aboutsummaryrefslogtreecommitdiff
path: root/archival/bbunzip_test3.sh
diff options
context:
space:
mode:
authorGravatar Denis Vlasenko <vda.linux@googlemail.com>2007-10-05 15:27:03 +0000
committerGravatar Denis Vlasenko <vda.linux@googlemail.com>2007-10-05 15:27:03 +0000
commitd21f596ddb294bdb65623ba1d0e49b17d0829229 (patch)
treede67fa170b41cba4a4f9696c36a6ef85581b94b3 /archival/bbunzip_test3.sh
parent5dd8a0366578746bb991b0e87a60d8d442bd8d87 (diff)
downloadbusybox-d21f596ddb294bdb65623ba1d0e49b17d0829229.tar.gz
busybox-d21f596ddb294bdb65623ba1d0e49b17d0829229.tar.bz2
add tests for gunzip
Diffstat (limited to 'archival/bbunzip_test3.sh')
-rw-r--r--archival/bbunzip_test3.sh23
1 files changed, 23 insertions, 0 deletions
diff --git a/archival/bbunzip_test3.sh b/archival/bbunzip_test3.sh
new file mode 100644
index 000000000..2dc4afda1
--- /dev/null
+++ b/archival/bbunzip_test3.sh
@@ -0,0 +1,23 @@
+#!/bin/sh
+# Leak test for gunzip. Watch top for growing process size.
+# In this case we look for leaks in "concatenated .gz" code -
+# we feed gunzip with a stream of .gz files.
+
+i=$PID
+c=0
+while true; do
+ c=$((c + 1))
+ echo "Block# $c" >&2
+ # RANDOM is not very random on some shells. Spice it up.
+ i=$((i * 1664525 + 1013904223))
+ # 100003 is prime
+ len=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 ))
+
+ # Just using urandom will make gzip use method 0 (store) -
+ # not good for test coverage!
+ cat /dev/urandom \
+ | while true; do read junk; echo "junk $c $i $junk"; done \
+ | dd bs=$len count=1 2>/dev/null \
+ | gzip >xxx.gz
+ cat xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz
+done | ../busybox gunzip -c >/dev/null