Get the latest tech news
Address Sanitizer Internals
Going in depth into the Address Sanitizer internals.
Now that you know the core concepts of ASan, we are able to deep dive into its source code and see how it uses instrumentation and a run-time library to do all the necessary checks and infection. If you had set the debug symbols, ASan can tell you exactly on which line of your program, the invalid memory access is located. We can also see f1 before our variable in the Shadow Memory, which correspond to Stack left redzone, which enables ASan to trigger stack_buffer_underflow errors.
Or read this on Hacker News