diff options
Diffstat (limited to 'ipc/glue/Faulty.h')
-rw-r--r-- | ipc/glue/Faulty.h | 100 |
1 files changed, 100 insertions, 0 deletions
diff --git a/ipc/glue/Faulty.h b/ipc/glue/Faulty.h new file mode 100644 index 000000000..8afe86b06 --- /dev/null +++ b/ipc/glue/Faulty.h @@ -0,0 +1,100 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#ifndef mozilla_ipc_Faulty_h +#define mozilla_ipc_Faulty_h + +#include <set> +#include <string> +#include "nsDebug.h" +#include "base/string16.h" +#include "base/singleton.h" + +#define FAULTY_DEFAULT_PROBABILITY 1000 +#define FAULTY_LOG(fmt, args...) \ + if (mozilla::ipc::Faulty::IsLoggingEnabled()) { \ + printf_stderr("[Faulty] " fmt "\n", ## args); \ + } + +namespace IPC { + // Needed for blacklisting messages. + class Message; +} + +namespace mozilla { +namespace ipc { + +class Faulty +{ + public: + // Used as a default argument for the Fuzz|datatype| methods. + static const unsigned int sDefaultProbability; + + static unsigned int DefaultProbability(void); + static bool Logging(void); + static bool IsLoggingEnabled(void) { return sIsLoggingEnabled; } + + void FuzzBool(bool* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzChar(char* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzUChar(unsigned char* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzInt16(int16_t* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzUInt16(uint16_t* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzInt(int* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzUInt32(uint32_t* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzLong(long* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzULong(unsigned long* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzInt64(int64_t* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzUInt64(uint64_t* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzSize(size_t* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzFloat(float* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzDouble(double* aValue, unsigned int aProbability=sDefaultProbability); + void FuzzString(std::string& aValue, unsigned int aProbability=sDefaultProbability); + void FuzzWString(std::wstring& aValue, unsigned int aProbability=sDefaultProbability); + void FuzzString16(string16& aValue, unsigned int aProbability=sDefaultProbability); + void FuzzData(std::string& aData, int aLength, unsigned int aProbability=sDefaultProbability); + void FuzzBytes(void* aData, int aLength, unsigned int aProbability=sDefaultProbability); + + void MaybeCollectAndClosePipe(int aPipe, unsigned int aProbability=sDefaultProbability); + + private: + std::set<int> mFds; + + const bool mFuzzPipes; + const bool mFuzzPickle; + const bool mUseLargeValues; + const bool mIsValidProcessType; + + static const bool sIsLoggingEnabled; + + Faulty(); + friend struct DefaultSingletonTraits<Faulty>; + DISALLOW_EVIL_CONSTRUCTORS(Faulty); + + static bool IsValidProcessType(void); + + unsigned int Random(unsigned int aMax); + bool GetChance(unsigned int aProbability); + + void MutateBool(bool* aValue); + void MutateChar(char* aValue); + void MutateUChar(unsigned char* aValue); + void MutateInt16(int16_t* aValue); + void MutateUInt16(uint16_t* aValue); + void MutateInt(int* aValue); + void MutateUInt32(uint32_t* aValue); + void MutateLong(long* aValue); + void MutateULong(unsigned long* aValue); + void MutateInt64(int64_t* aValue); + void MutateUInt64(uint64_t* aValue); + void MutateSize(size_t* aValue); + void MutateFloat(float* aValue); + void MutateDouble(double* aValue); +}; + +} // namespace ipc +} // namespace mozilla + +#endif |