Skip to content

Enable Use-After-Return detection in AddressSanitizer #89133

@jkoritzinsky

Description

@jkoritzinsky

Use-After-Return detection was disabled when AddressSanitizer was initially stood up because various components in CoreCLR (and possibly NativeAOT) check if a pointer is on the current thread's stack, which doesn't work with the fake stacks that the Use-After-Return detection uses to implement the feature. AddressSanitizer has APIs in its "public interface" that we can use to detect if a pointer is in the current thread's fake stack. We should use this feature in the places where we are asserting that a particular pointer points to the thread's stack and enable the detection.

Metadata

Metadata

Assignees

No one assigned

    Labels

    area-Infrastructurein-prThere is an active PR which will close this issue when it is merged

    Type

    No type

    Projects

    Status

    No status

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions