From f3a23e51fabf14f2bac1be26d1f55817c37e02a4 Mon Sep 17 00:00:00 2001 From: Andrea Fioraldi Date: Sun, 17 Nov 2019 11:41:44 +0100 Subject: [PATCH] . --- qbdi_mode/README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/qbdi_mode/README.md b/qbdi_mode/README.md index 49b4ecfb..641a6e85 100755 --- a/qbdi_mode/README.md +++ b/qbdi_mode/README.md @@ -85,7 +85,7 @@ this could build the afl-fuzz and also the qbdi template for android x86_64 The demo-so.c is an vulnerable library, it has a function for test -``` +```c int target_func(char *buf, int size) { printf("buffer:%p, size:%p\n", buf, size); @@ -126,7 +126,7 @@ int target_func(char *buf, int size) { This could be build to `libdemo.so`. Then we should load the library in template.cpp and find the `target` function address. -``` +```c void *handle = dlopen(lib_path, RTLD_LAZY); .......................................... .......................................... @@ -136,7 +136,7 @@ Then we should load the library in template.cpp and find the `target` function a then we read the data from file and call the function in `fuzz_func` -``` +```c QBDI_NOINLINE int fuzz_func() { if (afl_setup()) { afl_forkserver(); }