1 // RUN: %clangxx_tsan -O1 %s -o %t && not %run %t 2>&1 | FileCheck %s
2 #include "test.h"
3 
4 int Global;
5 volatile int x;
6 const int kSize = 64 << 10;
7 volatile long data[kSize];
8 
foo()9 void __attribute__((noinline)) foo() {
10   for (int i = 0; i < kSize; i++)
11     data[i]++;
12 }
13 
Thread(void * a)14 void *Thread(void *a) {
15   __atomic_store_n(&x, 1, __ATOMIC_RELEASE);
16   foo();
17   data[0]++;
18   if (a != 0)
19     barrier_wait(&barrier);
20   return 0;
21 }
22 
main()23 int main() {
24   barrier_init(&barrier, 2);
25   for (int i = 0; i < 50; i++) {
26     pthread_t t;
27     pthread_create(&t, 0, Thread, 0);
28     pthread_join(t, 0);
29   }
30   pthread_t t;
31   pthread_create(&t, 0, Thread, (void*)1);
32   barrier_wait(&barrier);
33   for (int i = 0; i < kSize; i++)
34     data[i]++;
35   pthread_join(t, 0);
36   fprintf(stderr, "DONE\n");
37   return 0;
38 }
39 
40 // Previously this test produced bogus stack traces like:
41 //   Previous write of size 8 at 0x0000006a8ff8 by thread T17:
42 //     #0 foo() restore_stack.cpp:13:5 (restore_stack.cpp.exe+0x00000040622c)
43 //     #1 Thread(void*) restore_stack.cpp:18:3 (restore_stack.cpp.exe+0x000000406283)
44 //     #2 __tsan_thread_start_func rtl/tsan_interceptors.cpp:886 (restore_stack.cpp.exe+0x00000040a749)
45 //     #3 Thread(void*) restore_stack.cpp:18:3 (restore_stack.cpp.exe+0x000000406283)
46 
47 // CHECK: WARNING: ThreadSanitizer: data race
48 // CHECK-NOT: __tsan_thread_start_func
49 // CHECK-NOT: #3 Thread
50 // CHECK: DONE
51