- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 21 for Races (0.02 sec)
-
cmd/erasure-server-pool-rebalance.go
NoAuditLog: true, }) // This can happen when rebalance stop races with ongoing rebalance workers. // These rebalance failures can be ignored. if err != nil { // This can happen when rebalance stop races with ongoing rebalance workers. // These rebalance failures can be ignored.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Sep 04 20:47:24 UTC 2025 - 28.9K bytes - Viewed (0) -
guava-tests/test/com/google/common/cache/CacheLoadingTest.java
assertEquals(getKey + suffix, map.get(getKey)); assertEquals(refreshKey + suffix, map.get(refreshKey)); } @SuppressWarnings("ThreadPriorityCheck") // doing our best to test for races public void testExpandDuringLoading() throws InterruptedException { int count = 3; AtomicInteger callCount = new AtomicInteger(); // tells the computing thread when to start computing
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 85.7K bytes - Viewed (0) -
cmd/erasure-server-pool-decom.go
SkipDecommissioned: true, // make sure we skip the decommissioned pool NoAuditLog: true, }) if err != nil { // This can happen when rebalance stop races with ongoing rebalance workers. // These rebalance failures can be ignored. if isErrObjectNotFound(err) || isErrVersionNotFound(err) || isDataMovementOverWriteErr(err) { ignore = true stopFn(0, nil)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 42.1K bytes - Viewed (1) -
cmd/server_test.go
// generate a random bucket name. bucketName := getRandomBucketName() // Block 1: Testing for racy access // The assertion is removed from this block since the purpose of this block is to find races // The purpose this block is not to check for correctness of functionality // Run the test with -race flag to utilize this var wg sync.WaitGroup for range testConcurrencyLevel { wg.Add(1) go func() {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 118.1K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/SecurityDescriptor.java
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.4K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SecurityDescriptor.java
throw new IOException("Invalid SecurityDescriptor"); } aces = new ACE[numAces]; for (int i = 0; i < numAces; i++) { aces[i] = new ACE(); bufferIndex += aces[i].decode(buffer, bufferIndex); } } else { aces = null; } return bufferIndex - start; } @Override
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 4.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/dtyp/SecurityDescriptorTest.java
prepareSecurityDescriptorBufferWithDACL(testBuffer, 0, 3); securityDescriptor.decode(testBuffer, 0, testBuffer.length); ACE[] aces = securityDescriptor.getAces(); assertNotNull(aces); assertEquals(3, aces.length); for (ACE ace : aces) { assertNotNull(ace); } } @Test @DisplayName("Test getOwnerUserSid returns correct SID")
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 18.6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* the access mask of the ACE, the access check is successful. Otherwise, * more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* the access mask of the ACE, the access check is successful. Otherwise, * more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* the access mask of the ACE, the access check is successful. Otherwise, * more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0)