From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.3 required=3.0 tests=DKIM_ADSP_CUSTOM_MED, DKIM_INVALID,DKIM_SIGNED,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0BA92C43331 for ; Tue, 31 Mar 2020 07:33:10 +0000 (UTC) Received: from shelob.surriel.com (shelob.surriel.com [96.67.55.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B7EAD2072A for ; Tue, 31 Mar 2020 07:33:09 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="l3hZFSrh" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B7EAD2072A Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kernelnewbies-bounces@kernelnewbies.org Received: from localhost ([::1] helo=shelob.surriel.com) by shelob.surriel.com with esmtp (Exim 4.92.3) (envelope-from ) id 1jJBNn-0007cI-5D; Tue, 31 Mar 2020 03:32:23 -0400 Received: from mail-il1-x141.google.com ([2607:f8b0:4864:20::141]) by shelob.surriel.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92.3) (envelope-from ) id 1jJBNk-0007cC-GM for kernelnewbies@kernelnewbies.org; Tue, 31 Mar 2020 03:32:20 -0400 Received: by mail-il1-x141.google.com with SMTP id j9so18510941ilr.7 for ; Tue, 31 Mar 2020 00:32:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:reply-to:from:date:message-id:subject:to; bh=bikbVkgs+HN+eRBbEwet5AuBkpAFXmHOtSPUQgEGbCE=; b=l3hZFSrhdZzz3W7f+YSwOLw1m6dJGfKm/BOSBarhKmwrLbZztNtbqENJVA4MBjecOk oIW5+xRoJK5/HA5qGYFVGTI0hNTqAXPAmF+JnnSOs1Oh+lrU/RWxbt6NYeCFvAeAX8G4 Kz9oV7Nak6PeApf3Y2a+DTih1JNIWfUbugm4WCkjMnXJlm4HJbBBBCCc/F0sV5okGYlj U3X4gKaCqCzkryNvWDYckSWAT81IZZRKoO80qOeSX4MIB9UWdiHuDfIxHchWPslSRFuz Mq6j3lUS0D61B26QT6eehcsqT1Go4gBNeYPBT+mVde4QzikiXkdADBcZMILFd8yXib0g vz0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:from:date:message-id :subject:to; bh=bikbVkgs+HN+eRBbEwet5AuBkpAFXmHOtSPUQgEGbCE=; b=BGMbGmPFBdcuPL9ZQMGVaCIf0zrvpDxWj4XwqYdEksJ4/2XnR4dlnXNDCY62rVxDFr UGpjPE29EMpgMS+ONDByw57KVIBqzmXblYw/Q+gii//f1+EFIeQ9Gbqbd+yN/fnSs9My GmWmy73j3CDz0E+uzMNtH9RNLTZSToRs/PM8wNM/zZyKE9HBbygmY40HbH6l6lqe5E+M e9Wx5ooH8l5BFyhOtP/eUSZCvVyXWrCCtcFQAAxY0ub/4qEcFvjo/RcuclrT9ponDCGz X+oKn2zXQMw03euq8C+bQZ6A+C2O98pU7FCE5+MG4k2HjAX/EAdPTTiLS+3r/xnmlo42 rT0g== X-Gm-Message-State: ANhLgQ3jGimPqIM5WKr0zsD01JsAzfigwmftThHdT1e06qP7tuSNM9XC sD5aNGSMVXkXKWmDw6NOikMm57r+tyeb53H+1PyzUZgEkzc= X-Google-Smtp-Source: ADFU+vt4+wgjHIKOpFXiPChpXo/ZdhWH7uxJQrzouIURJbcesiBY5moCrPaoCJblGFMuPAjWcJCkjrEx7fvMOdns85k= X-Received: by 2002:a05:6e02:be7:: with SMTP id d7mr15628171ilu.238.1585639938242; Tue, 31 Mar 2020 00:32:18 -0700 (PDT) MIME-Version: 1.0 From: Jeffrey Walton Date: Tue, 31 Mar 2020 03:32:07 -0400 Message-ID: Subject: Monitor filesystem write to a specific directory? To: kernelnewbies X-BeenThere: kernelnewbies@kernelnewbies.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Learn about the Linux kernel List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: noloader@gmail.com Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: kernelnewbies-bounces@kernelnewbies.org Hi Everyone, I have some build scripts that allow me to install updated developer tools on older machines. It builds and installs tools like Git, Curl and Wget. It also builds dependencies. The scripts can handle about 80 packages. One of those scripts is building a package that is performing a wayward write during 'make install'. It is not using my specified --libdir; instead it appears to hard code ${prefix}/lib. The incorrect hard coded path breaks on Red Hat systems and Solaris. I need to determine the offender. On Windows I would use Process Monitor, run the programs and then filter the events. I'm trying to find a Linux equivalent but neither strace nor ltrace looks like an equivalent. For strace and ltrace it does not look like I can setup a filter and get the process name. How can I monitor filesystem writes to a specific directory? Thanks in advance. _______________________________________________ Kernelnewbies mailing list Kernelnewbies@kernelnewbies.org https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies