diff options
author | Russ Cox <rsc@golang.org> | 2020-06-08 12:39:56 -0400 |
---|---|---|
committer | Russ Cox <rsc@golang.org> | 2020-06-08 21:36:04 +0000 |
commit | 2cd2ff6f564dce5be0c4fb7f06338ff7af3fc9a9 (patch) | |
tree | dd814923cd9b140f8868340a112501f2bda4f1b1 /src/runtime/cgo_sigaction.go | |
parent | bddf75d88859b8454f67de32510d8488329d0f2b (diff) | |
download | go-2cd2ff6f564dce5be0c4fb7f06338ff7af3fc9a9.tar.gz go-2cd2ff6f564dce5be0c4fb7f06338ff7af3fc9a9.zip |
all: avoid awkward wording from CL 236857
CL 236857 removed all uses of whitelist/blacklist, which is great.
But it substituted awkward phrasing using allowlist/blocklist,
especially as verbs or participles. This CL uses more standard English,
like "allow the function" or "blocked functions" instead of
"allowlist the function" or "blocklisted functions".
Change-Id: I9106a2fdbd62751c4cbda3a77181358a8a6d0f13
Reviewed-on: https://go-review.googlesource.com/c/go/+/236917
Run-TryBot: Russ Cox <rsc@golang.org>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
Diffstat (limited to 'src/runtime/cgo_sigaction.go')
-rw-r--r-- | src/runtime/cgo_sigaction.go | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/runtime/cgo_sigaction.go b/src/runtime/cgo_sigaction.go index 967b8b9a0d..de634dc957 100644 --- a/src/runtime/cgo_sigaction.go +++ b/src/runtime/cgo_sigaction.go @@ -18,12 +18,12 @@ var _cgo_sigaction unsafe.Pointer //go:nosplit //go:nowritebarrierrec func sigaction(sig uint32, new, old *sigactiont) { - // The runtime package is explicitly blocklisted from sanitizer - // instrumentation in racewalk.go, but we might be calling into instrumented C - // functions here — so we need the pointer parameters to be properly marked. + // racewalk.go avoids adding sanitizing instrumentation to package runtime, + // but we might be calling into instrumented C functions here, + // so we need the pointer parameters to be properly marked. // - // Mark the input as having been written before the call and the output as - // read after. + // Mark the input as having been written before the call + // and the output as read after. if msanenabled && new != nil { msanwrite(unsafe.Pointer(new), unsafe.Sizeof(*new)) } |