mirror of
https://github.com/rsyslog/rsyslog.git
synced 2025-12-15 10:30:40 +01:00
34 lines
1.6 KiB
Bash
Executable File
34 lines
1.6 KiB
Bash
Executable File
#!/bin/bash
|
|
# the goal here is to detect memleaks when structured data is not
|
|
# correctly parsed.
|
|
# This file is part of the rsyslog project, released under ASL 2.0
|
|
# rgerhards, 2015-04-30
|
|
. ${srcdir:=.}/diag.sh init
|
|
#skip_platform "FreeBSD" "This test currently does not work on FreeBSD."
|
|
export USE_VALGRIND="YES" # this test only makes sense with valgrind enabled
|
|
# uncomment below to set special valgrind options
|
|
#export RS_TEST_VALGRIND_EXTRA_OPTS="--leak-check=full --show-leak-kinds=all"
|
|
|
|
generate_conf
|
|
add_conf '
|
|
module(load="../plugins/mmpstrucdata/.libs/mmpstrucdata")
|
|
module(load="../plugins/imtcp/.libs/imtcp")
|
|
|
|
input(type="imtcp" port="0" listenPortFileName="'$RSYSLOG_DYNNAME'.tcpflood_port")
|
|
|
|
action(type="mmpstrucdata")
|
|
if $msg contains "msgnum" then
|
|
action(type="omfile" file=`echo $RSYSLOG_OUT_LOG`)
|
|
'
|
|
startup
|
|
# we use different message counts as this hopefully aids us
|
|
# in finding which sample is leaking. For this, check the number
|
|
# of blocks lost and see what set they match.
|
|
tcpflood -m100 -M "\"<161>1 2003-03-01T01:00:00.000Z mymachine.example.com tcpflood - tag [tcpflood@32473 MSGNUM] invalid structured data!\""
|
|
tcpflood -m200 -M "\"<161>1 2003-03-01T01:00:00.000Z mymachine.example.com tcpflood - tag [tcpflood@32473 MSGNUM ] invalid structured data!\""
|
|
tcpflood -m300 -M "\"<161>1 2003-03-01T01:00:00.000Z mymachine.example.com tcpflood - tag [tcpflood@32473 MSGNUM= ] invalid structured data!\""
|
|
tcpflood -m400 -M "\"<161>1 2003-03-01T01:00:00.000Z mymachine.example.com tcpflood - tag [tcpflood@32473 = ] invalid structured data!\""
|
|
shutdown_when_empty
|
|
wait_shutdown
|
|
exit_test
|