C++从LPEXCEPTION_POINTERS获取调用堆栈

#pragma once

#include <map>
#include <vector>


struct FunctionCall
{
	DWORD64 Address;
	std::string ModuleName;
	std::string FunctionName;
	std::string FileName;
	int			LineNumber;

public:
	FunctionCall() :
		Address(0),
		ModuleName(""),
		FunctionName(""),
		FileName(""),
		LineNumber(0)
	{
	}

public:
	static std::string GetFileName(const std::string& fullpath)
	{
		size_t index = fullpath.find_last_of('\\');
		if (index == std::string::npos)
		{
			return fullpath;
		}

		return fullpath.substr(index + 1);
	}
};

class StackTracer
{
public:
	static std::string GetExceptionStackTrace(LPEXCEPTION_POINTERS e);

private:
	// Always return EXCEPTION_EXECUTE_HANDLER after getting the call stack
	LONG ExceptionFilter(LPEXCEPTION_POINTERS e);

	// return the exception message along with call stacks
	std::string GetExceptionMsg();

	// Return exception code and call stack data structure so that 
	// user could customize their own message format
	DWORD GetExceptionCode();
	std::vector<FunctionCall> GetExceptionCallStack();

private:
	StackTracer(void);
	~StackTracer(void);

	// The main function to handle exception
	LONG __stdcall HandleException(LPEXCEPTION_POINTERS e);

	// Work through the stack upwards to get the entire call stack
	void TraceCallStack(CONTEXT* pContext);

private:
	DWORD m_dwExceptionCode;

	std::vector<FunctionCall> m_vecCallStack;

	typedef std::map<DWORD, const char*> CodeDescMap;
	CodeDescMap m_mapCodeDesc;

	DWORD m_dwMachineType; // Machine type matters when trace the call stack (StackWalk64)

};

  

 

#include "stdafx.h"
#include "StackTracer.h"
#include <sstream>
#include <tchar.h>

#pragma warning(push)
#pragma warning(disable : 4091)
#include <DbgHelp.h>
#pragma warning(pop)

#pragma comment(lib, "Dbghelp.lib")

const int CALLSTACK_DEPTH = 24;

// Translate exception code to description
#define CODE_DESCR(code) CodeDescMap::value_type(code, #code)

StackTracer::StackTracer(void)
	:m_dwExceptionCode(0)
{
	// Get machine type
	m_dwMachineType = 0;
	size_t Count = 256;
	TCHAR wszProcessor[256] = { 0 };
	::_tgetenv_s(&Count, wszProcessor, _T("PROCESSOR_ARCHITECTURE"));

	if (wszProcessor)
	{
		if ((!wcscmp(_T("EM64T"), wszProcessor)) || !wcscmp(_T("AMD64"), wszProcessor))
		{
			m_dwMachineType = IMAGE_FILE_MACHINE_AMD64;
		}
		else if (!wcscmp(_T("x86"), wszProcessor))
		{
			m_dwMachineType = IMAGE_FILE_MACHINE_I386;
		}
	}

	// Exception code description
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_ACCESS_VIOLATION));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_DATATYPE_MISALIGNMENT));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_BREAKPOINT));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_SINGLE_STEP));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_ARRAY_BOUNDS_EXCEEDED));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_FLT_DENORMAL_OPERAND));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_FLT_DIVIDE_BY_ZERO));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_FLT_INEXACT_RESULT));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_FLT_INVALID_OPERATION));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_FLT_OVERFLOW));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_FLT_STACK_CHECK));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_FLT_UNDERFLOW));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_INT_DIVIDE_BY_ZERO));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_INT_OVERFLOW));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_PRIV_INSTRUCTION));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_IN_PAGE_ERROR));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_ILLEGAL_INSTRUCTION));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_NONCONTINUABLE_EXCEPTION));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_STACK_OVERFLOW));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_INVALID_DISPOSITION));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_GUARD_PAGE));
	m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_INVALID_HANDLE));
	//m_mapCodeDesc.insert(CODE_DESCR(EXCEPTION_POSSIBLE_DEADLOCK));      
	// Any other exception code???
}

StackTracer::~StackTracer(void)
{
}

std::string StackTracer::GetExceptionStackTrace(LPEXCEPTION_POINTERS e)
{
	StackTracer tracer;
	tracer.HandleException(e);

	return tracer.GetExceptionMsg();
}

LONG StackTracer::ExceptionFilter(LPEXCEPTION_POINTERS e)
{
	return HandleException(e);
}


std::string StackTracer::GetExceptionMsg()
{
	std::ostringstream  m_ostringstream;

	// Exception Code
	CodeDescMap::iterator itc = m_mapCodeDesc.find(m_dwExceptionCode);

	char Code[72];
	sprintf_s(Code, "0x%x", m_dwExceptionCode);

	m_ostringstream << "Exception Code: " << Code << "\r\n";

	if (itc != m_mapCodeDesc.end())
	{
		m_ostringstream << "Exception: " << itc->second << "\r\n";
	}				

	// m_ostringstream << "------------------------------------------------------------------\r\n";

	// Call Stack
	std::vector<FunctionCall>::iterator itbegin = m_vecCallStack.begin();
	std::vector<FunctionCall>::iterator itend = m_vecCallStack.end();
	std::vector<FunctionCall>::iterator it;
	for (it = itbegin; it < itend; it++)
	{
		std::string strModule = it->ModuleName.empty() ? "UnknownModule" : it->ModuleName;
		
		m_ostringstream << strModule << " ";
		char Addrs[128];
		sprintf_s(Addrs, "0x%llx", it->Address);
		m_ostringstream << Addrs;

		if (!it->FunctionName.empty())
		{
			m_ostringstream << " " << it->FunctionName;
		}

		if (!it->FileName.empty())
		{
			m_ostringstream << " " << it->FileName << "[" << it->LineNumber << "]";
		}

		m_ostringstream << "\r\n";
	}

	return m_ostringstream.str();
}

DWORD StackTracer::GetExceptionCode()
{
	return m_dwExceptionCode;
}

std::vector<FunctionCall> StackTracer::GetExceptionCallStack()
{
	return m_vecCallStack;
}

LONG __stdcall StackTracer::HandleException(LPEXCEPTION_POINTERS e)
{
	m_dwExceptionCode = e->ExceptionRecord->ExceptionCode;
	m_vecCallStack.clear();

	HANDLE hProcess = INVALID_HANDLE_VALUE;

	// Initializes the symbol handler
	if (!SymInitialize(GetCurrentProcess(), NULL, TRUE))
	{
		SymCleanup(hProcess);
		return EXCEPTION_EXECUTE_HANDLER;
	}

	// Work through the call stack upwards.
	TraceCallStack(e->ContextRecord);

	// ...
	SymCleanup(hProcess);

	return(EXCEPTION_EXECUTE_HANDLER);
}

// Work through the stack to get the entire call stack
void StackTracer::TraceCallStack(CONTEXT* pContext)
{
	// Initialize stack frame
	STACKFRAME64 sf;
	memset(&sf, 0, sizeof(STACKFRAME));

#if defined(_WIN64)
	sf.AddrPC.Offset = pContext->Rip;
	sf.AddrStack.Offset = pContext->Rsp;
	sf.AddrFrame.Offset = pContext->Rbp;
#elif defined(WIN32)
	sf.AddrPC.Offset = pContext->Eip;
	sf.AddrStack.Offset = pContext->Esp;
	sf.AddrFrame.Offset = pContext->Ebp;
#endif
	sf.AddrPC.Mode = AddrModeFlat;
	sf.AddrStack.Mode = AddrModeFlat;
	sf.AddrFrame.Mode = AddrModeFlat;

	if (0 == m_dwMachineType)
		return;

	// Walk through the stack frames.
	HANDLE hProcess = GetCurrentProcess();
	HANDLE hThread = GetCurrentThread();
	while (StackWalk64(m_dwMachineType, hProcess, hThread, &sf, pContext, 0, SymFunctionTableAccess64, SymGetModuleBase64, 0))
	{
		if (sf.AddrFrame.Offset == 0 || m_vecCallStack.size() >= CALLSTACK_DEPTH)
			break;

		// 1. Get function name at the address
		const int nBuffSize = (sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR) + sizeof(ULONG64) - 1) / sizeof(ULONG64);
		ULONG64 symbolBuffer[nBuffSize];
		PSYMBOL_INFO pSymbol = (PSYMBOL_INFO)symbolBuffer;

		pSymbol->SizeOfStruct = sizeof(SYMBOL_INFO);
		pSymbol->MaxNameLen = MAX_SYM_NAME;

		FunctionCall curCall;
		curCall.Address = sf.AddrPC.Offset;

		DWORD64 moduleBase = SymGetModuleBase64(hProcess, sf.AddrPC.Offset);
		char ModuleName[MAX_PATH];
		if (moduleBase && GetModuleFileNameA((HINSTANCE)moduleBase, ModuleName, MAX_PATH))
		{
			curCall.ModuleName = FunctionCall::GetFileName(ModuleName);
		}

		DWORD64 dwSymDisplacement = 0;
		if (SymFromAddr(hProcess, sf.AddrPC.Offset, &dwSymDisplacement, pSymbol))
		{
			curCall.FunctionName = std::string(pSymbol->Name);
		}

		//2. get line and file name at the address
		IMAGEHLP_LINE64 lineInfo = { sizeof(IMAGEHLP_LINE64) };
		DWORD dwLineDisplacement = 0;

		if (SymGetLineFromAddr64(hProcess, sf.AddrPC.Offset, &dwLineDisplacement, &lineInfo))
		{
			curCall.FileName = FunctionCall::GetFileName(std::string(lineInfo.FileName));
			curCall.LineNumber = lineInfo.LineNumber;
		}

		// Call stack stored
		m_vecCallStack.push_back(curCall);
	}
}

  参考并优化自:https://www.codeproject.com/Articles/41923/Get-the-call-stack-when-an-exception-is-being-caug

 

原文链接: https://www.cnblogs.com/bodong/p/12565151.html

欢迎关注

微信关注下方公众号,第一时间获取干货硬货;公众号内回复【pdf】免费获取数百本计算机经典书籍

    C++从LPEXCEPTION_POINTERS获取调用堆栈

原创文章受到原创版权保护。转载请注明出处:https://www.ccppcoding.com/archives/194798

非原创文章文中已经注明原地址,如有侵权,联系删除

关注公众号【高性能架构探索】,第一时间获取最新文章

转载文章受原作者版权保护。转载请注明原作者出处!

(0)
上一篇 2023年2月12日 下午6:48
下一篇 2023年2月12日 下午6:48

相关推荐