https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81040
Martin Liška <marxin at gcc dot gnu.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |WONTFIX --- Comment #3 from Martin Liška <marxin at gcc dot gnu.org> --- As mentioned by Richard, currently ASAN is able to protect function variables that live on stack. In your case the function foo is called with constant that is then assigned a stack slot which we don't instrument with red zones.