Crandore Hub

sanitizers

C/C++ Source Code to Trigger Address and Undefined Behaviour Sanitizers

Recent gcc and clang compiler versions provide functionality to test for memory violations and other undefined behaviour; this is often referred to as "Address Sanitizer" (or 'ASAN') and "Undefined Behaviour Sanitizer" ('UBSAN'). The Writing R Extension manual describes this in some detail in Section 4.3 title "Checking Memory Access". . This feature has to be enabled in the corresponding binary, eg in R, which is somewhat involved as it also required a current compiler toolchain which is not yet widely available, or in the case of Windows, not available at all (via the common Rtools mechanism). . As an alternative, pre-built Docker containers such as the Rocker container 'r-devel-san' or the multi-purpose container 'r-debug' can be used. . This package then provides a means of testing the compiler setup as the known code failures provides in the sample code here should be detected correctly, whereas a default build of R will let the package pass. . The code samples are based on the examples from the Address Sanitizer Wiki at <https://github.com/google/sanitizers/wiki>.

Versions across snapshots

VersionRepositoryFileSize
0.1.1 rolling linux/jammy R-4.5 sanitizers_0.1.1.tar.gz 14.1 KiB
0.1.1 rolling linux/noble R-4.5 sanitizers_0.1.1.tar.gz 13.9 KiB
0.1.1 rolling source/ R- sanitizers_0.1.1.tar.gz 10.0 KiB
0.1.1 latest linux/jammy R-4.5 sanitizers_0.1.1.tar.gz 14.1 KiB
0.1.1 latest linux/noble R-4.5 sanitizers_0.1.1.tar.gz 13.9 KiB
0.1.1 latest source/ R- sanitizers_0.1.1.tar.gz 10.0 KiB
0.1.1 2026-04-26 source/ R- sanitizers_0.1.1.tar.gz 10.0 KiB
0.1.1 2026-04-23 source/ R- sanitizers_0.1.1.tar.gz 10.0 KiB
0.1.1 2026-04-09 windows/windows R-4.5 sanitizers_0.1.1.zip 63.8 KiB
0.1.1 2025-04-20 source/ R- sanitizers_0.1.1.tar.gz 10.0 KiB