Skip to content

Commit 64a2995

Browse files
authored
typo: i.e -> i.e.
1 parent a4e418d commit 64a2995

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/sanitizers/asan-known-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Thread local variables (global variables declared with `__declspec(thread)` or `
8383

8484
Using custom code / assembly to leave the current stack frame without the usual return mechanisms, such as a long jump or equivalent, is not supported and risks inducing false positives.
8585

86-
A mitigation for this is to invoke [`__asan_handle_no_return()`](https://github.com/llvm/llvm-project/blob/ba84d0c8d762f093c6ef6d5ef5a446a42a8548a5/compiler-rt/include/sanitizer/asan_interface.h#L325-L330) prior to invoking your custom long jump-like procedure. This function clears all shadow bytes associated with the current thread's stack, which means losing some coverage (i.e risk false negatives) but will allow your program to safely unwind the stack without running into false positives from stale stack shadow bytes.
86+
A mitigation for this is to invoke [`__asan_handle_no_return()`](https://github.com/llvm/llvm-project/blob/ba84d0c8d762f093c6ef6d5ef5a446a42a8548a5/compiler-rt/include/sanitizer/asan_interface.h#L325-L330) prior to invoking your custom long jump-like procedure. This function clears all shadow bytes associated with the current thread's stack, which means losing some coverage (i.e. risk false negatives) but will allow your program to safely unwind the stack without running into false positives from stale stack shadow bytes.
8787

8888
## Issues with partially sanitized executables
8989

0 commit comments

Comments
 (0)