Analyzes strace output.
Pre-built packages can be downloaded from the GitHub releases page.
build dependencies:
bash
git clone https://github.com/wookietreiber/strace-analyzer.git
cd strace-analyzer
cargo build --release
install -Dm755 target/release/strace-analyzer ~/bin/strace-analyzer
Create logs:
bash
strace -s 0 -ff -o cmd.strace cmd
Analyze logs, with xxx
being the first process ID, the analysis will follow
forked processes automatically:
strace-analyzer cmd.strace.xxx
If you think of a new (possibly high-level) analysis use case or how to improve an existing one, please [open an issue][newissue]. If you have an idea on how the output should look like, feel free to include a sketch of an example.
If you recognize missing file associations in the output, i.e. bare file descriptor numbers without a note as to why it could not be identified, please [open an issue][newissue] and provide access to that particular, complete strace log, so I am able to identify the problem.
If you know that a particular file should be included, because you know that file has been opened, it would be of great help if you would name these files in the issue.
In the spirit of the Unix philosohpy of do one thing and do it well, strace-analyzer will not do any of the following:
filtering, use tools like grep or awk, e.g.:
bash
strace-analyzer cmd.strace.1835 | grep pattern
strace-analyzer cmd.strace.1835 | awk '/pattern/'
sorting, use the sort command line utility, e.g.:
bash
strace-analyzer cmd.strace.27049 | sort -k9
pretty tabular output, use the column command line utility, e.g.:
bash
strace-analyzer read strace.log.27049 | column -t