diff --git a/src/windows-emulator/syscall_dispatcher.cpp b/src/windows-emulator/syscall_dispatcher.cpp index e5661617..bd13a2df 100644 --- a/src/windows-emulator/syscall_dispatcher.cpp +++ b/src/windows-emulator/syscall_dispatcher.cpp @@ -106,9 +106,9 @@ void syscall_dispatcher::dispatch(windows_emulator& win_emu) const auto return_address = c.emu.read_memory(rsp); const auto* mod_name = context.mod_manager.find_name(return_address); - win_emu.log.print(color::dark_gray, "Executing syscall: %s (0x%X) at 0x%llX via 0x%llX (%s) %lld\n", + win_emu.log.print(color::dark_gray, "Executing syscall: %s (0x%X) at 0x%llX via 0x%llX (%s)\n", entry->second.name.c_str(), - syscall_id, address, return_address, mod_name, c.proc.executed_instructions); + syscall_id, address, return_address, mod_name); } else { diff --git a/src/windows-emulator/windows_emulator.cpp b/src/windows-emulator/windows_emulator.cpp index 27451230..4ce13ac1 100644 --- a/src/windows-emulator/windows_emulator.cpp +++ b/src/windows-emulator/windows_emulator.cpp @@ -907,7 +907,7 @@ void windows_emulator::setup_hooks() { const auto ip = this->emu().read_instruction_pointer(); - printf("Invalid instruction at: 0x%" PRIu64 "\n", ip); + this->log.print(color::gray, "Invalid instruction at: 0x%" PRIu64 "\n", ip); return instruction_hook_continuation::skip_instruction; }); @@ -921,7 +921,7 @@ void windows_emulator::setup_hooks() } const auto rip = this->emu().read_instruction_pointer(); - printf("Interrupt: %i 0x%" PRIu64 "\n", interrupt, rip); + this->log.print(color::gray, "Interrupt: %i 0x%" PRIu64 "\n", interrupt, rip); if (this->fuzzing || true) // TODO: Fix {