From 9cc823951b57e684a0a7f6ff9328b5698b1cf228 Mon Sep 17 00:00:00 2001 From: Matt Morehouse Date: Tue, 22 Aug 2017 21:28:29 +0000 Subject: [SanitizerCoverage] Optimize stack-depth instrumentation. Summary: Use the initialexec TLS type and eliminate calls to the TLS wrapper. Fixes the sanitizer-x86_64-linux-fuzzer bot failure. Reviewers: vitalybuka, kcc Reviewed By: kcc Subscribers: hiraditya, llvm-commits Differential Revision: https://reviews.llvm.org/D37026 git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@311490 91177308-0d34-0410-b5e6-96231b3b80d8 --- test/fuzzer/deep-recursion.test | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) (limited to 'test/fuzzer') diff --git a/test/fuzzer/deep-recursion.test b/test/fuzzer/deep-recursion.test index 06e612c28..23b7af1df 100644 --- a/test/fuzzer/deep-recursion.test +++ b/test/fuzzer/deep-recursion.test @@ -1,5 +1,4 @@ # Test that we can find a stack overflow -RUN: echo DISABLED -DISABLED: %cpp_compiler -fsanitize-coverage=stack-depth %S/DeepRecursionTest.cpp -o %t -DISABLED: not %t -seed=1 -runs=100000000 2>&1 | FileCheck %s -DISABLED: ERROR: libFuzzer: deadly signal +RUN: %cpp_compiler -fsanitize-coverage=stack-depth %S/DeepRecursionTest.cpp -o %t +RUN: not %t -seed=1 -runs=100000000 2>&1 | FileCheck %s +CHECK: ERROR: libFuzzer: deadly signal -- cgit v1.2.1