aboutsummaryrefslogtreecommitdiff
path: root/src/runtime/cgo_sigaction.go
diff options
context:
space:
mode:
authorRuss Cox <rsc@golang.org>2020-06-08 12:39:56 -0400
committerRuss Cox <rsc@golang.org>2020-06-08 21:36:04 +0000
commit2cd2ff6f564dce5be0c4fb7f06338ff7af3fc9a9 (patch)
treedd814923cd9b140f8868340a112501f2bda4f1b1 /src/runtime/cgo_sigaction.go
parentbddf75d88859b8454f67de32510d8488329d0f2b (diff)
downloadgo-2cd2ff6f564dce5be0c4fb7f06338ff7af3fc9a9.tar.gz
go-2cd2ff6f564dce5be0c4fb7f06338ff7af3fc9a9.zip
all: avoid awkward wording from CL 236857
CL 236857 removed all uses of whitelist/blacklist, which is great. But it substituted awkward phrasing using allowlist/blocklist, especially as verbs or participles. This CL uses more standard English, like "allow the function" or "blocked functions" instead of "allowlist the function" or "blocklisted functions". Change-Id: I9106a2fdbd62751c4cbda3a77181358a8a6d0f13 Reviewed-on: https://go-review.googlesource.com/c/go/+/236917 Run-TryBot: Russ Cox <rsc@golang.org> Reviewed-by: Ian Lance Taylor <iant@golang.org>
Diffstat (limited to 'src/runtime/cgo_sigaction.go')
-rw-r--r--src/runtime/cgo_sigaction.go10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/runtime/cgo_sigaction.go b/src/runtime/cgo_sigaction.go
index 967b8b9a0d..de634dc957 100644
--- a/src/runtime/cgo_sigaction.go
+++ b/src/runtime/cgo_sigaction.go
@@ -18,12 +18,12 @@ var _cgo_sigaction unsafe.Pointer
//go:nosplit
//go:nowritebarrierrec
func sigaction(sig uint32, new, old *sigactiont) {
- // The runtime package is explicitly blocklisted from sanitizer
- // instrumentation in racewalk.go, but we might be calling into instrumented C
- // functions here — so we need the pointer parameters to be properly marked.
+ // racewalk.go avoids adding sanitizing instrumentation to package runtime,
+ // but we might be calling into instrumented C functions here,
+ // so we need the pointer parameters to be properly marked.
//
- // Mark the input as having been written before the call and the output as
- // read after.
+ // Mark the input as having been written before the call
+ // and the output as read after.
if msanenabled && new != nil {
msanwrite(unsafe.Pointer(new), unsafe.Sizeof(*new))
}