diff options
| author | Patrick Meyer <meyerpatrick@google.com> | 2021-05-05 16:09:14 +0200 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2021-05-06 16:48:55 +0200 |
| commit | 1e18fbd85e30227cdb38428c07707c1128240adf (patch) | |
| tree | 44b348eb0884e2a09200099172e989d0d238939e /pkg | |
| parent | 886c4f7b376c6f92638a1f4e00ca7c1a71b78b56 (diff) | |
pkg/host, docs: fix typos
Diffstat (limited to 'pkg')
| -rw-r--r-- | pkg/host/syscalls.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/pkg/host/syscalls.go b/pkg/host/syscalls.go index 2abd3f16b..c6424bfe4 100644 --- a/pkg/host/syscalls.go +++ b/pkg/host/syscalls.go @@ -34,7 +34,7 @@ func DetectSupportedSyscalls(target *prog.Target, sandbox string) ( reason = disabledAttribute case c.CallName == "syz_execute_func": // syz_execute_func caused multiple problems: - // 1. First it lead to corpus exploision. The program used existing values in registers + // 1. First it lead to corpus explosion. The program used existing values in registers // to pollute output area. We tried to zero registers (though, not reliably). // 2. It lead to explosion again. The exact mechanics are unknown, here is one sample: // syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4 |
