From 4a694d8a30d45d8ba9a652cffed128e134e57663 Mon Sep 17 00:00:00 2001 From: xclusivor Date: Wed, 6 Mar 2024 02:15:02 -0500 Subject: [PATCH] remove semicolons --- bindings/python/sample_x86.py | 2 +- bindings/python/shellcode.py | 2 +- tests/regress/hang.py | 2 +- tests/regress/hook_readonly_write_local.py | 4 ++-- tests/regress/jmp_ebx_hang.py | 4 ++-- 5 files changed, 7 insertions(+), 7 deletions(-) diff --git a/bindings/python/sample_x86.py b/bindings/python/sample_x86.py index 8d12e549be..36dfe735fa 100755 --- a/bindings/python/sample_x86.py +++ b/bindings/python/sample_x86.py @@ -36,7 +36,7 @@ def hook_code(uc, address, size, user_data): def hook_code64(uc, address, size, user_data): print(">>> Tracing instruction at 0x%x, instruction size = 0x%x" %(address, size)) rip = uc.reg_read(UC_X86_REG_RIP) - print(">>> RIP is 0x%x" %rip); + print(">>> RIP is 0x%x" %rip) # callback for tracing invalid memory access (READ or WRITE) diff --git a/bindings/python/shellcode.py b/bindings/python/shellcode.py index 3c63e90313..5c393e1f8c 100755 --- a/bindings/python/shellcode.py +++ b/bindings/python/shellcode.py @@ -74,7 +74,7 @@ def read_string(uc, address): def hook_intr(uc, intno, user_data): # only handle Linux syscall if intno != 0x80: - print("got interrupt %x ???" %intno); + print("got interrupt %x ???" %intno) uc.emu_stop() return diff --git a/tests/regress/hang.py b/tests/regress/hang.py index 9c8a3775bf..e38b1eb8dd 100755 --- a/tests/regress/hang.py +++ b/tests/regress/hang.py @@ -19,7 +19,7 @@ def hook_intr(uc, intno, user_data): # only handle Linux syscall rip = uc.reg_read(UC_X86_REG_RIP) if intno != 0x80: - print("=== 0x%x: got interrupt %x, quit" %(rip, intno)); + print("=== 0x%x: got interrupt %x, quit" %(rip, intno)) uc.emu_stop() return diff --git a/tests/regress/hook_readonly_write_local.py b/tests/regress/hook_readonly_write_local.py index 76b1589137..da9b92e510 100755 --- a/tests/regress/hook_readonly_write_local.py +++ b/tests/regress/hook_readonly_write_local.py @@ -12,7 +12,7 @@ def hook_mem_read(uc, access, address, size, value, data): print("Reading at " + str(address)) - uc.mem_write(address, CODE); + uc.mem_write(address, CODE) class REP(regress.RegressTest): @@ -21,7 +21,7 @@ def test_rep(self): mu.mem_map(0, PAGE_SIZE) mu.mem_write(0, CODE) - mu.mem_map(ACCESS_ADDR, PAGE_SIZE, UC_PROT_READ); + mu.mem_map(ACCESS_ADDR, PAGE_SIZE, UC_PROT_READ) mu.hook_add(UC_HOOK_MEM_READ, hook_mem_read, begin = ACCESS_ADDR, end = ACCESS_ADDR + PAGE_SIZE) mu.emu_start(0, len(CODE)) diff --git a/tests/regress/jmp_ebx_hang.py b/tests/regress/jmp_ebx_hang.py index 5b3952c737..8d654d4308 100755 --- a/tests/regress/jmp_ebx_hang.py +++ b/tests/regress/jmp_ebx_hang.py @@ -18,13 +18,13 @@ def runTest(self): # If EBX is zero then an exception is raised, as expected mu.reg_write(unicorn.x86_const.UC_X86_REG_EBX, 0x0) - print(">>> jmp ebx (ebx = 0)"); + print(">>> jmp ebx (ebx = 0)") with self.assertRaises(UcError) as m: mu.emu_start(CODE_ADDR, CODE_ADDR + 2, count=1) self.assertEqual(m.exception.errno, UC_ERR_FETCH_UNMAPPED) - print(">>> jmp ebx (ebx = 0xaa96a47f)"); + print(">>> jmp ebx (ebx = 0xaa96a47f)") mu = unicorn.Uc(UC_ARCH_X86, UC_MODE_32) mu.mem_map(CODE_ADDR, 1024 * 4) # If we write this address to EBX then the emulator hangs on emu_start