sources...
  -> Found interception-tools.tar.gz
  -> Found udevmon.service
==> Validating source files with sha256sums...
    interception-tools.tar.gz ... FAILED
    udevmon.service ... Passed
==> ERROR: One or more files did not pass the validity check!
error downloading sources: interception-tools

Tofu_Bone commented on 2020-04-24 19:03

Some problem with yaml.cpp:

sudo udevmon -c /etc/udevmon.yaml
[sudo] password for yat:
an exception occurred: "yaml-cpp: error at line 2, column 5: end of map not found"

vidaru commented on 2019-10-02 22:06

Tried it again this evening and it's working. I also restarted my computer, killed udevmon and rm'd my clone dir before reinstalling/rebuilding.

Thanks @pepper_chico

pepper_chico commented on 2019-10-02 15:35

@vidaru, I can't reproduce after rebuilt. I use it daily.

vidaru commented on 2019-10-02 12:04

Same issue as @avrelaun experiencing. Downgrading yaml-cpp to 0.6.2-1 fixed for me as well (tried removing and reinstalling interception-tools but didn't resolve for me).

kernel: traps: udevmon[4549] general protection fault ip:7fe663cfdf50 sp:7fff4abf2558 error:0 in libyaml-cpp.so.0.6.3[7fe663ce0000+3d000]
systemd[1]: Created slice system-systemd\x2dcoredump.slice.
systemd[1]: Started Process Core Dump (PID 4551/UID 0).
systemd[1]: udevmon.service: Main process exited, code=dumped, status=11/SEGV
systemd[1]: udevmon.service: Failed with result 'core-dump'.
systemd-coredump[4552]: Process 4549 (udevmon) of user 0 dumped core.

                                               Stack trace of thread 4549:
                                               #0  0x00007fe663cfdf50 _ZN4YAML6detail9node_data5beginEv (libyaml-cpp.so.0.6)
                                               #1  0x000055d712c140a9 main (udevmon)
                                               #2  0x00007fe66392cee3 __libc_start_main (libc.so.6)
                                               #3  0x000055d712c1483e _start (udevmon)

pepper_chico commented on 2019-10-01 17:29

@avrelaun: just reinstall.

crashandburn4 commented on 2019-10-01 13:08

You can just reinstall interception-tools due to the updated libyaml.