diff options
author | Denis Vlasenko <vda.linux@googlemail.com> | 2007-10-05 15:27:03 +0000 |
---|---|---|
committer | Denis Vlasenko <vda.linux@googlemail.com> | 2007-10-05 15:27:03 +0000 |
commit | d21f596ddb294bdb65623ba1d0e49b17d0829229 (patch) | |
tree | de67fa170b41cba4a4f9696c36a6ef85581b94b3 | |
parent | 5dd8a0366578746bb991b0e87a60d8d442bd8d87 (diff) |
add tests for gunzip
-rw-r--r-- | archival/bbunzip_test.sh | 61 | ||||
-rw-r--r-- | archival/bbunzip_test2.sh | 10 | ||||
-rw-r--r-- | archival/bbunzip_test3.sh | 23 |
3 files changed, 94 insertions, 0 deletions
diff --git a/archival/bbunzip_test.sh b/archival/bbunzip_test.sh new file mode 100644 index 000000000..b8e31bf97 --- /dev/null +++ b/archival/bbunzip_test.sh @@ -0,0 +1,61 @@ +#!/bin/sh +# Test that concatenated gz files are unpacking correctly. +# It also tests that unpacking in general is working right. +# Since zip code has many corner cases, run it for a few hours +# to get a decent coverage (200000 tests or more). + +gzip="gzip" +gunzip="../busybox gunzip" +# Or the other way around: +#gzip="../busybox gzip" +#gunzip="gunzip" + +c=0 +i=$PID +while true; do + c=$((c+1)) + + # RANDOM is not very random on some shells. Spice it up. + # 100003 is prime + len1=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 )) + i=$((i * 1664525 + 1013904223)) + len2=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 )) + + # Just using urandom will make gzip use method 0 (store) - + # not good for test coverage! + cat /dev/urandom | while true; do read junk; echo "junk $c $i $junk"; done \ + | dd bs=$len1 count=1 >z1 2>/dev/null + cat /dev/urandom | while true; do read junk; echo "junk $c $i $junk"; done \ + | dd bs=$len2 count=1 >z2 2>/dev/null + + $gzip <z1 >zz.gz + $gzip <z2 >>zz.gz + $gunzip -c zz.gz >z9 || { + echo "Exitcode $?" + exit + } + sum=`cat z1 z2 | md5sum` + sum9=`md5sum <z9` + test "$sum" == "$sum9" || { + echo "md5sums don't match" + exit + } + echo "Test $c ok: len1=$len1 len2=$len2 sum=$sum" + + sum=`cat z1 z2 z1 z2 | md5sum` + rm z1.gz z2.gz 2>/dev/null + $gzip z1 + $gzip z2 + cat z1.gz z2.gz z1.gz z2.gz >zz.gz + $gunzip -c zz.gz >z9 || { + echo "Exitcode $? (2)" + exit + } + sum9=`md5sum <z9` + test "$sum" == "$sum9" || { + echo "md5sums don't match (1)" + exit + } + + echo "Test $c ok: len1=$len1 len2=$len2 sum=$sum (2)" +done diff --git a/archival/bbunzip_test2.sh b/archival/bbunzip_test2.sh new file mode 100644 index 000000000..5b7e83e13 --- /dev/null +++ b/archival/bbunzip_test2.sh @@ -0,0 +1,10 @@ +#!/bin/sh +# Leak test for gunzip. Watch top for growing process size. + +# Just using urandom will make gzip use method 0 (store) - +# not good for test coverage! + +cat /dev/urandom \ +| while true; do read junk; echo "junk $RANDOM $junk"; done \ +| ../busybox gzip \ +| ../busybox gunzip -c >/dev/null diff --git a/archival/bbunzip_test3.sh b/archival/bbunzip_test3.sh new file mode 100644 index 000000000..2dc4afda1 --- /dev/null +++ b/archival/bbunzip_test3.sh @@ -0,0 +1,23 @@ +#!/bin/sh +# Leak test for gunzip. Watch top for growing process size. +# In this case we look for leaks in "concatenated .gz" code - +# we feed gunzip with a stream of .gz files. + +i=$PID +c=0 +while true; do + c=$((c + 1)) + echo "Block# $c" >&2 + # RANDOM is not very random on some shells. Spice it up. + i=$((i * 1664525 + 1013904223)) + # 100003 is prime + len=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 )) + + # Just using urandom will make gzip use method 0 (store) - + # not good for test coverage! + cat /dev/urandom \ + | while true; do read junk; echo "junk $c $i $junk"; done \ + | dd bs=$len count=1 2>/dev/null \ + | gzip >xxx.gz + cat xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz +done | ../busybox gunzip -c >/dev/null |