From Jason Turner
Watch on YouTube

Summary

This episode explores C++ sanitizers, powerful runtime analysis tools available in Clang and GCC. Jason demonstrates the Address Sanitizer that detects memory access violations and the Memory Sanitizer that identifies uninitialized memory usage. Using practical examples, he shows how these tools provide detailed diagnostic information about bugs that may not be caught by static analysis or warnings, including exact file locations and line numbers. The tutorial also covers the configuration needed for proper symbolization in Ubuntu Linux.

Resources

Tags