| /freebsd/contrib/llvm-project/compiler-rt/lib/tsan/rtl/ |
| H A D | tsan_interface_ann.cpp | 9 // This file is a part of ThreadSanitizer (TSan), a race detector. 83 ExpectRace *race = list->next; in AddExpectRace() local 84 for (; race != list; race = race->next) { in AddExpectRace() 85 if (race->addr == addr && race->size == size) { in AddExpectRace() 86 atomic_store_relaxed(&race->addcount, in AddExpectRace() 87 atomic_load_relaxed(&race->addcount) + 1); in AddExpectRace() 91 race = static_cast<ExpectRace *>(Alloc(sizeof(ExpectRace))); in AddExpectRace() 92 race->addr = addr; in AddExpectRace() 93 race->size = size; in AddExpectRace() 94 race->file = f; in AddExpectRace() [all …]
|
| H A D | tsan_flags.inc | 21 // Suppress a race report if we've already output another race report 24 "Suppress a race report if we've already output another race report "
|
| H A D | tsan_suppressions.cpp | 9 // This file is a part of ThreadSanitizer (TSan), a race detector. 29 "race:^_M_rep$\n" 30 "race:^_M_is_leaked$\n" 34 "race:std::_Sp_counted_ptr_inplace<std::thread::_Impl\n";
|
| H A D | tsan_external.cpp | 9 // This file is a part of ThreadSanitizer (TSan), a race detector. 30 {"Swift variable", "Swift access race"}, 89 internal_snprintf(header, sizeof(header), "race on %s", object_type); in __tsan_external_register_tag()
|
| H A D | tsan_suppressions.h | 9 // This file is a part of ThreadSanitizer (TSan), a race detector. 21 const char kSuppressionRace[] = "race";
|
| H A D | tsan_debugging.cpp | 9 // This file is a part of ThreadSanitizer (TSan), a race detector. 23 case ReportTypeRace: return "data-race"; in ReportTypeDescription() 24 case ReportTypeVptrRace: return "data-race-vptr"; in ReportTypeDescription() 27 case ReportTypeExternalRace: return "external-race"; in ReportTypeDescription()
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_mount/ |
| H A D | zfs_mount_test_race.ksh | 27 # under race condition which resulted in undefined mount order. The purpose 30 # race. See github.com/openzfs/zfs/issues/{8450,8833,8878} for details. 81 # Note that unmount can fail (due to race condition on `zfs mount -a`) with or 82 # without `canmount=off`. The race has nothing to do with canmount property, 89 # could race, and TESTFS2 usually (actually always) won in OpenZFS. 92 # This layout is just an example that can reproduce race, 105 # This unmount always succeeds, because potential race hasn't happened yet. 107 # This mount always succeeds, whether threads are under race condition or not. 110 # Verify datasets are mounted (TESTFS2 fails if the race broke mount order). 113 # Verify unmount succeeds (fails if the race broke mount order).
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_destroy/ |
| H A D | zfs_clone_livelist_condense_races.ksh | 19 # Test race conditions for livelist condensing 28 # 1. Deletion race: repeatedly overwrite the same file to trigger condense 30 # 2. Disable race: Overwrite enough files to trigger condenses and disabling of 32 # 3. Export race: repeatedly overwrite the same file to trigger condense and 60 log_fail "delete/condense race test failed" 74 log_fail "export/condense race test failed" 90 log_fail "disable/condense race test failed" 124 log_pass "Clone livelist condense race conditions passed."
|
| /freebsd/contrib/netbsd-tests/fs/vfs/ |
| H A D | t_renamerace.c | 127 atf_tc_fail("race did not trigger this time"); in renamerace() 132 * XXX: race does not trigger every time at least in renamerace() 139 atf_tc_fail("race did not trigger this time"); in renamerace() 180 ATF_TC_FSAPPLY(renamerace, "rename(2) race with file unlinked mid-operation"); 181 ATF_TC_FSAPPLY(renamerace_dirs, "rename(2) race with directories");
|
| H A D | t_rmdirrace.c | 66 race(const atf_tc_t *tc, const char *path) in race() function 106 ATF_FSAPPLY(race, "rmdir(2) race");
|
| /freebsd/tools/regression/sockets/unix_close_race/ |
| H A D | unix_close_race.c | 28 * This regression test attempts to trigger a race that occurs when both 34 * This race is fairly timing-dependent, so it effectively requires SMP, and 74 warnx("SMP not present, test may be unable to trigger race"); in main() 102 * socket, attempting to induce the race. in main() 129 * the race here so report errors from close(). in main()
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rename_dirs/ |
| H A D | rename_dirs_001_pos.ksh | 38 # directory across the two trees. ZFS should be able to handle the race 55 log_assert "ZFS can handle race directory rename operation." 69 log_pass "ZFS handle race directory rename operation as expected."
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_export/ |
| H A D | zpool_export_parallel_admin.ksh | 37 # Verify that admin commands cannot race a pool export 56 log_assert "admin commands cannot race a pool export" 73 log_pass "admin commands cannot race a pool export"
|
| /freebsd/tests/sys/fs/fusefs/ |
| H A D | last_local_modify.cc | 46 * This file tests a class of race conditions caused by one thread fetching a 53 * FUSE_GETATTR is not vulnerable to the same race, because it is always called 56 * A few other operations like FUSE_LINK can also trigger the same race but 179 * The race condition affects both direct and non-direct writes, and in write_th() 183 * race cannot work. Therefore, test with O_DIRECT only. in write_th() 259 * a race, don't reply. Instead, just save the unique for in TEST_P() 343 /* Lookup again, which will race with the mutator */ in TEST_P() 410 /* Called by fhstat. Block to simulate a race */ in TEST_P() 503 /* Lookup again, which will race with setattr */ in TEST_P()
|
| /freebsd/crypto/openssh/regress/ |
| H A D | multiplex.sh | 93 sleep 1 # XXX remove once race fixed 104 sleep 1 # XXX remove once race fixed 138 sleep 1 # XXX remove once race fixed 149 sleep 1 # XXX remove once race fixed 160 sleep 1 # XXX remove once race fixed 173 sleep 1 # XXX remove once race fixed
|
| /freebsd/tests/sys/cddl/zfs/tests/rename_dirs/ |
| H A D | rename_dirs_001_pos.ksh | 37 # directory across the two trees. ZFS should be able to handle the race 63 log_assert "ZFS can handle race directory rename operation." 80 log_pass "ZFS handle race directory rename operation as expected."
|
| /freebsd/contrib/bmake/unit-tests/ |
| H A D | opt-debug-jobs.mk | 28 # Avoid a race condition in the debug output. Without sleeping, 32 # another race condition with the "exited/stopped" line.
|
| /freebsd/contrib/sendmail/ |
| H A D | KNOWNBUGS | 234 * Berkeley DB 2.X race condition with fcntl() locking 236 There is a race condition for Berkeley DB 2.X databases on 249 Sleepycat Software has added code to avoid this race condition to 261 * Race condition for delivery to set-user-ID files 267 permission failure race as sendmail checks the permissions before locking
|
| /freebsd/contrib/llvm-project/lldb/source/Plugins/InstrumentationRuntime/TSan/ |
| H A D | InstrumentationRuntimeTSan.cpp | 500 if (description == "data-race") { in FormatDescription() 501 return "Data race"; in FormatDescription() 502 } else if (description == "data-race-vptr") { in FormatDescription() 503 return "Data race on C++ virtual pointer"; in FormatDescription() 528 } else if (description == "external-race") { in FormatDescription() 529 return "Race on a library object"; in FormatDescription() 530 } else if (description == "swift-access-race") { in FormatDescription() 531 return "Swift access race"; in FormatDescription() 626 "external-race"; in GenerateSummary() 670 summary = "Race on " + object_type + " object"; in GenerateSummary() [all …]
|
| /freebsd/share/man/man7/ |
| H A D | sprog.7 | 145 .Ss Race Conditions 146 A race condition is anomalous behavior caused by the relative timing of 149 The most common causes of race conditions are signals, access checks, and
|
| /freebsd/lib/libc/stdio/ |
| H A D | mktemp.3 | 87 This avoids the race between testing for a file's existence and opening it 325 This makes the race in 338 should be used instead, since they do not have the race condition.
|
| /freebsd/sys/contrib/openzfs/include/os/linux/spl/sys/ |
| H A D | mutex.h | 163 * does not guarantee serialization upon itself, allowing a race where latter 166 * The race renders it unsafe to be used for serializing the freeing of an 176 * See http://lwn.net/Articles/575477/ for the information about the race.
|
| /freebsd/sys/geom/ |
| H A D | notes | 21 following race condition: A class intend to split a bio in two 27 There is no race present in the common case where the bio is split 34 In all other cases, this race needs to be mitigated, for instance 38 it directly opens another race since the assumption is that
|
| /freebsd/tests/sys/cddl/zfs/bin/ |
| H A D | rename_dir.c | 32 * the race situation. 53 char *msg = "rename() fails to handle race situation\n"; in main()
|
| /freebsd/share/man/man4/ |
| H A D | mlx.4 | 101 .It mlx%d: mirror race recovery in progress 102 .It mlx%d: mirror race on a critical system drive 103 .It mlx%d: mirror race recovery failed
|