TalkBackVideo Understanding handle leaks and How to use !htrace to find them
Written by Jeff Dailey
Hello, my name is Jeff Dailey, I’m an Escalation Engineer for the Global Escalation Services Platforms team. I’d like to show you how to debug and find leaking handles within your application or other process. We can do this with the !htrace command in windbg . Windbg is the Microsoft Windows Debugger most of us use in GES/CPR for debugging.
Handles are a value we use in user mode, that when passed to a call that transitions to kernel, are used as an offset in your handle table to reference kernel mode objects. Kernel mode objects are generally allocated from pool. If you are having pool consumption problems and seeing errors like 2020 or 2019’s reported there is a good chance you may have a handle leak associated with them. This is generally due to not doing a CloseHandle() on the handle when you have finished using it.
You can vide the channel9 "how to debug handle leaks" video here
The following is the sample source for a handle leak that we will be debugging in our demo video.
// leakyhandles.cpp : Defines the entry point for the console application.
//
#include "stdafx.h"
#include <windows.h>
void fun1(void);
void fun2(void);
void fun3(void);
void fun4(void);
int main(int argc, char* argv[])
{
while(1)
{
fun1();
fun2();
Sleep(100);
}
return 0;
}
void fun1(void)
{
fun3();
}
void fun2(void)
{
fun4();
}
void fun3(void)
{
HANDLE hEvent;
hEvent = CreateEvent(NULL,TRUE,TRUE,NULL);
CloseHandle(hEvent);
}
void fun4(void)
{
HANDLE hEvent2;
hEvent2 = CreateEvent(NULL,TRUE,TRUE,NULL);
}
Thank you.
Jeff Dailey
Escalation Engineer (Platforms core team)
Comments
- Anonymous
September 12, 2008
The comment has been removed - Anonymous
April 26, 2009
Thank you for the sample code! I really enjoyed it! I wrote the followin WinDbg script code just to see how your code works. It's beautiful. WinDbg script code: .catch { .block { .logclose .logappend d:windbglogsbrowsers.log r $t0 = ${/d:$SafetyCheck} } .block { .if (0 == @$t0) { as $SafetyCheck "Written by Takashi Toyota" } .else { al ad /q * } } .block { .create D:ITDanwahandleleakDebughandleleak.exe g .detach .attach -k g !gflag r $t0 = nt!PsActiveProcessHead .for (r $t1 = poi(@$t0); (@$t1 != 0) & (@$t1 != @$t0); r $t1 = poi(@$t1)) { r? $t2 = #CONTAINING_RECORD(@$t1, nt!_EPROCESS, ActiveProcessLinks) as /ma $ImageName @@c++(&@$t2->ImageFileName[0]) .block { .if (1 == $spat("${$ImageName}", "handleleak")) { .for (r $t9 = 0; @$t9 < 3; r $t9 = @$t9 + 1) { .time .sleep 0n3000 r? $t3 = @@C++((int) @$t2->ObjectTable->HandleCount) n 10 ?? @$t3 } } } ad $ImageName } } .detach } Result: Debug session time: Wed Nov 5 16:53:16.949 2008 (GMT+9) System Uptime: 0 days 8:28:36.780 base is 10 int 40 Debug session time: Wed Nov 5 16:53:19.964 2008 (GMT+9) System Uptime: 0 days 8:28:39.794 base is 10 int 70 Debug session time: Wed Nov 5 16:53:22.978 2008 (GMT+9) System Uptime: 0 days 8:28:42.809 base is 10 int 100