| /src/contrib/llvm-project/compiler-rt/lib/tsan/rtl/ |
| H A D | tsan_interface_ann.cpp | 83 ExpectRace *race = list->next; in AddExpectRace() local 84 for (; race != list; race = race->next) { in AddExpectRace() 85 if (race->addr == addr && race->size == size) { in AddExpectRace() 86 atomic_store_relaxed(&race->addcount, in AddExpectRace() 87 atomic_load_relaxed(&race->addcount) + 1); in AddExpectRace() 91 race = static_cast<ExpectRace *>(Alloc(sizeof(ExpectRace))); in AddExpectRace() 92 race->addr = addr; in AddExpectRace() 93 race->size = size; in AddExpectRace() 94 race->file = f; in AddExpectRace() 95 race->line = l; in AddExpectRace() [all …]
|
| H A D | tsan_flags.inc | 21 // Suppress a race report if we've already output another race report 24 "Suppress a race report if we've already output another race report "
|
| H A D | tsan_interface.inc | 9 // This file is a part of ThreadSanitizer (TSan), a race detector.
|
| /src/contrib/netbsd-tests/fs/vfs/ |
| H A D | t_rmdirrace.c | 66 race(const atf_tc_t *tc, const char *path) in race() function 106 ATF_FSAPPLY(race, "rmdir(2) race");
|
| /src/contrib/kyua/integration/helpers/ |
| H A D | .gitignore | 9 race
|
| H A D | Makefile.am.inc | 74 tests_integration_helpers_PROGRAMS += integration/helpers/race 75 integration_helpers_race_SOURCES = integration/helpers/race.cpp
|
| /src/sys/geom/ |
| H A D | notes | 21 following race condition: A class intend to split a bio in two 27 There is no race present in the common case where the bio is split 34 In all other cases, this race needs to be mitigated, for instance 38 it directly opens another race since the assumption is that
|
| /src/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/proc/ |
| H A D | tst.signal.ksh | 44 * This is guaranteed to not race with signal-handle.
|
| /src/crypto/krb5/src/lib/krb5/rcache/ |
| H A D | Makefile.in | 48 $(RUN_TEST) ./t_rcfile2 testrcache race 10 100
|
| /src/contrib/wpa/wpa_supplicant/ |
| H A D | todo.txt | 51 - try to work around race in receiving association event and first EAPOL 53 - try to work around race in configuring PTK and sending msg 4/4 (some NDIS
|
| /src/tools/test/stress2/misc/ |
| H A D | f_offset.sh | 48 To really exercise the race conditions, all the following items must
|
| H A D | nfsrename.sh | 72 * renames. This results in 2 different RENAME RPCs leaving a race
|
| /src/contrib/sendmail/ |
| H A D | KNOWNBUGS | 234 * Berkeley DB 2.X race condition with fcntl() locking 236 There is a race condition for Berkeley DB 2.X databases on 249 Sleepycat Software has added code to avoid this race condition to 267 permission failure race as sendmail checks the permissions before locking
|
| /src/contrib/blocklist/diff/ |
| H A D | proftpd.diff | 70 /* A race condition exists on heavily loaded servers where the parent
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_generate_session_id.pod | 76 another thread is using the same internal session cache, a race condition 80 and the same race condition applies.
|
| H A D | X509_check_purpose.pod | 167 There may be race conditions retrieving purpose information while
|
| /src/usr.bin/fortune/ |
| H A D | README | 30 healthy, hearty laughter -- at the expense of the whole human race, if
|
| /src/contrib/one-true-awk/ |
| H A D | FREEBSD-upgrade | 56 (5) Oops, lost the race to push while testing, the following will rebase things
|
| /src/contrib/bzip2/ |
| H A D | CHANGES | 135 * Fixed an obscure race-condition bug only ever observed on 252 * Avoid race condition between creating the output file and setting its 295 * Fix file permissions race problem (CAN-2005-0953).
|
| /src/sys/ufs/ufs/ |
| H A D | README.extattr | 66 introduces the possibility of race conditions during filesystem mount, if
|
| /src/crypto/openssl/doc/internal/man3/ |
| H A D | OPENSSL_SA.pod | 88 structure of the sparse array to change which causes race conditions if the
|
| /src/crypto/openssl/include/openssl/ |
| H A D | crypto.h.in | 269 * potential race-conditions. 279 * Replacing the locking functions with no-ops would cause race condition
|
| /src/contrib/jemalloc/ |
| H A D | ChangeLog | 338 - Fix an extent coalesce + decay race by taking both coalescing extents off 600 - Handle race in per size class utilization computation. This functionality 1151 - Fix a data race for large allocation stats counters. 1177 - Fix a race in the "arenas.extend" mallctl that could cause memory corruption 1195 - Fix race-triggered deadlocks in chunk_record(). These deadlocks were 1380 - Fix huge_ralloc() race when using mremap(2). This is a serious bug that 1397 - Fix a prof-related race condition. This bug could cause memory corruption, 1492 - Fix a race condition in heap profiling that could cause undefined behavior 1573 - Fix dirty page purging race conditions that could cause crashes.
|
| /src/contrib/openpam/ |
| H A D | HISTORY | 15 - BUGFIX: Fix race condition in openpam_ttyconv(3) when used with 150 This closes the race between the ownership / permission check and
|
| /src/sys/contrib/device-tree/Bindings/thermal/ |
| H A D | nvidia,tegra124-soctherm.txt | 45 no race if priority of two vectors is set to the same value.
|