Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for haslr (0.04 sec)

  1. pkg/test/framework/components/echo/echotest/filters.go

    var NoSelfCalls CombinationFilter = func(from echo.Instance, to echo.Instances) echo.Instances {
    	return match.Not(match.ServiceName(from.NamespacedName())).GetMatches(to)
    }
    
    // HasL7 only allows traffic where there is some L7 processing occurring on the path
    var HasL7 CombinationFilter = func(from echo.Instance, to echo.Instances) echo.Instances {
    	if from.Config().HasSidecar() || from.Config().IsProxylessGRPC() {
    		// client has l7
    		return to
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 29 23:48:45 UTC 2024
    - 8.9K bytes
    - Viewed (0)
  2. src/cmd/link/internal/ld/main.go

    	flagMsan          = flag.Bool("msan", false, "enable MSan interface")
    	flagAsan          = flag.Bool("asan", false, "enable ASan interface")
    	flagAslr          = flag.Bool("aslr", true, "enable ASLR for buildmode=c-shared on windows")
    
    	flagFieldTrack = flag.String("k", "", "set field tracking `symbol`")
    	flagLibGCC     = flag.String("libgcc", "", "compiler support lib for internal linking; use \"none\" to disable")
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 17 16:59:50 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  3. src/cmd/link/internal/ld/elf.go

    	out.Write(ELF_NOTE_NETBSD_NAME)
    	out.Write8(0)
    	out.Write32(ELF_NOTE_NETBSD_VERSION)
    
    	return int(sh.Size)
    }
    
    // The race detector can't handle ASLR (address space layout randomization).
    // ASLR is on by default for NetBSD, so we turn the ASLR off explicitly
    // using a magic elf Note when building race binaries.
    
    func elfnetbsdpax(sh *ElfShdr, startva uint64, resoff uint64) int {
    	n := int(Rnd(4, 4) + Rnd(4, 4))
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Apr 22 13:29:54 UTC 2024
    - 63.6K bytes
    - Viewed (0)
  4. src/cmd/vendor/github.com/google/pprof/internal/elfexec/elfexec.go

    		//       VADDR=0xffffffff80200000
    		// stextOffset=0xffffffff80200198
    		//       Start=0xffffffff83200000
    		//       Limit=0xffffffff84200000
    		//      Offset=0 (0xc000000000000000 for PowerPC64) (== Start for ASLR kernel)
    		// So the base should be:
    		if stextOffset != nil && (start%pageSize) == (*stextOffset%pageSize) {
    			// perf uses the address of _stext as start. Some tools may
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 31 19:48:28 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  5. src/cmd/link/internal/ld/lib.go

    		}
    	}
    
    	// Enable/disable ASLR on Windows.
    	addASLRargs := func(argv []string, val bool) []string {
    		// Old/ancient versions of GCC support "--dynamicbase" and
    		// "--high-entropy-va" but don't enable it by default. In
    		// addition, they don't accept "--disable-dynamicbase" or
    		// "--no-dynamicbase", so the only way to disable ASLR is to
    		// not pass any flags at all.
    		//
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue May 21 18:45:27 UTC 2024
    - 88.6K bytes
    - Viewed (0)
  6. src/internal/bisect/bisect.go

    func (m *Matcher) stack(w Writer) bool {
    	const maxStack = 16
    	var stk [maxStack]uintptr
    	n := runtime.Callers(2, stk[:])
    	// caller #2 is not for printing; need it to normalize PCs if ASLR.
    	if n <= 1 {
    		return false
    	}
    
    	base := stk[0]
    	// normalize PCs
    	for i := range stk[:n] {
    		stk[i] -= base
    	}
    
    	h := Hash(stk[:n])
    	if m.ShouldPrint(h) {
    		var d *dedup
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 03 17:28:43 UTC 2024
    - 22.9K bytes
    - Viewed (0)
  7. RELEASE.md

    *   Fixes segfault raised by calling session-only ops in eager mode,
        ([CVE-2020-15204](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15204))
    *   Fixes data leak and potential ASLR violation from `tf.raw_ops.StringNGrams`,
        ([CVE-2020-15205](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15205))
    *   Fixes segfaults caused by incomplete `SavedModel` validation,
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Tue Jun 11 23:24:08 UTC 2024
    - 730.3K bytes
    - Viewed (0)
Back to top