source: branches/3.2/mindi-busybox/archival/bbunzip_test3.sh @ 3232

Last change on this file since 3232 was 2725, checked in by bruno, 8 years ago
  • Update mindi-busybox to 1.18.3 to avoid problems with the tar command which is now failing on recent versions with busybox 1.7.3
  • Property svn:eol-style set to native
  • Property svn:executable set to *
File size: 769 bytes
Line 
1#!/bin/sh
2# Leak test for gunzip. Watch top for growing process size.
3# In this case we look for leaks in "concatenated .gz" code -
4# we feed gunzip with a stream of .gz files.
5
6i=$PID
7c=0
8while true; do
9    c=$((c + 1))
10    echo "Block# $c" >&2
11    # RANDOM is not very random on some shells. Spice it up.
12    i=$((i * 1664525 + 1013904223))
13    # 100003 is prime
14    len=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 ))
15
16    # Just using urandom will make gzip use method 0 (store) -
17    # not good for test coverage!
18    cat /dev/urandom \
19    | while true; do read junk; echo "junk $c $i $junk"; done \
20    | dd bs=$len count=1 2>/dev/null \
21    | gzip >xxx.gz
22    cat xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz
23done | ../busybox gunzip -c >/dev/null
Note: See TracBrowser for help on using the repository browser.