GeistHaus
log in · sign up

Using Address Sanitizer for a C or C++ Library Linked to a Rust Executable

geo-ant.github.io

When using Rust, it’s easy to forget about segfaults, buffer overflows, and related memory safety bugs. Recently, I had a problem when I linked a C++ library to my Rust executable and said library was producing segfaults (among other things). The way I decided to tackle the problem, was to use Address Sanitizer (ASan). I’ll summarize the procedure here in case anyone else runs into the same problem and they might find this useful.

0 pages link to this URL

No pages have linked to this URL yet.