windbg调试句柄泄露
摘要:
本人系统是win7 64位,待调试程序是32位。这里使用的方法是真机配合虚拟机同时调试的方法来找出句柄泄露的源码位置。如果真机直接使用X64版本的windbg侦测句柄泄露时显示:0:000:x86> !htrace -diffHandle tracing information snapshot successfully taken.0x1 new stack traces since the previous snapshot.Ignoring handles that were already closed...Outstanding handles opened since the 阅读全文
posted @ 2012-06-07 11:57 BIGSING 阅读(4518) 评论(5) 推荐(0) 编辑