From kde-devel Wed Oct 13 23:58:15 2004 From: Benjamin Meyer Date: Wed, 13 Oct 2004 23:58:15 +0000 To: kde-devel Subject: Re: Execution replay for Qt/KDE applications Message-Id: <200410131958.17212.ben () meyerhome ! net> X-MARC-Message: https://marc.info/?l=kde-devel&m=109771196507950 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >
> Brute force testers: "These are beta testers, and users of dot-zero > versions of software, of course. And tools like CrashMe, which is one of > the ones we use for Linux. And there are application level equivalents of > this. The basic idea is, generate random input, feed it to the application, > keep doing this until the application breaks. It's surprisingly effective. > In a recent study they did this with Windows application software, feeding > random Windows events to it, so effectively it simply sat there at full > computer speed continuously clicking randomly, closing and opening dialog > boxes, picking menu items, and typing. And about half the Windows software > they subjected to this particular torture, crashed."[1] >
> > Perhaps the same could be done with Qt/KDE apps; With Qt's introspection > random QWidgets are selected, and they are then fed with random signals... I did mouse press app a while back. It sent mouse clicks to the kernel (random cords in screen) which would send it down the line and get to the app through the normal means (X11, fb, etc). Lots of fun for testing. - -Benjamin Meyer - -- aka icefox Public Key: http://www.csh.rit.edu/~benjamin/public_key.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFBbcEX1rZ3LTw38vIRAgX6AJ4i1l9R8BEOST7Im1wOLbVwr/WOOACfcNvI Cq/40HXVM7L/jS83zpoTDXs= =KhBm -----END PGP SIGNATURE----- >> Visit http://mail.kde.org/mailman/listinfo/kde-devel#unsub to unsubscribe <<