// RUN: %clangxx_tsan -O1 %s -o %t && not %run %t 2>&1 | FileCheck %s #include "test.h" int Global; volatile int x; const int kSize = 64 << 10; volatile long data[kSize]; void __attribute__((noinline)) foo() { for (int i = 0; i < kSize; i++) data[i]++; } void *Thread(void *a) { __atomic_store_n(&x, 1, __ATOMIC_RELEASE); foo(); data[0]++; if (a != 0) barrier_wait(&barrier); return 0; } int main() { barrier_init(&barrier, 2); for (int i = 0; i < 50; i++) { pthread_t t; pthread_create(&t, 0, Thread, 0); pthread_join(t, 0); } pthread_t t; pthread_create(&t, 0, Thread, (void*)1); barrier_wait(&barrier); for (int i = 0; i < kSize; i++) data[i]++; pthread_join(t, 0); fprintf(stderr, "DONE\n"); return 0; } // Previously this test produced bogus stack traces like: // Previous write of size 8 at 0x0000006a8ff8 by thread T17: // #0 foo() restore_stack.cc:13:5 (restore_stack.cc.exe+0x00000040622c) // #1 Thread(void*) restore_stack.cc:18:3 (restore_stack.cc.exe+0x000000406283) // #2 __tsan_thread_start_func rtl/tsan_interceptors.cc:886 (restore_stack.cc.exe+0x00000040a749) // #3 Thread(void*) restore_stack.cc:18:3 (restore_stack.cc.exe+0x000000406283) // CHECK: WARNING: ThreadSanitizer: data race // CHECK-NOT: __tsan_thread_start_func // CHECK-NOT: #3 Thread // CHECK: DONE