diff options
author | Andrea Fioraldi <andreafioraldi@gmail.com> | 2019-11-17 11:41:44 +0100 |
---|---|---|
committer | Andrea Fioraldi <andreafioraldi@gmail.com> | 2019-11-17 11:41:44 +0100 |
commit | f3a23e51fabf14f2bac1be26d1f55817c37e02a4 (patch) | |
tree | e9dbdcdb3110c6525eebc0a751307c8402b71ee7 | |
parent | 7e022a09ccd88cf91cfafbc3d61cdb93b961bbe7 (diff) | |
download | afl++-f3a23e51fabf14f2bac1be26d1f55817c37e02a4.tar.gz |
.
-rwxr-xr-x | qbdi_mode/README.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/qbdi_mode/README.md b/qbdi_mode/README.md index 49b4ecfb..641a6e85 100755 --- a/qbdi_mode/README.md +++ b/qbdi_mode/README.md @@ -85,7 +85,7 @@ this could build the afl-fuzz and also the qbdi template for android x86_64 The demo-so.c is an vulnerable library, it has a function for test -``` +```c int target_func(char *buf, int size) { printf("buffer:%p, size:%p\n", buf, size); @@ -126,7 +126,7 @@ int target_func(char *buf, int size) { This could be build to `libdemo.so`. Then we should load the library in template.cpp and find the `target` function address. -``` +```c void *handle = dlopen(lib_path, RTLD_LAZY); .......................................... .......................................... @@ -136,7 +136,7 @@ Then we should load the library in template.cpp and find the `target` function a then we read the data from file and call the function in `fuzz_func` -``` +```c QBDI_NOINLINE int fuzz_func() { if (afl_setup()) { afl_forkserver(); } |