summaryrefslogtreecommitdiffstats
path: root/BaseTools/Source/Python/UPT/Object/Parser/InfPackagesObject.py
diff options
context:
space:
mode:
authorMichael D Kinney <michael.d.kinney@intel.com>2025-01-28 18:03:31 -0800
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>2025-01-29 19:35:30 +0000
commit2cb8bf6c69cf78db73c6a31c0b6049741c1ea006 (patch)
treee644ea766359102942ecb0bd4d16aad2b136e2a4 /BaseTools/Source/Python/UPT/Object/Parser/InfPackagesObject.py
parent3600675368581ba4987f5656c2783bab62750ee7 (diff)
downloadedk2-2cb8bf6c69cf78db73c6a31c0b6049741c1ea006.tar.gz
edk2-2cb8bf6c69cf78db73c6a31c0b6049741c1ea006.tar.bz2
edk2-2cb8bf6c69cf78db73c6a31c0b6049741c1ea006.zip
UnitTestFrameworkPkg: Fix false positives from address sanitizer
PR #6408 introduced a host specific NORETURN function to resolve false positives from the address sanitizer when LongJump() is called and the stack is reset to a previous stack frame. This approach was discussed here: https://github.com/tianocore/edk2/pull/6408/files#r1918810499 False positives are still being observed with this initial solution. The address sanitizer provides __asan_handle_no_return() to clean up shadow memory before a NORETURN function is called and provides a simpler implementation for this issue without having to introduce a host specific NORETURN function. https://github.com/llvm/llvm-project/blob/main/compiler-rt/include/sanitizer/asan_interface.h Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Diffstat (limited to 'BaseTools/Source/Python/UPT/Object/Parser/InfPackagesObject.py')
0 files changed, 0 insertions, 0 deletions