diff options
author | Denis Vlasenko | 2007-10-05 15:27:03 +0000 |
---|---|---|
committer | Denis Vlasenko | 2007-10-05 15:27:03 +0000 |
commit | d21f596ddb294bdb65623ba1d0e49b17d0829229 (patch) | |
tree | de67fa170b41cba4a4f9696c36a6ef85581b94b3 /archival/bbunzip_test3.sh | |
parent | 5dd8a0366578746bb991b0e87a60d8d442bd8d87 (diff) | |
download | busybox-d21f596ddb294bdb65623ba1d0e49b17d0829229.zip busybox-d21f596ddb294bdb65623ba1d0e49b17d0829229.tar.gz |
add tests for gunzip
Diffstat (limited to 'archival/bbunzip_test3.sh')
-rw-r--r-- | archival/bbunzip_test3.sh | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/archival/bbunzip_test3.sh b/archival/bbunzip_test3.sh new file mode 100644 index 0000000..2dc4afd --- /dev/null +++ b/archival/bbunzip_test3.sh @@ -0,0 +1,23 @@ +#!/bin/sh +# Leak test for gunzip. Watch top for growing process size. +# In this case we look for leaks in "concatenated .gz" code - +# we feed gunzip with a stream of .gz files. + +i=$PID +c=0 +while true; do + c=$((c + 1)) + echo "Block# $c" >&2 + # RANDOM is not very random on some shells. Spice it up. + i=$((i * 1664525 + 1013904223)) + # 100003 is prime + len=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 )) + + # Just using urandom will make gzip use method 0 (store) - + # not good for test coverage! + cat /dev/urandom \ + | while true; do read junk; echo "junk $c $i $junk"; done \ + | dd bs=$len count=1 2>/dev/null \ + | gzip >xxx.gz + cat xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz +done | ../busybox gunzip -c >/dev/null |