You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Summary
- Always use seccomp in fspy to infer inputs
- Add a dedicated `test-musl` CI job that runs the full test suite
against `x86_64-unknown-linux-musl`
https://claude.ai/code/session_01Cqj3gbQjb7yFe49f1tfwYv
---------
Co-authored-by: Claude <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: crates/fspy/README.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
Run a command and capture all the paths it tries to access.
4
4
5
-
## macOS/Linux implementation
5
+
## macOS/Linux (glibc) implementation
6
6
7
7
It uses `DYLD_INSERT_LIBRARIES` on macOS and `LD_PRELOAD` on Linux to inject a shared library that intercepts file system calls.
8
8
The injection process is almost identical on both platforms other than the environment variable name. The implementation is in `src/unix`.
@@ -11,6 +11,10 @@ The injection process is almost identical on both platforms other than the envir
11
11
12
12
For fully static binaries (such as `esbuild`), `LD_PRELOAD` does not work. In this case, `seccomp_unotify` is used to intercept direct system calls. The handler is implemented in `src/unix/syscall_handler`.
13
13
14
+
## Linux musl implementation
15
+
16
+
On musl targets, only `seccomp_unotify`-based tracking is used (no preload library).
17
+
14
18
## Windows implementation
15
19
16
20
It uses [Detours](https://github.com/microsoft/Detours) to intercept file system calls. The implementation is in `src/windows`.
0 commit comments