Home
last modified time | relevance | path

Searched full:race (Results 1 – 25 of 877) sorted by relevance

12345678910>>...36

/freebsd/contrib/llvm-project/compiler-rt/lib/tsan/rtl/
H A Dtsan_interface_ann.cpp9 // This file is a part of ThreadSanitizer (TSan), a race detector.
83 ExpectRace *race = list->next; in AddExpectRace() local
84 for (; race != list; race = race->next) { in AddExpectRace()
85 if (race->addr == addr && race->size == size) { in AddExpectRace()
86 atomic_store_relaxed(&race->addcount, in AddExpectRace()
87 atomic_load_relaxed(&race->addcount) + 1); in AddExpectRace()
91 race = static_cast<ExpectRace *>(Alloc(sizeof(ExpectRace))); in AddExpectRace()
92 race->addr = addr; in AddExpectRace()
93 race->size = size; in AddExpectRace()
94 race->file = f; in AddExpectRace()
[all …]
H A Dtsan_flags.inc21 // Suppress a race report if we've already output another race report
24 "Suppress a race report if we've already output another race report "
H A Dtsan_suppressions.cpp9 // This file is a part of ThreadSanitizer (TSan), a race detector.
29 "race:^_M_rep$\n"
30 "race:^_M_is_leaked$\n"
34 "race:std::_Sp_counted_ptr_inplace<std::thread::_Impl\n";
H A Dtsan_external.cpp9 // This file is a part of ThreadSanitizer (TSan), a race detector.
30 {"Swift variable", "Swift access race"},
89 internal_snprintf(header, sizeof(header), "race on %s", object_type); in __tsan_external_register_tag()
H A Dtsan_suppressions.h9 // This file is a part of ThreadSanitizer (TSan), a race detector.
21 const char kSuppressionRace[] = "race";
H A Dtsan_debugging.cpp9 // This file is a part of ThreadSanitizer (TSan), a race detector.
23 case ReportTypeRace: return "data-race"; in ReportTypeDescription()
24 case ReportTypeVptrRace: return "data-race-vptr"; in ReportTypeDescription()
27 case ReportTypeExternalRace: return "external-race"; in ReportTypeDescription()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_mount/
H A Dzfs_mount_test_race.ksh27 # under race condition which resulted in undefined mount order. The purpose
30 # race. See github.com/openzfs/zfs/issues/{8450,8833,8878} for details.
81 # Note that unmount can fail (due to race condition on `zfs mount -a`) with or
82 # without `canmount=off`. The race has nothing to do with canmount property,
89 # could race, and TESTFS2 usually (actually always) won in OpenZFS.
92 # This layout is just an example that can reproduce race,
105 # This unmount always succeeds, because potential race hasn't happened yet.
107 # This mount always succeeds, whether threads are under race condition or not.
110 # Verify datasets are mounted (TESTFS2 fails if the race broke mount order).
113 # Verify unmount succeeds (fails if the race broke mount order).
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_destroy/
H A Dzfs_clone_livelist_condense_races.ksh19 # Test race conditions for livelist condensing
28 # 1. Deletion race: repeatedly overwrite the same file to trigger condense
30 # 2. Disable race: Overwrite enough files to trigger condenses and disabling of
32 # 3. Export race: repeatedly overwrite the same file to trigger condense and
60 log_fail "delete/condense race test failed"
74 log_fail "export/condense race test failed"
90 log_fail "disable/condense race test failed"
124 log_pass "Clone livelist condense race conditions passed."
/freebsd/contrib/netbsd-tests/fs/vfs/
H A Dt_renamerace.c127 atf_tc_fail("race did not trigger this time"); in renamerace()
132 * XXX: race does not trigger every time at least in renamerace()
139 atf_tc_fail("race did not trigger this time"); in renamerace()
180 ATF_TC_FSAPPLY(renamerace, "rename(2) race with file unlinked mid-operation");
181 ATF_TC_FSAPPLY(renamerace_dirs, "rename(2) race with directories");
H A Dt_rmdirrace.c66 race(const atf_tc_t *tc, const char *path) in race() function
106 ATF_FSAPPLY(race, "rmdir(2) race");
/freebsd/tools/regression/sockets/unix_close_race/
H A Dunix_close_race.c28 * This regression test attempts to trigger a race that occurs when both
34 * This race is fairly timing-dependent, so it effectively requires SMP, and
74 warnx("SMP not present, test may be unable to trigger race"); in main()
102 * socket, attempting to induce the race. in main()
129 * the race here so report errors from close(). in main()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rename_dirs/
H A Drename_dirs_001_pos.ksh38 # directory across the two trees. ZFS should be able to handle the race
55 log_assert "ZFS can handle race directory rename operation."
69 log_pass "ZFS handle race directory rename operation as expected."
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_export/
H A Dzpool_export_parallel_admin.ksh37 # Verify that admin commands cannot race a pool export
56 log_assert "admin commands cannot race a pool export"
73 log_pass "admin commands cannot race a pool export"
/freebsd/tests/sys/fs/fusefs/
H A Dlast_local_modify.cc46 * This file tests a class of race conditions caused by one thread fetching a
53 * FUSE_GETATTR is not vulnerable to the same race, because it is always called
56 * A few other operations like FUSE_LINK can also trigger the same race but
179 * The race condition affects both direct and non-direct writes, and in write_th()
183 * race cannot work. Therefore, test with O_DIRECT only. in write_th()
259 * a race, don't reply. Instead, just save the unique for in TEST_P()
343 /* Lookup again, which will race with the mutator */ in TEST_P()
410 /* Called by fhstat. Block to simulate a race */ in TEST_P()
503 /* Lookup again, which will race with setattr */ in TEST_P()
/freebsd/crypto/openssh/regress/
H A Dmultiplex.sh93 sleep 1 # XXX remove once race fixed
104 sleep 1 # XXX remove once race fixed
138 sleep 1 # XXX remove once race fixed
149 sleep 1 # XXX remove once race fixed
160 sleep 1 # XXX remove once race fixed
173 sleep 1 # XXX remove once race fixed
/freebsd/tests/sys/cddl/zfs/tests/rename_dirs/
H A Drename_dirs_001_pos.ksh37 # directory across the two trees. ZFS should be able to handle the race
63 log_assert "ZFS can handle race directory rename operation."
80 log_pass "ZFS handle race directory rename operation as expected."
/freebsd/contrib/bmake/unit-tests/
H A Dopt-debug-jobs.mk28 # Avoid a race condition in the debug output. Without sleeping,
32 # another race condition with the "exited/stopped" line.
/freebsd/contrib/sendmail/
H A DKNOWNBUGS234 * Berkeley DB 2.X race condition with fcntl() locking
236 There is a race condition for Berkeley DB 2.X databases on
249 Sleepycat Software has added code to avoid this race condition to
261 * Race condition for delivery to set-user-ID files
267 permission failure race as sendmail checks the permissions before locking
/freebsd/contrib/llvm-project/lldb/source/Plugins/InstrumentationRuntime/TSan/
H A DInstrumentationRuntimeTSan.cpp500 if (description == "data-race") { in FormatDescription()
501 return "Data race"; in FormatDescription()
502 } else if (description == "data-race-vptr") { in FormatDescription()
503 return "Data race on C++ virtual pointer"; in FormatDescription()
528 } else if (description == "external-race") { in FormatDescription()
529 return "Race on a library object"; in FormatDescription()
530 } else if (description == "swift-access-race") { in FormatDescription()
531 return "Swift access race"; in FormatDescription()
626 "external-race"; in GenerateSummary()
670 summary = "Race on " + object_type + " object"; in GenerateSummary()
[all …]
/freebsd/share/man/man7/
H A Dsprog.7145 .Ss Race Conditions
146 A race condition is anomalous behavior caused by the relative timing of
149 The most common causes of race conditions are signals, access checks, and
/freebsd/lib/libc/stdio/
H A Dmktemp.387 This avoids the race between testing for a file's existence and opening it
325 This makes the race in
338 should be used instead, since they do not have the race condition.
/freebsd/sys/contrib/openzfs/include/os/linux/spl/sys/
H A Dmutex.h163 * does not guarantee serialization upon itself, allowing a race where latter
166 * The race renders it unsafe to be used for serializing the freeing of an
176 * See http://lwn.net/Articles/575477/ for the information about the race.
/freebsd/sys/geom/
H A Dnotes21 following race condition: A class intend to split a bio in two
27 There is no race present in the common case where the bio is split
34 In all other cases, this race needs to be mitigated, for instance
38 it directly opens another race since the assumption is that
/freebsd/tests/sys/cddl/zfs/bin/
H A Drename_dir.c32 * the race situation.
53 char *msg = "rename() fails to handle race situation\n"; in main()
/freebsd/share/man/man4/
H A Dmlx.4101 .It mlx%d: mirror race recovery in progress
102 .It mlx%d: mirror race on a critical system drive
103 .It mlx%d: mirror race recovery failed

12345678910>>...36