Skip to content

Commit f0c7a8f

Browse files
authored
Merge pull request #6 from rofrol/patch-1
sysem -> system
2 parents b0e1048 + 56d8306 commit f0c7a8f

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ This is a drop-in replacement for OS memory allocator that can be used to detect
55
* Your code contains inline assembly or links to proprietary libraries that cannot be instrumented by MSAN
66
* You want to find vulnerabilities in black-box binaries that you do not have the source code for (not always straightforward, see below)
77
* You want to check if the bug MSAN found is actually exploitable, i.e. if the uninitialized memory contents actually show up in the output
8-
* You're debugging code that is specific to an exotic CPU architecture or operating sysem where MSAN is not available, such as macOS. If you're on a really obscure platform that doesn't have a Rust compiler, a less robust [C99 implementation](https://github.com/Shnatsel/libdiffuzz-c99) is available.
8+
* You're debugging code that is specific to an exotic CPU architecture or operating system where MSAN is not available, such as macOS. If you're on a really obscure platform that doesn't have a Rust compiler, a less robust [C99 implementation](https://github.com/Shnatsel/libdiffuzz-c99) is available.
99

1010
**This is not a drop-in replacement for Memory Sanitizer!** It will likely require changes to your code or your testing setup, see below.
1111

0 commit comments

Comments
 (0)