diff options
author | Dominik Maier <domenukk@gmail.com> | 2020-06-09 03:48:50 +0200 |
---|---|---|
committer | Dominik Maier <domenukk@gmail.com> | 2020-06-09 03:48:50 +0200 |
commit | feffae60dd469b63db45a88204a1e17cc2f41bd3 (patch) | |
tree | dfe9f6b2706cb4f03510518b353eae793931b3a3 | |
parent | 8e3f6fe2dc92c1c24d6ebe2bf1021061a3211123 (diff) | |
download | afl++-feffae60dd469b63db45a88204a1e17cc2f41bd3.tar.gz |
code format
-rw-r--r-- | libdislocator/libdislocator.so.c | 6 | ||||
-rw-r--r-- | llvm_mode/afl-llvm-rt.o.c | 2 | ||||
-rw-r--r-- | qemu_mode/patches/afl-qemu-cpu-inl.h | 2 | ||||
-rw-r--r-- | src/afl-forkserver.c | 3 | ||||
-rw-r--r-- | src/afl-fuzz-init.c | 2 |
5 files changed, 11 insertions, 4 deletions
diff --git a/libdislocator/libdislocator.so.c b/libdislocator/libdislocator.so.c index a5f03d0c..6b1cc848 100644 --- a/libdislocator/libdislocator.so.c +++ b/libdislocator/libdislocator.so.c @@ -503,10 +503,11 @@ __attribute__((constructor)) void __dislocator_init(void) { /* NetBSD fault handler specific api subset */ -void (* esetfunc(void (*fn)(int, const char *, ...)))(int, const char *, ...) -{ +void (*esetfunc(void (*fn)(int, const char *, ...)))(int, const char *, ...) { + /* Might not be meaningful to implement; upper calls already report errors */ return NULL; + } void *emalloc(size_t len) { @@ -526,3 +527,4 @@ void *erealloc(void *ptr, size_t len) { return realloc(ptr, len); } + diff --git a/llvm_mode/afl-llvm-rt.o.c b/llvm_mode/afl-llvm-rt.o.c index cc1c7c20..702384a3 100644 --- a/llvm_mode/afl-llvm-rt.o.c +++ b/llvm_mode/afl-llvm-rt.o.c @@ -160,7 +160,9 @@ static void __afl_map_shm_fuzz() { __afl_fuzz_ptr = (u8 *)(map + sizeof(u32)); if (getenv("AFL_DEBUG")) { + fprintf(stderr, "DEBUG: successfully got fuzzing shared memory\n"); + } } else { diff --git a/qemu_mode/patches/afl-qemu-cpu-inl.h b/qemu_mode/patches/afl-qemu-cpu-inl.h index 8dea004e..5f579687 100644 --- a/qemu_mode/patches/afl-qemu-cpu-inl.h +++ b/qemu_mode/patches/afl-qemu-cpu-inl.h @@ -161,7 +161,9 @@ static void afl_map_shm_fuzz(void) { shared_buf = map + sizeof(u32); if (getenv("AFL_DEBUG")) { + fprintf(stderr, "[AFL] DEBUG: successfully got fuzzing shared memory\n"); + } } else { diff --git a/src/afl-forkserver.c b/src/afl-forkserver.c index 36126aa7..78e2b555 100644 --- a/src/afl-forkserver.c +++ b/src/afl-forkserver.c @@ -835,7 +835,8 @@ void afl_fsrv_write_to_testcase(afl_forkserver_t *fsrv, u8 *buf, size_t len) { *fsrv->shmem_fuzz_len = len; memcpy(fsrv->shmem_fuzz, buf, len); - //printf("test case len: %u [0]:0x%02x\n", *fsrv->shmem_fuzz_len, buf[0]); fflush(stdout); + // printf("test case len: %u [0]:0x%02x\n", *fsrv->shmem_fuzz_len, buf[0]); + // fflush(stdout); } else { diff --git a/src/afl-fuzz-init.c b/src/afl-fuzz-init.c index 54d65b9e..4184fa6b 100644 --- a/src/afl-fuzz-init.c +++ b/src/afl-fuzz-init.c @@ -1975,7 +1975,7 @@ void setup_testcase_shmem(afl_state_t *afl) { afl->fsrv.shmem_fuzz_len = (u32 *)map; afl->fsrv.shmem_fuzz = map + sizeof(u32); - } +} /* Do a PATH search and find target binary to see that it exists and isn't a shell script - a common and painful mistake. We also check for |