sanitizers (0.1.0)

0 users

C/C++ source code to trigger Address and Undefined Behaviour Sanitizers.

Recent gcc and clang compiler versions provide functionality to memory violations and other undefined behaviour; this is often referred to as "Address Sanitizer" (or SAN) and "Undefined Behaviour Sanitizer" (UBSAN). The Writing R Extension manual describes this in some detail in Section 4.9. . This feature has to be enabled in the corresponding binary, eg in R, which is somewhat involved as it also required a current compiler toolchain which is not yet widely available, or in the case of Windows, not available at all (via the common Rtools mechanism). . As an alternative, the pre-built Docker containers available via the Docker Hub at can be used on Linux, and via boot2docker on Windows and OS X. . This package then provides a means of testing the compiler setup as the known code failures provides in the sample code here should be detected correctly, whereas a default build of R will let the package pass. . The code samples are based on the examples from the Address Sanitizer Wiki at

Maintainer: Dirk Eddelbuettel
Author(s): Dirk Eddelbuettel

License: GPL (>= 2)

Uses: Does not use any package

Released almost 5 years ago.



  (0 votes)


  (0 votes)

Log in to vote.


No one has written a review of sanitizers yet. Want to be the first? Write one now.

Related packages:(20 best matches, based on common tags.)

Search for sanitizers on google, google scholar, r-help, r-devel.

Visit sanitizers on R Graphical Manual.