Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

How to deal with corpus file partial read during afl-fuzz #2373

Discussion options

Hi, I am new to afl++. I was trying to build a pdf corpus for fuzzing but I warning like "[!] WARNING: Test case '/corpus/queries/file_20250410_220608_bbc643.pdf' is too big (11.1 MB, limit is 1.00 MB), partial reading
" what is the best practice to deal with this? Is there a way just change the size limit?
Here is part of output:
jim-afl-mupdf | [] Running AFL fuzzing...
jim-afl-mupdf | [+] Enabled environment variable AFL_SKIP_CPUFREQ with value 1
jim-afl-mupdf | [+] Enabled environment variable AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES with value 1
jim-afl-mupdf | [+] Enabled environment variable AFL_TRY_AFFINITY with value 1
jim-afl-mupdf | [!] WARNING: Mistyped AFL environment variable: AFL_FILESZ=3145728
jim-afl-mupdf | Did you mean AFL_UNTRACER_FILE?
jim-afl-mupdf | Did you mean AFL_PERFORMANCE_FILE?
jim-afl-mupdf | Did you mean AFL_TOKEN_FILE?
jim-afl-mupdf | afl-fuzz++4.31a based on afl by Michal Zalewski and a large online community
jim-afl-mupdf | [+] AFL++ is maintained by Marc "van Hauser" Heuse, Dominik Maier, Andrea Fioraldi and Heiko "hexcoder" Eißfeldt
jim-afl-mupdf | [+] AFL++ is open source, get it at https://github.com/AFLplusplus/AFLplusplus
jim-afl-mupdf | [+] NOTE: AFL++ >= v3 has changed defaults and behaviours - see README.md
jim-afl-mupdf | [
] Getting to work...
jim-afl-mupdf | [+] Using exploration-based constant power schedule (EXPLORE)
jim-afl-mupdf | [+] Enabled testcache with 50 MB
jim-afl-mupdf | [+] Generating fuzz data with a length of min=1 max=1048576
jim-afl-mupdf | [] Checking core_pattern...
jim-afl-mupdf | [+] You have 104 CPU cores and 13 runnable tasks (utilization: 12%).
jim-afl-mupdf | [+] Try parallel jobs - see /usr/local/share/doc/afl/fuzzing_in_depth.md#c-using-multiple-cores
jim-afl-mupdf | [
] Setting up output directories...
jim-afl-mupdf | [+] Output directory exists but deemed OK to reuse.
jim-afl-mupdf | [] Deleting old session data...
jim-afl-mupdf | [+] Output dir cleanup successful.
jim-afl-mupdf | [
] Checking CPU core loadout...
jim-afl-mupdf | [+] Found a free CPU core, try binding to #0.
jim-afl-mupdf | [] Validating target binary...
jim-afl-mupdf | [
] Scanning '/corpus'...
jim-afl-mupdf | [*] Scanning '/corpus/queries'...
jim-afl-mupdf | [!] WARNING: Test case '/corpus/queries/file_20250410_220608_bbc643.pdf' is too big (11.1 MB, limit is 1.00 MB), partial reading
jim-afl-mupdf | [!] WARNING: Test case '/corpus/queries/file_20250410_220609_fe6922.pdf' is too big (1.15 MB, limit is 1.00 MB), partial reading
jim-afl-mupdf | [!] WARNING: Test case '/corpus/queries/file_20250410_220613_aea38f.pdf' is too big (1.39 MB, limit is 1.00 MB), partial reading
jim-afl-mupdf | [!] WARNING: Test case '/corpus/queries/file_20250410_220643_e04c21.pdf' is too big (3.35 MB, limit is 1.00 MB), partial reading
jim-afl-mupdf | [!] WARNING: Test case '/corpus/queries/file_20250410_220701_c373c3.pdf' is too big (1.10 MB, limit is 1.00 MB), partial reading

You must be logged in to vote

Collect smaller corpus files

Replies: 1 comment · 3 replies

Comment options

Collect smaller corpus files

You must be logged in to vote
3 replies
@jiangjingzhi2003
Comment options

Do you if it is possible just overwrite the limit 1.00MB?

@vanhauser-thc
Comment options

It’s a value in config.h but changing it is a bad idea

@jiangjingzhi2003
Comment options

Got it. Thank you very much. I will try to use smaller corpus.

Answer selected by jiangjingzhi2003
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
🙏
Q&A
Labels
None yet
2 participants
Morty Proxy This is a proxified and sanitized view of the page, visit original site.