bringing back light clippy for fuzzers :)

This commit is contained in:
Dominik Maier 2021-05-25 14:53:57 +02:00
parent 3a21ad59a4
commit 7493b59ba8
4 changed files with 8 additions and 6 deletions

3
.gitignore vendored
View File

@ -20,4 +20,5 @@ perf.data.old
test.dict test.dict
# Ignore all built fuzzers # Ignore all built fuzzers
fuzzer_* fuzzer_*
AFLplusplus

View File

@ -16,8 +16,8 @@ use libafl::{
tuples::{tuple_list, Merge}, tuples::{tuple_list, Merge},
}, },
corpus::{ corpus::{
ondisk::OnDiskMetadataFormat, Corpus, InMemoryCorpus, ondisk::OnDiskMetadataFormat, Corpus, IndexesLenTimeMinimizerCorpusScheduler, OnDiskCorpus,
IndexesLenTimeMinimizerCorpusScheduler, OnDiskCorpus, QueueCorpusScheduler, QueueCorpusScheduler,
}, },
executors::{ executors::{
inprocess::InProcessExecutor, timeout::TimeoutExecutor, Executor, ExitKind, HasExecHooks, inprocess::InProcessExecutor, timeout::TimeoutExecutor, Executor, ExitKind, HasExecHooks,
@ -384,7 +384,6 @@ unsafe fn fuzz(
StdRand::with_seed(current_nanos()), StdRand::with_seed(current_nanos()),
// Corpus that will be evolved, we keep it in memory for performance // Corpus that will be evolved, we keep it in memory for performance
OnDiskCorpus::new(PathBuf::from("./corpus_discovered")).unwrap(), OnDiskCorpus::new(PathBuf::from("./corpus_discovered")).unwrap(),
//InMemoryCorpus::new(),
// Corpus in which we store solutions (crashes in this example), // Corpus in which we store solutions (crashes in this example),
// on disk so the user can get them after stopping the fuzzer // on disk so the user can get them after stopping the fuzzer
OnDiskCorpus::new_save_meta( OnDiskCorpus::new_save_meta(

View File

@ -1,6 +1,7 @@
use backtrace::Backtrace; use backtrace::Backtrace;
use capstone::{arch::BuildsCapstone, Capstone}; use capstone::{arch::BuildsCapstone, Capstone};
use color_backtrace::{default_output_stream, BacktracePrinter, Verbosity}; use color_backtrace::{default_output_stream, BacktracePrinter, Verbosity};
#[cfg(target_arch = "aarch64")]
use frida_gum::interceptor::Interceptor; use frida_gum::interceptor::Interceptor;
use libafl::{ use libafl::{
bolts::{os::find_mapping_for_address, ownedref::OwnedPtr, tuples::Named}, bolts::{os::find_mapping_for_address, ownedref::OwnedPtr, tuples::Named},
@ -256,10 +257,10 @@ impl AsanErrors {
name, address, size name, address, size
) )
.unwrap(); .unwrap();
let invocation = Interceptor::current_invocation();
let cpu_context = invocation.cpu_context();
#[cfg(target_arch = "aarch64")] #[cfg(target_arch = "aarch64")]
{ {
let invocation = Interceptor::current_invocation();
let cpu_context = invocation.cpu_context();
#[allow(clippy::non_ascii_literal)] #[allow(clippy::non_ascii_literal)]
writeln!(output, "{:━^100}", " REGISTERS ").unwrap(); writeln!(output, "{:━^100}", " REGISTERS ").unwrap();
for reg in 0..29 { for reg in 0..29 {

View File

@ -11,6 +11,7 @@ do
echo "[+] Checking fmt and building $fuzzer" echo "[+] Checking fmt and building $fuzzer"
cd $fuzzer \ cd $fuzzer \
&& cargo fmt --all -- --check \ && cargo fmt --all -- --check \
&& cargo clippy \
&& cargo build \ && cargo build \
&& cd .. \ && cd .. \
|| exit 1 || exit 1