Summary
This episode explores C++ sanitizers, powerful runtime analysis tools available in Clang and GCC. Jason demonstrates the Address Sanitizer that detects memory access violations and the Memory Sanitizer that identifies uninitialized memory usage. Using practical examples, he shows how these tools provide detailed diagnostic information about bugs that may not be caught by static analysis or warnings, including exact file locations and line numbers. The tutorial also covers the configuration needed for proper symbolization in Ubuntu Linux.
Related C++ Standard Sections
This episode covers topics found in these sections of the C++ standard:
-
[debugging.syn]59% match