Open
Description
I observed that a program which depended on stack addresses on x86 growing downward stopped working in address sanitizer with GCC 13.
But if I do:
export ASAN_OPTIONS=detect_stack_use_after_return=0
...then it works.
So it seems that UseAfterReturn
is enabled by default in GCC 13. But the wiki says: "AddressSanitizer currently does not attempt to detect these bugs by default, only with an additional flag run-time: ASAN_OPTIONS=detect_stack_use_after_return=1"
https://github.com/google/sanitizers/wiki/AddressSanitizerUseAfterReturn