|
26 | 26 | /* Version string: */
|
27 | 27 |
|
28 | 28 | // c = release, a = volatile github dev, e = experimental branch
|
29 |
| -#define VERSION "++4.20a" |
| 29 | +#define VERSION "++4.32a" |
30 | 30 |
|
31 | 31 | /******************************************************
|
32 | 32 | * *
|
|
39 | 39 | However if a target has problematic constructors and init arrays then
|
40 | 40 | this can fail. Hence afl-fuzz deploys a larger default map. The largest
|
41 | 41 | map seen so far is the xlsx fuzzer for libreoffice which is 5MB.
|
42 |
| - At runtime this value can be overriden via AFL_MAP_SIZE. |
| 42 | + At runtime this value can be overridden via AFL_MAP_SIZE. |
43 | 43 | Default: 8MB (defined in bytes) */
|
44 | 44 | #define DEFAULT_SHMEM_SIZE (8 * 1024 * 1024)
|
45 | 45 |
|
|
52 | 52 | /* Default file permission umode when creating files (default: 0600) */
|
53 | 53 | #define DEFAULT_PERMISSION 0600
|
54 | 54 |
|
| 55 | +#ifdef __APPLE__ |
| 56 | + #include <TargetConditionals.h> |
| 57 | + #if TARGET_OS_IOS |
| 58 | + #undef DEFAULT_PERMISSION |
| 59 | + #define DEFAULT_PERMISSION 0666 |
| 60 | + #endif |
| 61 | +#endif |
| 62 | +#ifdef __ANDROID__ |
| 63 | + #undef DEFAULT_PERMISSION |
| 64 | + #define DEFAULT_PERMISSION 0666 |
| 65 | +#endif |
| 66 | + |
55 | 67 | /* SkipDet's global configuration */
|
56 | 68 |
|
57 | 69 | #define MINIMAL_BLOCK_SIZE 64
|
|
85 | 97 | /* Maximum allowed fails per CMP value. Default: 96 */
|
86 | 98 | #define CMPLOG_FAIL_MAX 96
|
87 | 99 |
|
| 100 | +/* |
| 101 | + * Effective fuzzing with selective feeding inputs |
| 102 | + */ |
| 103 | + |
| 104 | +#define MAX_EXTRA_SAN_BINARY 4 |
| 105 | + |
88 | 106 | /* -------------------------------------*/
|
89 | 107 | /* Now non-cmplog configuration options */
|
90 | 108 | /* -------------------------------------*/
|
91 | 109 |
|
92 |
| -/* If a persistent target keeps state and found crashes are not reproducable |
| 110 | +/* If a persistent target keeps state and found crashes are not reproducible |
93 | 111 | then enable this option and set the AFL_PERSISTENT_RECORD env variable
|
94 | 112 | to a number. These number of testcases prior and including the crash case
|
95 | 113 | will be kept and written to the crash/ directory as RECORD:... files.
|
|
324 | 342 | #define SYNC_INTERVAL 8
|
325 | 343 |
|
326 | 344 | /* Sync time (minimum time between syncing in ms, time is halfed for -M main
|
327 |
| - nodes) - default is 30 minutes: */ |
| 345 | + nodes) - default is 20 minutes: */ |
328 | 346 |
|
329 |
| -#define SYNC_TIME (30 * 60 * 1000) |
| 347 | +#define SYNC_TIME (20 * 60 * 1000) |
330 | 348 |
|
331 | 349 | /* Output directory reuse grace period (minutes): */
|
332 | 350 |
|
|
464 | 482 | /* Do not change this unless you really know what you are doing. */
|
465 | 483 |
|
466 | 484 | #define MAP_SIZE (1U << MAP_SIZE_POW2)
|
467 |
| -#if MAP_SIZE <= 65536 |
| 485 | +#if MAP_SIZE <= 2097152 |
468 | 486 | #define MAP_INITIAL_SIZE (2 << 20) // = 2097152
|
469 | 487 | #else
|
470 | 488 | #define MAP_INITIAL_SIZE MAP_SIZE
|
|
492 | 510 |
|
493 | 511 | #define CMPLOG_SHM_ENV_VAR "__AFL_CMPLOG_SHM_ID"
|
494 | 512 |
|
| 513 | +/* ASAN SHM ID */ |
| 514 | +#define AFL_ASAN_FUZZ_SHM_ENV_VAR "__AFL_ASAN_SHM_ID" |
| 515 | + |
495 | 516 | /* CPU Affinity lockfile env var */
|
496 | 517 |
|
497 | 518 | #define CPU_AFFINITY_ENV_VAR "__AFL_LOCKFILE"
|
|
523 | 544 |
|
524 | 545 | #define AFL_TXT_MAX_LEN 65535
|
525 | 546 |
|
526 |
| -/* What is the minimum percentage of ascii characters present to be classifed |
| 547 | +/* What is the minimum percentage of ascii characters present to be classified |
527 | 548 | as "is_ascii"? */
|
528 | 549 |
|
529 | 550 | #define AFL_TXT_MIN_PERCENT 99
|
|
0 commit comments