about summary refs log tree commit diff
path: root/docs
diff options
context:
space:
mode:
Diffstat (limited to 'docs')
-rw-r--r--docs/Changelog.md37
-rw-r--r--docs/INSTALL.md35
-rw-r--r--docs/ideas.md6
3 files changed, 35 insertions, 43 deletions
diff --git a/docs/Changelog.md b/docs/Changelog.md
index fcfd2ce8..1887c099 100644
--- a/docs/Changelog.md
+++ b/docs/Changelog.md
@@ -8,43 +8,6 @@
 Want to stay in the loop on major new features? Join our mailing list by
 sending a mail to <afl-users+subscribe@googlegroups.com>.
 
-### Version ++3.14c (release)
-  - afl-fuzz:
-    - fix -F when a '/' was part of the parameter
-    - fixed a crash for cmplog for very slow inputs
-    - fix for AFLfast schedule counting
-    - removed implied -D determinstic from -M main
-    - if the target becomes unavailable check out out/default/error.txt
-      for an indicator why
-    - AFL_CAL_FAST was a dead env, now does the same as AFL_FAST_CAL
-    - reverse read the queue on resumes (more effective)
-    - fix custom mutator trimming
-  - afl-cc:
-    - Update to COMPCOV/laf-intel that speeds up the instrumentation
-      process a lot - thanks to Michael Rodler/f0rki for the PR!
-    - Fix for failures for some sized string instrumentations
-    - Fix to instrument global namespace functions in c++
-    - Fix for llvm 13
-    - support partial linking
-    - do honor AFL_LLVM_{ALLOW/DENY}LIST for LTO autodictionary and DICT2FILE
-    - We do support llvm versions from 3.8 to 5.0 again
-  - frida_mode:
-    - several fixes for cmplog
-    - remove need for AFL_FRIDA_PERSISTENT_RETADDR_OFFSET
-    - less coverage collision
-    - feature parity of aarch64 with intel now (persistent, cmplog,
-      in-memory testcases, asan)
-  - afl-cmin and afl-showmap -i do now descend into subdirectories
-    (like afl-fuzz does) - note that afl-cmin.bash does not!
-  - afl_analyze:
-    - fix timeout handling
-    - add forkserver support for better performance
-  - ensure afl-compiler-rt is built for gcc_module
-  - always build aflpp_driver for libfuzzer harnesses
-  - added `AFL_NO_FORKSRV` env variable support to
-    afl-cmin, afl-tmin, and afl-showmap, by @jhertz
-  - removed outdated documents, improved existing documentation
-
 ### Version ++3.13c (release)
   - Note: plot_data switched to relative time from unix time in 3.10
   - frida_mode - new mode that uses frida to fuzz binary-only targets,
diff --git a/docs/INSTALL.md b/docs/INSTALL.md
index fc57f546..32616958 100644
--- a/docs/INSTALL.md
+++ b/docs/INSTALL.md
@@ -130,6 +130,41 @@ sysctl kern.sysv.shmall=98304
 See http://www.spy-hill.com/help/apple/SharedMemory.html for documentation for
 these settings and how to make them permanent.
 
+MacOS X supports SYSV shared memory used by AFL's instrumentation, but the
+default settings aren't usable with AFL++. The default settings on 10.14 seem
+to be:
+
+```bash
+$ ipcs -M
+IPC status from <running system> as of XXX
+shminfo:
+        shmmax: 4194304 (max shared memory segment size)
+        shmmin:       1 (min shared memory segment size)
+        shmmni:      32 (max number of shared memory identifiers)
+        shmseg:       8 (max shared memory segments per process)
+        shmall:    1024 (max amount of shared memory in pages)
+```
+
+To temporarily change your settings to something minimally usable with AFL++,
+run these commands as root:
+
+```bash
+sysctl kern.sysv.shmmax=8388608
+sysctl kern.sysv.shmall=4096
+```
+
+If you're running more than one instance of AFL you likely want to make `shmall`
+bigger and increase `shmseg` as well:
+
+```bash
+sysctl kern.sysv.shmmax=8388608
+sysctl kern.sysv.shmseg=48
+sysctl kern.sysv.shmall=98304
+```
+
+See http://www.spy-hill.com/help/apple/SharedMemory.html for documentation for
+these settings and how to make them permanent.
+
 ## 4. Linux or *BSD on non-x86 systems
 
 Standard build will fail on non-x86 systems, but you should be able to
diff --git a/docs/ideas.md b/docs/ideas.md
index 0ee69851..e25d3ba6 100644
--- a/docs/ideas.md
+++ b/docs/ideas.md
@@ -34,12 +34,6 @@ Mentor: any
 Other programming languages also use llvm hence they could (easily?) supported
 for fuzzing, e.g. mono, swift, go, kotlin native, fortran, ...
 
-GCC also supports: Objective-C, Fortran, Ada, Go, and D
-(according to [Gcc homepage](https://gcc.gnu.org/))
-
-LLVM is also used by: Rust, LLGo (Go), kaleidoscope (Haskell), flang (Fortran), emscripten (JavaScript, WASM), ilwasm (CIL (C#))
-(according to [LLVM frontends](https://gist.github.com/axic/62d66fb9d8bccca6cc48fa9841db9241))
-
 Mentor: vanhauser-thc
 
 ## Machine Learning