GeistHaus
log in · sign up

Keyboard shortcuts

doc.rust-lang.org
6 pages link to this URL
Using Address Sanitizer for a C or C++ Library Linked to a Rust Executable

When using Rust, it’s easy to forget about segfaults, buffer overflows, and related memory safety bugs. Recently, I had a problem when I linked a C++ library to my Rust executable and said library was producing segfaults (among other things). The way I decided to tackle the problem, was to use Address Sanitizer (ASan). I’ll summarize the procedure here in case anyone else runs into the same problem and they might find this useful.

Understanding AddressSanitizer: Better memory safety for your code

This post will guide you through using AddressSanitizer (ASan), a compiler plugin that helps developers detect memory issues in code that can lead to remote code execution attacks (such as WannaCry or this WebP implementation bug). ASan inserts checks around memory accesses during compile time, and crashes the program […]

2 inbound links article en application-securitycompilersfuzzingllvmmemory-safety application-securitycompilersfuzzingllvmmemory-safety