GWP-ASan finds rare memory errors in C and C++ called from Rust.| Colin Breck
This article will look at tools for verifying unsafe Rust code, including unsafe code called from libraries written in C or C++.| Colin Breck
When using Rust, it’s easy to forget about segfaults, buffer overflows, and related memory safety bugs. Recently, I had a problem when I linked a C++ library to my Rust executable and said library was producing segfaults (among other things). The way I decided to tackle the problem, was to use Address Sanitizer (ASan). I’ll summarize the procedure here in case anyone else runs into the same problem and they might find this useful.| Geo’s Notepad