- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for haslr (0.04 sec)
-
pkg/test/framework/components/echo/echotest/filters.go
var NoSelfCalls CombinationFilter = func(from echo.Instance, to echo.Instances) echo.Instances { return match.Not(match.ServiceName(from.NamespacedName())).GetMatches(to) } // HasL7 only allows traffic where there is some L7 processing occurring on the path var HasL7 CombinationFilter = func(from echo.Instance, to echo.Instances) echo.Instances { if from.Config().HasSidecar() || from.Config().IsProxylessGRPC() { // client has l7 return to
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 29 23:48:45 UTC 2024 - 8.9K bytes - Viewed (0) -
src/cmd/link/internal/ld/main.go
flagMsan = flag.Bool("msan", false, "enable MSan interface") flagAsan = flag.Bool("asan", false, "enable ASan interface") flagAslr = flag.Bool("aslr", true, "enable ASLR for buildmode=c-shared on windows") flagFieldTrack = flag.String("k", "", "set field tracking `symbol`") flagLibGCC = flag.String("libgcc", "", "compiler support lib for internal linking; use \"none\" to disable")
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 17 16:59:50 UTC 2024 - 16.6K bytes - Viewed (0) -
src/cmd/link/internal/ld/elf.go
out.Write(ELF_NOTE_NETBSD_NAME) out.Write8(0) out.Write32(ELF_NOTE_NETBSD_VERSION) return int(sh.Size) } // The race detector can't handle ASLR (address space layout randomization). // ASLR is on by default for NetBSD, so we turn the ASLR off explicitly // using a magic elf Note when building race binaries. func elfnetbsdpax(sh *ElfShdr, startva uint64, resoff uint64) int { n := int(Rnd(4, 4) + Rnd(4, 4))
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Apr 22 13:29:54 UTC 2024 - 63.6K bytes - Viewed (0) -
src/cmd/vendor/github.com/google/pprof/internal/elfexec/elfexec.go
// VADDR=0xffffffff80200000 // stextOffset=0xffffffff80200198 // Start=0xffffffff83200000 // Limit=0xffffffff84200000 // Offset=0 (0xc000000000000000 for PowerPC64) (== Start for ASLR kernel) // So the base should be: if stextOffset != nil && (start%pageSize) == (*stextOffset%pageSize) { // perf uses the address of _stext as start. Some tools may
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 31 19:48:28 UTC 2024 - 13.9K bytes - Viewed (0) -
src/cmd/link/internal/ld/lib.go
} } // Enable/disable ASLR on Windows. addASLRargs := func(argv []string, val bool) []string { // Old/ancient versions of GCC support "--dynamicbase" and // "--high-entropy-va" but don't enable it by default. In // addition, they don't accept "--disable-dynamicbase" or // "--no-dynamicbase", so the only way to disable ASLR is to // not pass any flags at all. //
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 21 18:45:27 UTC 2024 - 88.6K bytes - Viewed (0) -
src/internal/bisect/bisect.go
func (m *Matcher) stack(w Writer) bool { const maxStack = 16 var stk [maxStack]uintptr n := runtime.Callers(2, stk[:]) // caller #2 is not for printing; need it to normalize PCs if ASLR. if n <= 1 { return false } base := stk[0] // normalize PCs for i := range stk[:n] { stk[i] -= base } h := Hash(stk[:n]) if m.ShouldPrint(h) { var d *dedup
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 03 17:28:43 UTC 2024 - 22.9K bytes - Viewed (0) -
RELEASE.md
* Fixes segfault raised by calling session-only ops in eager mode, ([CVE-2020-15204](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15204)) * Fixes data leak and potential ASLR violation from `tf.raw_ops.StringNGrams`, ([CVE-2020-15205](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15205)) * Fixes segfaults caused by incomplete `SavedModel` validation,
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Tue Jun 11 23:24:08 UTC 2024 - 730.3K bytes - Viewed (0)