https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107940
--- Comment #7 from Andrew Pinski <pinskia at gcc dot gnu.org> --- (In reply to laurent.alfo...@linaro.org from comment #0) > sanitizer=address reports an issue while stack unwinding : > > ==13419==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 > (pc 0x0055012adf14 bp 0x0055007ff090 sp 0x0055007ff090 T0) > ==13419==The signal is caused by a UNKNOWN memory access. > ==13419==Hint: address points to the zero page. The uninitialized memory dealing with the stack unwinding is recorded as PR 107678 and a patch was sent here: https://gcc.gnu.org/pipermail/gcc-patches/2022-December/607668.html (maybe that will fix the issue recorded here too).