New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Too many open files #2
Comments
Original comment by |
Original comment by |
Original comment by |
Original comment by |
Original comment by |
Original comment by |
Original comment by |
Original comment by
|
* Replace LOGMSG macros with new xLOG_x macros * Rename DEBUG flag to DEBUG_BUILD flag since it conflicts with LOG debug definition Signed-off-by: Anestis Bechtsoudis <anestis@census-labs.com>
* debug_enhancements: LINUX: Option to save maps Indent Log refactor updates google#2 Log refactor updates Signed-off-by: Anestis Bechtsoudis <anestis@census-labs.com> # Conflicts: # Makefile # cmdline.c # files.c # files.h # linux/ptrace_utils.c
* debug_enhancements: LINUX: Option to save maps Indent Log refactor updates google#2 Log refactor updates linux: Save proc maps if debug build mac: Enable crashdump for debug builds Export defined DEBUG flag Signed-off-by: Anestis Bechtsoudis <anestis@census-labs.com> # Conflicts: # cmdline.c # common.h
* master: (22 commits) Display: erase line before using it Display: erase line before using it Display: erase line before using it libhfuzz: make write function taking const buf display: Set _HF_DISPLAY_LINES to 14 (cannot be a macro) display: Set _HF_DISPLAY_LINES to 14 (number of display lines before logs) sanitizers: w/o -S just set some reasonable values inside the process fuzzer: Move fuzzer->origFileName generation to specific functions sanitizers: use strdup instead of callod/strcpy Set up some basic *san envvars, even with sanitizers support disabled display: remote_cmd reformatting display: With non -v put the cursor at the bottom of the screen display: alternative way of disable scroll regions diusplay: experimental no-scroll for logs Add pid logging with the initial msg files: Warn about empty files display: print number of input files display: print number of input files display: compactize the coverage output google#2 display: compactize the coverage output ...
* master: (22 commits) Display: erase line before using it Display: erase line before using it Display: erase line before using it libhfuzz: make write function taking const buf display: Set _HF_DISPLAY_LINES to 14 (cannot be a macro) display: Set _HF_DISPLAY_LINES to 14 (number of display lines before logs) sanitizers: w/o -S just set some reasonable values inside the process fuzzer: Move fuzzer->origFileName generation to specific functions sanitizers: use strdup instead of callod/strcpy Set up some basic *san envvars, even with sanitizers support disabled display: remote_cmd reformatting display: With non -v put the cursor at the bottom of the screen display: alternative way of disable scroll regions diusplay: experimental no-scroll for logs Add pid logging with the initial msg files: Warn about empty files display: print number of input files display: print number of input files display: compactize the coverage output google#2 display: compactize the coverage output ...
* master: (22 commits) Display: erase line before using it Display: erase line before using it Display: erase line before using it libhfuzz: make write function taking const buf display: Set _HF_DISPLAY_LINES to 14 (cannot be a macro) display: Set _HF_DISPLAY_LINES to 14 (number of display lines before logs) sanitizers: w/o -S just set some reasonable values inside the process fuzzer: Move fuzzer->origFileName generation to specific functions sanitizers: use strdup instead of callod/strcpy Set up some basic *san envvars, even with sanitizers support disabled display: remote_cmd reformatting display: With non -v put the cursor at the bottom of the screen display: alternative way of disable scroll regions diusplay: experimental no-scroll for logs Add pid logging with the initial msg files: Warn about empty files display: print number of input files display: print number of input files display: compactize the coverage output google#2 display: compactize the coverage output ...
* master: (22 commits) Display: erase line before using it Display: erase line before using it Display: erase line before using it libhfuzz: make write function taking const buf display: Set _HF_DISPLAY_LINES to 14 (cannot be a macro) display: Set _HF_DISPLAY_LINES to 14 (number of display lines before logs) sanitizers: w/o -S just set some reasonable values inside the process fuzzer: Move fuzzer->origFileName generation to specific functions sanitizers: use strdup instead of callod/strcpy Set up some basic *san envvars, even with sanitizers support disabled display: remote_cmd reformatting display: With non -v put the cursor at the bottom of the screen display: alternative way of disable scroll regions diusplay: experimental no-scroll for logs Add pid logging with the initial msg files: Warn about empty files display: print number of input files display: print number of input files display: compactize the coverage output google#2 display: compactize the coverage output ...
* master: (22 commits) Display: erase line before using it Display: erase line before using it Display: erase line before using it libhfuzz: make write function taking const buf display: Set _HF_DISPLAY_LINES to 14 (cannot be a macro) display: Set _HF_DISPLAY_LINES to 14 (number of display lines before logs) sanitizers: w/o -S just set some reasonable values inside the process fuzzer: Move fuzzer->origFileName generation to specific functions sanitizers: use strdup instead of callod/strcpy Set up some basic *san envvars, even with sanitizers support disabled display: remote_cmd reformatting display: With non -v put the cursor at the bottom of the screen display: alternative way of disable scroll regions diusplay: experimental no-scroll for logs Add pid logging with the initial msg files: Warn about empty files display: print number of input files display: print number of input files display: compactize the coverage output google#2 display: compactize the coverage output ...
* master: (99 commits) examples/linux_ip: Remove data from tun before using it examples/linux_ip: send multiple packets from one input examples/ip: udp_lite support examples/ip: ip offload examples/ip: +sctp BTS: Save high PC addresses when kernelOnly is enabled ipt: ioctl reset after use Linux kernel IP fuzzing with Intel PT/BTS: single buffer Linux kernel IP fuzzing with Intel PT/BTS Allow to choose between user and kernel perf fuzz: fix hfuzz.fileName setting google#2 fuzz: fix hfuzz.fileName setting FIX: Failing when dynamic file was accessed by multiple threads. Now each thread has its own dynamic file according to fuzzNo examples/openssl: use SSL_CTX_set_ecdh_auto fuzz: a couple of smaller fixes fuzz: *bsd doesn't support circleq examples/openssl: add SSL_shutdown fuzz: use different mutexes for feedback and the dynamic file queue linux/arch: modify signal mask for sigtimedwait once only Use CIRCLEQ to avoid iterating over TAILQ ...
* master: (99 commits) examples/linux_ip: Remove data from tun before using it examples/linux_ip: send multiple packets from one input examples/ip: udp_lite support examples/ip: ip offload examples/ip: +sctp BTS: Save high PC addresses when kernelOnly is enabled ipt: ioctl reset after use Linux kernel IP fuzzing with Intel PT/BTS: single buffer Linux kernel IP fuzzing with Intel PT/BTS Allow to choose between user and kernel perf fuzz: fix hfuzz.fileName setting google#2 fuzz: fix hfuzz.fileName setting FIX: Failing when dynamic file was accessed by multiple threads. Now each thread has its own dynamic file according to fuzzNo examples/openssl: use SSL_CTX_set_ecdh_auto fuzz: a couple of smaller fixes fuzz: *bsd doesn't support circleq examples/openssl: add SSL_shutdown fuzz: use different mutexes for feedback and the dynamic file queue linux/arch: modify signal mask for sigtimedwait once only Use CIRCLEQ to avoid iterating over TAILQ ... Signed-off-by: Anestis Bechtsoudis <anestis@census-labs.com> # Conflicts: # files.c
* master: (99 commits) examples/linux_ip: Remove data from tun before using it examples/linux_ip: send multiple packets from one input examples/ip: udp_lite support examples/ip: ip offload examples/ip: +sctp BTS: Save high PC addresses when kernelOnly is enabled ipt: ioctl reset after use Linux kernel IP fuzzing with Intel PT/BTS: single buffer Linux kernel IP fuzzing with Intel PT/BTS Allow to choose between user and kernel perf fuzz: fix hfuzz.fileName setting google#2 fuzz: fix hfuzz.fileName setting FIX: Failing when dynamic file was accessed by multiple threads. Now each thread has its own dynamic file according to fuzzNo examples/openssl: use SSL_CTX_set_ecdh_auto fuzz: a couple of smaller fixes fuzz: *bsd doesn't support circleq examples/openssl: add SSL_shutdown fuzz: use different mutexes for feedback and the dynamic file queue linux/arch: modify signal mask for sigtimedwait once only Use CIRCLEQ to avoid iterating over TAILQ ...
* master: (99 commits) examples/linux_ip: Remove data from tun before using it examples/linux_ip: send multiple packets from one input examples/ip: udp_lite support examples/ip: ip offload examples/ip: +sctp BTS: Save high PC addresses when kernelOnly is enabled ipt: ioctl reset after use Linux kernel IP fuzzing with Intel PT/BTS: single buffer Linux kernel IP fuzzing with Intel PT/BTS Allow to choose between user and kernel perf fuzz: fix hfuzz.fileName setting google#2 fuzz: fix hfuzz.fileName setting FIX: Failing when dynamic file was accessed by multiple threads. Now each thread has its own dynamic file according to fuzzNo examples/openssl: use SSL_CTX_set_ecdh_auto fuzz: a couple of smaller fixes fuzz: *bsd doesn't support circleq examples/openssl: add SSL_shutdown fuzz: use different mutexes for feedback and the dynamic file queue linux/arch: modify signal mask for sigtimedwait once only Use CIRCLEQ to avoid iterating over TAILQ ...
* master: (99 commits) examples/linux_ip: Remove data from tun before using it examples/linux_ip: send multiple packets from one input examples/ip: udp_lite support examples/ip: ip offload examples/ip: +sctp BTS: Save high PC addresses when kernelOnly is enabled ipt: ioctl reset after use Linux kernel IP fuzzing with Intel PT/BTS: single buffer Linux kernel IP fuzzing with Intel PT/BTS Allow to choose between user and kernel perf fuzz: fix hfuzz.fileName setting google#2 fuzz: fix hfuzz.fileName setting FIX: Failing when dynamic file was accessed by multiple threads. Now each thread has its own dynamic file according to fuzzNo examples/openssl: use SSL_CTX_set_ecdh_auto fuzz: a couple of smaller fixes fuzz: *bsd doesn't support circleq examples/openssl: add SSL_shutdown fuzz: use different mutexes for feedback and the dynamic file queue linux/arch: modify signal mask for sigtimedwait once only Use CIRCLEQ to avoid iterating over TAILQ ... Signed-off-by: Anestis Bechtsoudis <anestis@census-labs.com> # Conflicts: # files.c
Original issue reported on code.google.com by
p...@pizza.org
on 11 Apr 2011 at 9:35Attachments:
The text was updated successfully, but these errors were encountered: