shithub: fuzz

Download patch

ref: d663902e8e316f8274cd0e2a944473a1268b3dae
parent: 09f767f8fe18a9560f850c30f1118316299f1c0a
author: Anthony House <tuffant21@aim.com>
date: Sat Nov 24 10:59:33 EST 2018

trying to find the bug

--- a/input.c
+++ b/input.c
@@ -466,9 +466,9 @@
 			break;
 		case sc_read :			//	read(int : void* : long);
 			// mutate the input
-			mut_int((int*)lget(&(sc->inputs), 0), sc->round);
-			mut_voidstar((void**)lget(&(sc->inputs), 1), sc->round);
-			mut_long((long*)lget(&(sc->inputs), 2), sc->round);
+			mut_int((int*)lget(&(sc->inputs), 0), &sc->round);
+			mut_voidstar((void**)lget(&(sc->inputs), 1), &sc->round);
+			mut_long((long*)lget(&(sc->inputs), 2), &sc->round);
 
 			// log the variables
 			log_call(sc);
--- a/mutate.c
+++ b/mutate.c
@@ -22,7 +22,6 @@
 //    }
 //    else
 //    {
-dolog("The value of round is: %d", *round);
         (*in_val) << (rand() % (4 + 1 - 0) + 0);
         (*in_val) |= (rand() % (15 + 1 - 0) + 0);
 //    }