[Bug sanitizer/64265] [5 Regression] r217669 broke tsan

bernd.edlinger at hotmail dot de gcc-bugzilla@gcc.gnu.org
Fri Dec 12 19:36:00 GMT 2014


https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64265

--- Comment #18 from Bernd Edlinger <bernd.edlinger at hotmail dot de> ---
(In reply to Jakub Jelinek from comment #15)
> I've been running the tests for quite a while and RSS didn't increase in top
> at all.
> 
> As for "and no calls to other functions", sure, I haven't changed anything
> on that logic.

Interesting, I dont quite understand how that can be.

I have seen all the time either the application crashed in __tsan_func_entry
or the computer crashed because it ran out of memory too quickly.

With O/S ubuntu 12.04 and ubuntu 14.04.  X86_64 of course.

The gcc was just the current trunk, with no special configure options.
Just g++ --g -fsanitize=thread test.cpp

Is there a way to limit the call stack depth in tsan that I am not aware of?



More information about the Gcc-bugs mailing list