File: bbunzip_test3.sh

package info (click to toggle)
busybox 1:1.17.1-8+deb6u11
  • links: PTS
  • area: main
  • in suites: squeeze-lts
  • size: 15,608 kB
  • ctags: 26,465
  • sloc: ansic: 182,252; sh: 6,047; cpp: 1,428; makefile: 1,031; yacc: 570; lex: 355; perl: 309; python: 251; awk: 29
file content (23 lines) | stat: -rw-r--r-- 769 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
#!/bin/sh
# Leak test for gunzip. Watch top for growing process size.
# In this case we look for leaks in "concatenated .gz" code -
# we feed gunzip with a stream of .gz files.

i=$PID
c=0
while true; do
    c=$((c + 1))
    echo "Block# $c" >&2
    # RANDOM is not very random on some shells. Spice it up.
    i=$((i * 1664525 + 1013904223))
    # 100003 is prime
    len=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 ))

    # Just using urandom will make gzip use method 0 (store) -
    # not good for test coverage!
    cat /dev/urandom \
    | while true; do read junk; echo "junk $c $i $junk"; done \
    | dd bs=$len count=1 2>/dev/null \
    | gzip >xxx.gz
    cat xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz
done | ../busybox gunzip -c >/dev/null