forked from osmocom/wireshark
Bump the time limit for valgrind fuzzing
Some captures are still hitting the limit as a false positive. Bug: 10122 Change-Id: I12dd26ba0f96f44799f5ae642b1f9b0487f86a8a Reviewed-on: https://code.wireshark.org/review/3982 Reviewed-by: Michael Mann <mmann78@netscape.net>
This commit is contained in:
parent
2497482e34
commit
27d1b6addf
|
@ -75,9 +75,9 @@ if [ $VALGRIND -eq 1 ]; then
|
|||
RUNNER="`dirname $0`/valgrind-wireshark.sh"
|
||||
COMMON_ARGS="-b $BIN_DIR $COMMON_ARGS"
|
||||
declare -a RUNNER_ARGS=("" "-T")
|
||||
# Valgrind requires more resources, so permit 1.5x memory and 2.5x time
|
||||
# Valgrind requires more resources, so permit 1.5x memory and 3x time
|
||||
# (1.5x time is too small for a few large captures in the menagerie)
|
||||
MAX_CPU_TIME=`expr 5 \* $MAX_CPU_TIME / 2`
|
||||
MAX_CPU_TIME=`expr 3 \* $MAX_CPU_TIME`
|
||||
MAX_VMEM=`expr 3 \* $MAX_VMEM / 2`
|
||||
else
|
||||
# Not using valgrind, use regular tshark.
|
||||
|
|
Loading…
Reference in New Issue