diff options
-rw-r--r-- | lib/fuzzer/FuzzerTracePC.cpp | 3 | ||||
-rw-r--r-- | test/fuzzer/deep-recursion.test | 7 |
2 files changed, 5 insertions, 5 deletions
diff --git a/lib/fuzzer/FuzzerTracePC.cpp b/lib/fuzzer/FuzzerTracePC.cpp index 985649a80..6513b4f64 100644 --- a/lib/fuzzer/FuzzerTracePC.cpp +++ b/lib/fuzzer/FuzzerTracePC.cpp @@ -32,7 +32,8 @@ ATTRIBUTE_INTERFACE uintptr_t __sancov_trace_pc_pcs[fuzzer::TracePC::kNumPCs]; // Used by -fsanitize-coverage=stack-depth to track stack depth -ATTRIBUTE_INTERFACE thread_local uintptr_t __sancov_lowest_stack; +ATTRIBUTE_INTERFACE __attribute__((tls_model("initial-exec"))) +thread_local uintptr_t __sancov_lowest_stack; namespace fuzzer { diff --git a/test/fuzzer/deep-recursion.test b/test/fuzzer/deep-recursion.test index 06e612c28..23b7af1df 100644 --- a/test/fuzzer/deep-recursion.test +++ b/test/fuzzer/deep-recursion.test @@ -1,5 +1,4 @@ # Test that we can find a stack overflow -RUN: echo DISABLED -DISABLED: %cpp_compiler -fsanitize-coverage=stack-depth %S/DeepRecursionTest.cpp -o %t -DISABLED: not %t -seed=1 -runs=100000000 2>&1 | FileCheck %s -DISABLED: ERROR: libFuzzer: deadly signal +RUN: %cpp_compiler -fsanitize-coverage=stack-depth %S/DeepRecursionTest.cpp -o %t +RUN: not %t -seed=1 -runs=100000000 2>&1 | FileCheck %s +CHECK: ERROR: libFuzzer: deadly signal |