|author||Jay Zhuang <firstname.lastname@example.org>||Tue Apr 19 08:52:11 2022 +0800|
|committer||Jay Zhuang <email@example.com>||Tue Apr 19 18:11:29 2022 +0800|
Use mkstemp instead of tmpnam tmpname is unsafe and triggers compiler warnings. Change-Id: Ifd494fd22a28655f66765b1d02f6030e69fd1433
This tool injects code into other applications in order to trace file accesses.
This can be useful for things like build systems, since it allows to automatically generate dependencies in a toolchain-agnostic way or to ensure declared dependencies match the real ones.
On Unix, type
make to generate the
fsatrace executable and the
fsatrace.so shared library.
On Windows, you'll need recent 64-bit and 32-bit versions of
mingw. You can either adapt the
Makefile to point to your compilers or, alternatively, install https://github.com/commercialhaskell/stack and run the following sequence to get the required compilers:
stack setup --resolver ghc-8.6.5 --arch=x86_64 stack setup --resolver ghc-8.6.5 --arch=i386 stack exec -- pacman -S make
After that, invoke:
stack exec -- make
That should generate
Make sure the .dll or .so files are in the same path as the
fsatrace executable and run:
fsatrace <options> <output-file> -- <command>
Options is a combination of the following characters:
v: print args vector
r: dump read operations
w: dump write operations
m: dump file move operations
d: dump file delete operations
q: dump file stat operations
t: dump touch operations
FSAT_BUF_SIZE: when set, overwrites size of buffer for trace output.
In order to use
fsatrace on systems newer than OS X 10.10, System Integrity Protection must be disabled as detailed in https://developer.apple.com/library/content/documentation/Security/Conceptual/System_Integrity_Protection_Guide/ConfiguringSystemIntegrityProtection/ConfiguringSystemIntegrityProtection.html
Use at your own risk!
Newline-separated sequence with the following possibilities: