https://github.com/ssbssa/heob
Detects buffer overruns and memory leaks.
https://github.com/ssbssa/heob
buffer-overruns memory-leak stack-traces windows
Last synced: 6 months ago
JSON representation
Detects buffer overruns and memory leaks.
- Host: GitHub
- URL: https://github.com/ssbssa/heob
- Owner: ssbssa
- License: bsl-1.0
- Created: 2015-09-06T16:10:38.000Z (about 10 years ago)
- Default Branch: master
- Last Pushed: 2024-11-23T15:50:14.000Z (11 months ago)
- Last Synced: 2025-03-28T20:05:26.910Z (7 months ago)
- Topics: buffer-overruns, memory-leak, stack-traces, windows
- Language: C
- Homepage:
- Size: 1.02 MB
- Stars: 179
- Watchers: 11
- Forks: 26
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE_1_0.txt
Awesome Lists containing this project
README
heob - heap observer
====================[](https://ci.appveyor.com/project/ssbssa/heob/branch/master)
[](https://ci.appveyor.com/api/projects/ssbssa/heob/artifacts/heob.7z?branch=master "latest AppVeyor artifact")heob overrides the heap functions of the called process to detect
buffer overruns and memory leaks.On buffer overruns an access violation is raised, and stacktraces
of the offending instruction and buffer allocation are provided.When the program exits normally, stacktraces for all leaks are shown.
## compilation:
### MinGW
The location of dwarfstack.h has to be provided.
make CPPFLAGS="-I../dwarfstack/include"
Or disable dwarfstack completely (this is the default).
make CPPFLAGS="-DNO_DWARFSTACK"
### MSVC
Run `build.bat` in the source directory.
## notes:
To get file/line information in stacktraces of executables with
DWARF debug information (gcc), dwarfstack.dll needs to be available.
For PDB debug information, dbghelp.dll is used.## code signing:
Free code signing provided by [SignPath.io](https://about.signpath.io), certificate by [SignPath Foundation](https://signpath.org)