bringing back light clippy for fuzzers :)
This commit is contained in:
parent
3a21ad59a4
commit
7493b59ba8
1
.gitignore
vendored
1
.gitignore
vendored
@ -21,3 +21,4 @@ test.dict
|
|||||||
|
|
||||||
# Ignore all built fuzzers
|
# Ignore all built fuzzers
|
||||||
fuzzer_*
|
fuzzer_*
|
||||||
|
AFLplusplus
|
||||||
|
@ -16,8 +16,8 @@ use libafl::{
|
|||||||
tuples::{tuple_list, Merge},
|
tuples::{tuple_list, Merge},
|
||||||
},
|
},
|
||||||
corpus::{
|
corpus::{
|
||||||
ondisk::OnDiskMetadataFormat, Corpus, InMemoryCorpus,
|
ondisk::OnDiskMetadataFormat, Corpus, IndexesLenTimeMinimizerCorpusScheduler, OnDiskCorpus,
|
||||||
IndexesLenTimeMinimizerCorpusScheduler, OnDiskCorpus, QueueCorpusScheduler,
|
QueueCorpusScheduler,
|
||||||
},
|
},
|
||||||
executors::{
|
executors::{
|
||||||
inprocess::InProcessExecutor, timeout::TimeoutExecutor, Executor, ExitKind, HasExecHooks,
|
inprocess::InProcessExecutor, timeout::TimeoutExecutor, Executor, ExitKind, HasExecHooks,
|
||||||
@ -384,7 +384,6 @@ unsafe fn fuzz(
|
|||||||
StdRand::with_seed(current_nanos()),
|
StdRand::with_seed(current_nanos()),
|
||||||
// Corpus that will be evolved, we keep it in memory for performance
|
// Corpus that will be evolved, we keep it in memory for performance
|
||||||
OnDiskCorpus::new(PathBuf::from("./corpus_discovered")).unwrap(),
|
OnDiskCorpus::new(PathBuf::from("./corpus_discovered")).unwrap(),
|
||||||
//InMemoryCorpus::new(),
|
|
||||||
// Corpus in which we store solutions (crashes in this example),
|
// Corpus in which we store solutions (crashes in this example),
|
||||||
// on disk so the user can get them after stopping the fuzzer
|
// on disk so the user can get them after stopping the fuzzer
|
||||||
OnDiskCorpus::new_save_meta(
|
OnDiskCorpus::new_save_meta(
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
use backtrace::Backtrace;
|
use backtrace::Backtrace;
|
||||||
use capstone::{arch::BuildsCapstone, Capstone};
|
use capstone::{arch::BuildsCapstone, Capstone};
|
||||||
use color_backtrace::{default_output_stream, BacktracePrinter, Verbosity};
|
use color_backtrace::{default_output_stream, BacktracePrinter, Verbosity};
|
||||||
|
#[cfg(target_arch = "aarch64")]
|
||||||
use frida_gum::interceptor::Interceptor;
|
use frida_gum::interceptor::Interceptor;
|
||||||
use libafl::{
|
use libafl::{
|
||||||
bolts::{os::find_mapping_for_address, ownedref::OwnedPtr, tuples::Named},
|
bolts::{os::find_mapping_for_address, ownedref::OwnedPtr, tuples::Named},
|
||||||
@ -256,10 +257,10 @@ impl AsanErrors {
|
|||||||
name, address, size
|
name, address, size
|
||||||
)
|
)
|
||||||
.unwrap();
|
.unwrap();
|
||||||
let invocation = Interceptor::current_invocation();
|
|
||||||
let cpu_context = invocation.cpu_context();
|
|
||||||
#[cfg(target_arch = "aarch64")]
|
#[cfg(target_arch = "aarch64")]
|
||||||
{
|
{
|
||||||
|
let invocation = Interceptor::current_invocation();
|
||||||
|
let cpu_context = invocation.cpu_context();
|
||||||
#[allow(clippy::non_ascii_literal)]
|
#[allow(clippy::non_ascii_literal)]
|
||||||
writeln!(output, "{:━^100}", " REGISTERS ").unwrap();
|
writeln!(output, "{:━^100}", " REGISTERS ").unwrap();
|
||||||
for reg in 0..29 {
|
for reg in 0..29 {
|
||||||
|
@ -11,6 +11,7 @@ do
|
|||||||
echo "[+] Checking fmt and building $fuzzer"
|
echo "[+] Checking fmt and building $fuzzer"
|
||||||
cd $fuzzer \
|
cd $fuzzer \
|
||||||
&& cargo fmt --all -- --check \
|
&& cargo fmt --all -- --check \
|
||||||
|
&& cargo clippy \
|
||||||
&& cargo build \
|
&& cargo build \
|
||||||
&& cd .. \
|
&& cd .. \
|
||||||
|| exit 1
|
|| exit 1
|
||||||
|
Loading…
x
Reference in New Issue
Block a user