|author||Jorge Acereda <firstname.lastname@example.org>||Sat Apr 06 23:46:47 2019 +0200|
|committer||Jorge Acereda <email@example.com>||Sat Apr 06 23:46:47 2019 +0200|
Blind attempt at fixing #23
This tool injects code into other applications in order to trace file accesses.
This can be useful for things like build systems, since it allows to automatically generate dependencies in a toolchain-agnostic way or to ensure declared dependencies match the real ones.
On Unix, type
make to generate the
fsatrace executable and the
fsatrace.so shared library.
On Windows, you'll need recent 64-bit and 32-bit versions of
mingw. You can either adapt the
Makefile to point to your compilers or, alternatively, install https://github.com/commercialhaskell/stack and run the following sequence to get the required compilers:
stack setup 8.0.2 --arch=i386 stack setup 8.0.2 --arch=x86_64 stack exec -- pacman -S make
After that, invoke:
stack exec -- make
That should generate
Make sure the .dll or .so files are in the same path as the
fsatrace executable and run:
fsatrace <options> <output-file> -- <command>
Options is a combination of the following characters:
v: print args vector
r: dump read operations
w: dump write operations
m: dump file move operations
d: dump file delete operations
q: dump file stat operations
t: dump touch operations
In order to use
fsatrace on systems newer than OS X 10.10, System Integrity Protection must be disabled as detailed in https://developer.apple.com/library/content/documentation/Security/Conceptual/System_Integrity_Protection_Guide/ConfiguringSystemIntegrityProtection/ConfiguringSystemIntegrityProtection.html
Use at your own risk!
Newline-separated sequence with the following possibilities: