Example tools built on top of Reverie.
Copying one of these examples is the recommended way to get started using Reverie.
This tool is like strace
, but generates a trace file that can be loaded in
chrome://tracing/
.
This is a basic example of event counting. It counts the number of system calls and reports that single integer at exit.
This version of tool uses a single, centralized piece of global state.
This is a basic example of event counting. This tool counts the number of system calls and reports that single integer at exit.
This implementation of the tool uses a distributed notion of state, maintaining a per-thread, per-process, and global state. Basically, this is an example of "MapReduce" style tracing of a process tree.
This instrumentation tool intercepts events but does nothing with them. It is useful for observing the overhead of interception, and as a starting point.
This example tool intercepts write events on stdout and stderr and manipulates either when those outputs are released, or the scheduling order that determines the order of printed output.
This instrumentation tool simply echos intercepted events, like strace.
This tool is meant to emulate a pathological kernel where:
read
andrecvfrom
calls return only one byte at a time. This is intended to catch errors in parsers that assume multiple bytes will be returned at a time.EINTR
is returned instead of running the real syscall for every other read.