diff options
author | Michael D Kinney <michael.d.kinney@intel.com> | 2025-01-28 18:03:31 -0800 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2025-01-29 19:35:30 +0000 |
commit | 2cb8bf6c69cf78db73c6a31c0b6049741c1ea006 (patch) | |
tree | e644ea766359102942ecb0bd4d16aad2b136e2a4 /BaseTools/Source/Python/UPT/Object/Parser/InfPackagesObject.py | |
parent | 3600675368581ba4987f5656c2783bab62750ee7 (diff) | |
download | edk2-2cb8bf6c69cf78db73c6a31c0b6049741c1ea006.tar.gz edk2-2cb8bf6c69cf78db73c6a31c0b6049741c1ea006.tar.bz2 edk2-2cb8bf6c69cf78db73c6a31c0b6049741c1ea006.zip |
UnitTestFrameworkPkg: Fix false positives from address sanitizer
PR #6408 introduced a host specific NORETURN function to resolve
false positives from the address sanitizer when LongJump() is
called and the stack is reset to a previous stack frame.
This approach was discussed here:
https://github.com/tianocore/edk2/pull/6408/files#r1918810499
False positives are still being observed with this initial
solution.
The address sanitizer provides __asan_handle_no_return()
to clean up shadow memory before a NORETURN function is
called and provides a simpler implementation for this
issue without having to introduce a host specific
NORETURN function.
https://github.com/llvm/llvm-project/blob/main/compiler-rt/include/sanitizer/asan_interface.h
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Diffstat (limited to 'BaseTools/Source/Python/UPT/Object/Parser/InfPackagesObject.py')
0 files changed, 0 insertions, 0 deletions