- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 17 for asanread (0.51 sec)
-
src/runtime/asan.go
// asan{read,write} are nosplit because they may be called between // fork and exec, when the stack must not grow. See issue #50391. //go:linkname asanread //go:nosplit func asanread(addr unsafe.Pointer, sz uintptr) { sp := getcallersp() pc := getcallerpc() doasanread(addr, sz, sp, pc) } //go:linkname asanwrite //go:nosplit func asanwrite(addr unsafe.Pointer, sz uintptr) { sp := getcallersp()
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Feb 13 20:39:58 UTC 2024 - 1.6K bytes - Viewed (0) -
src/internal/asan/asan.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Mar 19 16:19:26 UTC 2024 - 399 bytes - Viewed (0) -
src/runtime/asan0.go
package runtime import ( "unsafe" ) const asanenabled = false // Because asanenabled is false, none of these functions should be called. func asanread(addr unsafe.Pointer, sz uintptr) { throw("asan") } func asanwrite(addr unsafe.Pointer, sz uintptr) { throw("asan") } func asanunpoison(addr unsafe.Pointer, sz uintptr) { throw("asan") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Dec 15 21:57:36 UTC 2023 - 760 bytes - Viewed (0) -
src/cmd/compile/internal/ir/symtab.go
) // Syms holds known symbols. var Syms symsStruct type symsStruct struct { AssertE2I *obj.LSym AssertE2I2 *obj.LSym AssertI2I *obj.LSym AssertI2I2 *obj.LSym Asanread *obj.LSym Asanwrite *obj.LSym CgoCheckMemmove *obj.LSym CgoCheckPtrWrite *obj.LSym CheckPtrAlignment *obj.LSym Deferproc *obj.LSym Deferprocat *obj.LSym
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 06 17:02:26 UTC 2023 - 2K bytes - Viewed (0) -
src/cmd/internal/goobj/builtinlist.go
{"runtime.racefuncexit", 1}, {"runtime.raceread", 1}, {"runtime.racewrite", 1}, {"runtime.racereadrange", 1}, {"runtime.racewriterange", 1}, {"runtime.msanread", 1}, {"runtime.msanwrite", 1}, {"runtime.msanmove", 1}, {"runtime.asanread", 1}, {"runtime.asanwrite", 1}, {"runtime.checkptrAlignment", 1}, {"runtime.checkptrArithmetic", 1}, {"runtime.libfuzzerTraceCmp1", 1},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 21 21:08:03 UTC 2024 - 7.4K bytes - Viewed (0) -
src/runtime/msan.go
// marked part of that stack as uninitialized. We don't instrument // the runtime, but operations like a slice copy can call msanread // anyhow for values on the stack. Just ignore msanread when running // on the system stack. The other msan functions are fine. // //go:linkname msanread //go:nosplit func msanread(addr unsafe.Pointer, sz uintptr) { gp := getg() if gp == nil || gp.m == nil || gp == gp.m.g0 || gp == gp.m.gsignal { return
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Feb 20 20:50:21 UTC 2024 - 1.6K bytes - Viewed (0) -
src/internal/msan/msan.go
// license that can be found in the LICENSE file. //go:build msan package msan import ( "unsafe" ) const Enabled = true //go:linkname Read runtime.msanread func Read(addr unsafe.Pointer, sz uintptr) //go:linkname Write runtime.msanwrite func Write(addr unsafe.Pointer, sz uintptr) //go:linkname Malloc runtime.msanmalloc func Malloc(addr unsafe.Pointer, sz uintptr)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Feb 20 20:50:21 UTC 2024 - 647 bytes - Viewed (0) -
src/runtime/msan_arm64.s
//go:build msan #include "go_asm.h" #include "textflag.h" #define RARG0 R0 #define RARG1 R1 #define RARG2 R2 #define FARG R3 // func runtime·domsanread(addr unsafe.Pointer, sz uintptr) // Called from msanread. TEXT runtime·domsanread(SB), NOSPLIT, $0-16 MOVD addr+0(FP), RARG0 MOVD sz+8(FP), RARG1 // void __msan_read_go(void *addr, uintptr_t sz); MOVD $__msan_read_go(SB), FARG JMP msancall<>(SB)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jan 09 01:36:54 UTC 2024 - 2K bytes - Viewed (0) -
src/cmd/cgo/internal/testsanitizers/testdata/msan6.go
// the stack as uninitialized. // //go:noinline func F1() uintptr { s := C.f() return uintptr(s.a[0]) } // F2 allocates a struct on the stack and converts it to an empty interface, // which will call msanread and see that the data appears uninitialized. // //go:noinline func F2() interface{} { return C.S{} } func poisonStack(i int) int { if i == 0 { return int(F1()) } F1()
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 12 11:59:56 UTC 2023 - 1.4K bytes - Viewed (0) -
src/runtime/msan_loong64.s
//go:build msan #include "go_asm.h" #include "textflag.h" #define RARG0 R4 #define RARG1 R5 #define RARG2 R6 #define FARG R7 // func runtime·domsanread(addr unsafe.Pointer, sz uintptr) // Called from msanread. TEXT runtime·domsanread(SB), NOSPLIT, $0-16 MOVV addr+0(FP), RARG0 MOVV sz+8(FP), RARG1 // void __msan_read_go(void *addr, uintptr_t sz); MOVV $__msan_read_go(SB), FARG JMP msancall<>(SB)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jan 09 01:36:54 UTC 2024 - 2K bytes - Viewed (0)