Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for Syscall (0.17 sec)

  1. doc/asm.html

    in a Go source file in the same package. The name of the assembly
    function must not contain the package name component (for example,
    function <code>Syscall</code> in package <code>syscall</code> should
    use the name <codeSyscall</code> instead of the equivalent name
    <code>syscall·Syscall</code> in its <code>TEXT</code> directive).
    For more complex situations, explicit annotation is needed.
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Fri Nov 14 19:09:46 UTC 2025
    - 36.5K bytes
    - Viewed (0)
  2. src/cmd/asm/internal/asm/testdata/loong64enc1.s

    	SRA	$4, R4			// 84904800
    	ROTR	$4, R4, R5		// 85904c00
    	ROTR	$4, R4			// 84904c00
    	SLLV	$4, R4, R5		// 85104100
    	SLLV	$4, R4			// 84104100
    	ROTRV	$4, R4, R5		// 85104d00
    	ROTRV	$4, R4			// 84104d00
    	SYSCALL				// 00002b00
    	BEQ	R4, R5, 1(PC)		// 85040058
    	BEQ	R4, 1(PC)		// 80040040
    	BEQ	R4, R0, 1(PC)		// 80040040
    	BEQ	R0, R4, 1(PC)		// 80040040
    	BNE	R4, R5, 1(PC)		// 8504005c
    	BNE	R4, 1(PC)		// 80040044
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Nov 27 00:46:52 UTC 2025
    - 44.5K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.31.md

    - Kubelet now hard rejects pods with AppArmor if the node does not have AppArmor. ([#125776](https://github.com/kubernetes/kubernetes/pull/125776), [@vinayakankugoyal](https://github.com/vinayakankugoyal))
    - Mount-utils: treated syscall.ENODEV as corrupted mount. ([#126174](https://github.com/kubernetes/kubernetes/pull/126174), [@dobsonj](https://github.com/dobsonj))
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Wed Nov 12 11:33:21 UTC 2025
    - 451.9K bytes
    - Viewed (0)
  4. lib/fips140/v1.1.0-rc1.zip

    ppc64le || s390x) && !purego && linux package nistec import ( "syscall" "testing" "unsafe" ) // Lightly adapted from the bytes test package. Allocate a pair of T one at the start of a page, another at the // end. Any access beyond or before the page boundary should cause a fault. This is linux specific. func dangerousObjs[T any](t *testing.T) (start *T, end *T) { pagesize := syscall.Getpagesize() b, err := syscall.Mmap(0, 0, 3*pagesize, syscall.PROT_READ|syscall.PROT_WRITE, syscall.MAP_ANONYMOUS|syscall.MAP_PRIVATE)...
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Dec 11 16:27:41 UTC 2025
    - 663K bytes
    - Viewed (0)
  5. src/cmd/asm/internal/asm/testdata/riscv64.s

    	VMV4RV		V8, V4				// 57b2819e
    	VMV8RV		V8, V0				// 57b0839e
    
    	//
    	// Privileged ISA
    	//
    
    	// 3.3.1: Environment Call and Breakpoint
    	ECALL						// 73000000
    	SCALL						// 73000000
    	EBREAK						// 73001000
    	SBREAK						// 73001000
    
    	// Arbitrary bytes (entered in little-endian mode)
    	WORD	$0x12345678	// WORD $305419896	// 78563412
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Nov 13 12:17:37 UTC 2025
    - 73.7K bytes
    - Viewed (0)
Back to top