- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 506 for signalM (0.23 sec)
-
pkg/windows/service/service.go
case svc.Interrogate: s <- c.CurrentStatus case svc.Stop, svc.Shutdown: klog.Infof("Service stopping") // We need to translate this request into a signal that can be handled by the signal handler // handling shutdowns normally (currently apiserver/pkg/server/signal.go). // If we do not do this, our main threads won't be notified of the upcoming shutdown.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 24 11:25:33 UTC 2022 - 3.3K bytes - Viewed (0) -
src/runtime/cgo/gcc_signal_ios_arm64.c
// Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Emulation of the Unix signal SIGSEGV. // // On iOS, Go tests and apps under development are run by lldb. // The debugger uses a task-level exception handler to intercept signals. // Despite having a 'handle' mechanism like gdb, lldb will not allow a // SIGSEGV to pass to the running program. For Go, this means we cannot
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Mar 21 21:04:22 UTC 2024 - 6K bytes - Viewed (0) -
src/runtime/cpuprof.go
log *profBuf // profile events written here // extra holds extra stacks accumulated in addNonGo // corresponding to profiling signals arriving on // non-Go-created threads. Those stacks are written // to log the next time a normal Go thread gets the // signal handler. // Assuming the stacks are 2 words each (we don't get // a full traceback from those threads), plus one word
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 8.5K bytes - Viewed (0) -
src/runtime/testdata/testprogcgo/raceprof.go
//go:build unix // +build unix package main // Test that we can collect a lot of colliding profiling signals from // an external C thread. This used to fail when built with the race // detector, because a call of the predeclared function copy was // turned into a call to runtime.slicecopy, which is not marked nosplit. /* #include <signal.h> #include <stdint.h> #include <pthread.h> #include <sched.h> struct cgoTracebackArg {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Apr 24 18:13:14 UTC 2023 - 1.7K bytes - Viewed (0) -
src/os/exec_posix.go
"runtime" "syscall" ) // The only signal values guaranteed to be present in the os package on all // systems are os.Interrupt (send the process an interrupt) and os.Kill (force // the process to exit). On Windows, sending os.Interrupt to a process with // os.Process.Signal is not implemented; it will return an error instead of // sending a signal. var ( Interrupt Signal = syscall.SIGINT Kill Signal = syscall.SIGKILL )
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 10 22:06:47 UTC 2024 - 3.7K bytes - Viewed (0) -
src/runtime/testdata/testprogcgo/pprof_callback.go
} //export goCallbackPprof func goCallbackPprof() { // No-op. We want to stress the cgocall and cgocallback internals, // landing as many pprof signals there as possible. } func CgoPprofCallback() { // Issue 50936 was a crash in the SIGPROF handler when the signal // arrived during the exitsyscall following a cgocall(back) in dropg or // execute, when updating mp.curg. //
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Jun 08 15:44:05 UTC 2022 - 1.8K bytes - Viewed (0) -
src/runtime/time_linux_amd64.s
MOVQ R12, SP // Restore real SP // Restore vdsoPC, vdsoSP // We don't worry about being signaled between the two stores. // If we are not in a signal handler, we'll restore vdsoSP to 0, // and no one will care about vdsoPC. If we are in a signal handler, // we cannot receive another signal. MOVQ 8(SP), SI MOVQ SI, m_vdsoSP(BX) MOVQ 0(SP), SI MOVQ SI, m_vdsoPC(BX)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sat Nov 06 10:24:44 UTC 2021 - 2K bytes - Viewed (0) -
src/runtime/signal_darwin_amd64.go
// than it does for an attempt to access a valid but unmapped address. // OS X 10.9.2 mishandles the malformed address case, making it look like // a user-generated signal (like someone ran kill -SEGV ourpid). // We pass user-generated signals to os/signal, or else ignore them. // Doing that here - and returning to the faulting code - results in an // infinite loop. It appears the best we can do is rewrite what the kernel
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Aug 19 23:07:11 UTC 2022 - 4K bytes - Viewed (0) -
build/pause/linux/pause.c
limitations under the License. */ #include <signal.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/types.h> #include <sys/wait.h> #include <unistd.h> #define STRINGIFY(x) #x #define VERSION_STRING(x) STRINGIFY(x) #ifndef VERSION #define VERSION HEAD #endif static void sigdown(int signo) { psignal(signo, "Shutting down, got signal"); exit(0); }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Sep 26 13:26:24 UTC 2020 - 1.8K bytes - Viewed (0) -
src/runtime/cgo/gcc_util.c
/* The libc function(s) we call here must form a no-op and include at least one call that triggers TSAN to process pending asynchronous signals. sleep(0) would be fine, but it's not portable C (so it would need more header guards). free(NULL) has a fast-path special case in TSAN, so it doesn't trigger signal delivery. free(malloc(0)) would work (triggering the interceptors in malloc), but it also runs a bunch of user-supplied malloc hooks.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Aug 16 18:49:38 UTC 2017 - 1.8K bytes - Viewed (0)