skills/arabelatso/skills-4-se/trace-collection-assistant

trace-collection-assistant

SKILL.md

Trace Collection Assistant

Overview

This skill helps collect, normalize, and structure execution traces produced by instrumented programs (strace, ltrace), making them suitable for downstream analysis such as debugging, reproduction, or verification. It converts raw trace output into structured JSON format and provides tools for filtering, cleaning, and extracting relevant information.

Quick Start

Basic Workflow

  1. Parse raw traces - Convert strace/ltrace output to JSON
  2. Filter and clean - Remove noise and focus on relevant calls
  3. Extract debug info - Identify errors, file operations, network activity

Example: Debugging with strace

# 1. Capture trace
strace -o trace.txt python buggy_program.py

# 2. Parse to JSON
python scripts/parse_strace.py trace.txt -o trace.json --pretty

# 3. Extract errors
python scripts/extract_debug_info.py trace.json --category errors --pretty

# 4. Filter to relevant operations
python scripts/filter_trace.py trace.json --error-only --remove-noise -o filtered.json --pretty

Example: Analyzing library calls with ltrace

# 1. Capture trace
ltrace -o trace.txt ./program

# 2. Parse to JSON
python scripts/parse_ltrace.py trace.txt -o trace.json --pretty

# 3. Analyze specific functions
python scripts/filter_trace.py trace.json --include-calls "malloc,free,strlen" --pretty

Core Operations

1. Parsing Traces

Convert raw trace output to normalized JSON format.

For strace:

python scripts/parse_strace.py <input_file> [--output <output_file>] [--pretty]

For ltrace:

python scripts/parse_ltrace.py <input_file> [--output <output_file>] [--pretty]

Both parsers produce the same normalized JSON structure (see references/json_schema.md for details).

2. Filtering Traces

Remove noise and focus on relevant operations.

Common filtering operations:

# Show only errors
python scripts/filter_trace.py trace.json --error-only --pretty

# Remove common noise syscalls
python scripts/filter_trace.py trace.json --remove-noise --pretty

# Include specific calls
python scripts/filter_trace.py trace.json --include-calls "open,read,write,close" --pretty

# Exclude specific calls
python scripts/filter_trace.py trace.json --exclude-calls "gettimeofday,clock_gettime" --pretty

# Filter by argument pattern
python scripts/filter_trace.py trace.json --arg-pattern "config.json" --pretty

# Combine filters
python scripts/filter_trace.py trace.json --error-only --remove-noise --arg-pattern "/etc" -o filtered.json --pretty

3. Extracting Debug Information

Extract structured information for specific analysis tasks.

Extract all debug info:

python scripts/extract_debug_info.py trace.json --pretty

Extract specific categories:

# File operations only
python scripts/extract_debug_info.py trace.json --category file --pretty

# Network operations only
python scripts/extract_debug_info.py trace.json --category network --pretty

# Process operations only
python scripts/extract_debug_info.py trace.json --category process --pretty

# Errors only
python scripts/extract_debug_info.py trace.json --category errors --pretty

Use Cases

Bug Debugging

When debugging a failing program:

  1. Parse the trace to JSON
  2. Extract all errors to identify failure points
  3. Filter to relevant operations around the error
  4. Analyze file/network/process operations for root cause

See references/analysis_guide.md for detailed debugging patterns.

Test Case Reproduction

When reproducing a bug:

  1. Parse the trace from the failing execution
  2. Extract file operations to identify input dependencies
  3. Filter to the minimal sequence of operations
  4. Use the structured trace to reconstruct the execution environment

See references/analysis_guide.md for reproduction workflows.

Reference Documentation

  • references/trace_formats.md - Detailed documentation on strace and ltrace output formats, common syscalls, error codes
  • references/json_schema.md - Schema for normalized JSON output format
  • references/analysis_guide.md - Comprehensive guide on using traces for debugging and reproduction, including common patterns

Output Format

All tools produce JSON output following the normalized schema:

{
  "trace_type": "strace",
  "source_file": "trace.txt",
  "total_calls": 1234,
  "traces": [
    {
      "syscall": "open",
      "arguments": ["\"/etc/passwd\"", "O_RDONLY"],
      "return_value": "3",
      "line_number": 42,
      "raw_line": "open(\"/etc/passwd\", O_RDONLY) = 3"
    }
  ]
}

See assets/schema_template.json for the complete JSON schema definition.

Tips

  • Use --pretty flag for human-readable JSON output
  • Use --remove-noise to filter out common irrelevant syscalls
  • Combine multiple filters for focused analysis
  • Check references/analysis_guide.md for common debugging patterns
  • The line_number field preserves execution order for sequence analysis
Weekly Installs
1
GitHub Stars
47
First Seen
12 days ago
Installed on
amp1
cline1
opencode1
cursor1
kimi-cli1
codex1