mirror of
https://github.com/status-im/consul.git
synced 2025-01-10 13:55:55 +00:00
e9835610f3
This is in its own separate package so that it will be a separate test binary that runs thus isolating the go runtime from other tests and allowing accurate go routine leak checking. This test would ideally use goleak.VerifyTestMain but that will fail 100% of the time due to some architectural things (blocking queries and net/rpc uncancellability). This test is not comprehensive. We should enable/exercise more features and more cluster configurations. However its a start.
38 lines
891 B
Go
38 lines
891 B
Go
// Copyright 2019 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
// +build race
|
|
|
|
package socket
|
|
|
|
import (
|
|
"runtime"
|
|
"unsafe"
|
|
)
|
|
|
|
// This package reads and writes the Message buffers using a
|
|
// direct system call, which the race detector can't see.
|
|
// These functions tell the race detector what is going on during the syscall.
|
|
|
|
func (m *Message) raceRead() {
|
|
for _, b := range m.Buffers {
|
|
if len(b) > 0 {
|
|
runtime.RaceReadRange(unsafe.Pointer(&b[0]), len(b))
|
|
}
|
|
}
|
|
if b := m.OOB; len(b) > 0 {
|
|
runtime.RaceReadRange(unsafe.Pointer(&b[0]), len(b))
|
|
}
|
|
}
|
|
func (m *Message) raceWrite() {
|
|
for _, b := range m.Buffers {
|
|
if len(b) > 0 {
|
|
runtime.RaceWriteRange(unsafe.Pointer(&b[0]), len(b))
|
|
}
|
|
}
|
|
if b := m.OOB; len(b) > 0 {
|
|
runtime.RaceWriteRange(unsafe.Pointer(&b[0]), len(b))
|
|
}
|
|
}
|