关于调试:WinDBG-查找实际(非托管)异常

WinDBG - Finding the actual (unmanaged) exception

我正在尝试在托管-非托管混合代码中查找实际的异常。

问题是我有一个.Net类,它捕获所有未处理的异常,然后创建一个转储,所以当我查看转储时,有混合的托管-非托管代码,而我真的无法进入实际的非托管异常。
更糟的是,.Net似乎有其自己的异常,因此!analyze -v给我该异常。

所以,这就是我所拥有的:

我可以找到异常发生的位置(通过找到1003f单词),然后执行.cxr以到达代码中的实际位置。

当我执行!dumpstack时,我得到类似以下内容:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
//My module stuff and then:
122bf71c 08bf5242 (MethodDesc 0x4bf71ac +0x5a <Module>.dbg.NativeExceptionHandler())
122bf734 08bf5242 (MethodDesc 0x4bf71ac +0x5a <Module>.dbg.NativeExceptionHandler())
122bf73c 08bf51ce (MethodDesc 0x4bf71dc +0x6 <Module>.dbg.OnUnhandledNativeException(_EXCEPTION_POINTERS*)), calling (MethodDesc 0x4bf71ac +0 <Module>.dbg.NativeExceptionHandler())
122bf75c 08bf51ce (MethodDesc 0x4bf71dc +0x6 <Module>.dbg.OnUnhandledNativeException(_EXCEPTION_POINTERS*)), calling (MethodDesc 0x4bf71ac +0 <Module>.dbg.NativeExceptionHandler())
122bf760 3944bf15 3944bf15
122bf778 7c35f0c3 msvcr71!__CxxUnhandledExceptionFilter+0x46, calling 091f15a2
122bf784 7c864191 kernel32!UnhandledExceptionFilter+0x1c7
122bf7ac 7c812afb kernel32!RaiseException+0x53, calling ntdll!RtlRaiseException
122bf7f4 7857df60 msvcr90!_CxxThrowException+0x48 [f:\\prebuild\\eh\\throw.cpp:161], calling kernel32!RaiseException
122bf828 785436c5 msvcr90!__set_flsgetvalue+0xf [f:\\src\\tidtable.c:256], calling kernel32!TlsGetValue
122bf834 785438b3 msvcr90!_getptd_noexit+0x74 [f:\\src\\tidtable.c:616], calling ntdll!RtlSetLastWin32Error
122bf844 785438c5 msvcr90!_getptd+0x8 [f:\\src\\tidtable.c:641], calling msvcr90!_getptd_noexit [f:\\src\\tidtable.c:566]
122bf84c 7857c98c msvcr90!__FrameUnwindToState+0xd9 [f:\\prebuild\\eh\\frame.cpp:1161], calling msvcr90!_getptd [f:\\src\\tidtable.c:640]
122bf850 7857c972 msvcr90!__FrameUnwindToState+0xbf [f:\\prebuild\\eh\\frame.cpp:1182], calling msvcr90!__SEH_epilog4
122bf860 785436c5 msvcr90!__set_flsgetvalue+0xf [f:\\src\\tidtable.c:256], calling kernel32!TlsGetValue
122bf870 785436c5 msvcr90!__set_flsgetvalue+0xf [f:\\src\\tidtable.c:256], calling kernel32!TlsGetValue
122bf87c 785438b3 msvcr90!_getptd_noexit+0x74 [f:\\src\\tidtable.c:616], calling ntdll!RtlSetLastWin32Error
122bf88c 785438c5 msvcr90!_getptd+0x8 [f:\\src\\tidtable.c:641], calling msvcr90!_getptd_noexit [f:\\src\\tidtable.c:566]
122bf894 7857d06a msvcr90!CallCatchBlock+0x148 [f:\\prebuild\\eh\\frame.cpp:1503], calling msvcr90!_getptd [f:\\src\\tidtable.c:640]
122bf898 7857d03c msvcr90!CallCatchBlock+0x11a [f:\\prebuild\\eh\\frame.cpp:1520], calling msvcr90!__SEH_epilog4
122bf8e8 7857d03c msvcr90!CallCatchBlock+0x11a [f:\\prebuild\\eh\\frame.cpp:1520], calling msvcr90!__SEH_epilog4
122bf8ec 7857d486 msvcr90!CatchIt+0x5e [f:\\prebuild\\eh\\frame.cpp:1275], calling msvcr90!CallCatchBlock [f:\\prebuild\\eh\\frame.cpp:1433]
122bf91c 7857d576 msvcr90!FindHandlerForForeignException+0xdb [f:\\prebuild\\eh\\frame.cpp:976], calling msvcr90!CatchIt [f:\\prebuild\\eh\\frame.cpp:1219]
122bf950 785436c5 msvcr90!__set_flsgetvalue+0xf [f:\\src\\tidtable.c:256], calling kernel32!TlsGetValue
122bf95c 785438b3 msvcr90!_getptd_noexit+0x74 [f:\\src\\tidtable.c:616], calling ntdll!RtlSetLastWin32Error
122bf96c 785438c5 msvcr90!_getptd+0x8 [f:\\src\\tidtable.c:641], calling msvcr90!_getptd_noexit [f:\\src\\tidtable.c:566]
122bf974 7857d8c8 msvcr90!FindHandler+0x334 [f:\\prebuild\\eh\\frame.cpp:879], calling msvcr90!_getptd [f:\\src\\tidtable.c:640]
122bf988 785436c5 msvcr90!__set_flsgetvalue+0xf [f:\\src\\tidtable.c:256], calling kernel32!TlsGetValue
122bf994 785438b3 msvcr90!_getptd_noexit+0x74 [f:\\src\\tidtable.c:616], calling ntdll!RtlSetLastWin32Error
122bf998 7c910323 ntdll!RtlpImageNtHeader+0x56, calling ntdll!_SEH_epilog
122bf9b0 7c90d98a ntdll!NtQueryVirtualMemory+0xc
122bf9b4 7c880b54 kernel32!_ValidateEH3RN+0xb6, calling ntdll!ZwQueryVirtualMemory
122bf9f4 7c83ab50 kernel32!BaseThreadStart+0x4d, calling kernel32!UnhandledExceptionFilter
122bf9fc 7c839b39 kernel32!_except_handler3+0x61
122bfa24 7c9032a8 ntdll!ExecuteHandler2+0x26
122bfa48 7c90327a ntdll!ExecuteHandler+0x24, calling ntdll!ExecuteHandler2
122bfa6c 7c92aa0f ntdll!RtlDispatchException+0xb1, calling ntdll!RtlpExecuteHandlerForException
122bfa98 78591795 msvcr90!_except_handler3+0x69
122bfac0 7c9032a8 ntdll!ExecuteHandler2+0x26
122bfae4 7c90327a ntdll!ExecuteHandler+0x24, calling ntdll!ExecuteHandler2
122bfaf8 7c90e48a ntdll!KiUserExceptionDispatcher+0xe, calling ntdll!RtlDispatchException
122bfdf8 064fdd84 MyModule!Class::MyFunction::Update+0xe4 [c:\\MyCode.cpp:12345] ====> Exception cxr@122bfb2c
122bfb60 7c910222 ntdll!RtlpAllocateFromHeapLookaside+0x42, calling ntdll!_SEH_epilog

无论如何,问题是,我无法获得实际的例外。我知道这是一个std异常,但是我不确定是哪一个(在该行代码中没有自定义异常,因此很多事情可能出错了)。


切换上下文将使您进入RaiseException()调用。如果您查找它,它将在参数块中接受异常代码和一堆特定于应用程序/编译器的参数。 Visual Studio编译器会将异常对象作为参数之一传递,即:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
0:003:x86> .cxr
0:003:x86> dds 2bffb28 la
02bffb28  02bffb60
02bffb2c  7222872d MSVCR100!CxxThrowException+0x45  ; this is the RaiseException() call
02bffb30  e06d7363 ; c++ exception code
02bffb34  00000001 ; flags
02bffb38  00000003 ; number of parameters
02bffb3c  02bffb54 ; parameters
...

0:003:x86> dpp 02bffb54 l3
02bffb54  19930520 ; compiler magic
02bffb58  02bffb70 0016c8b0 mymodule!std::bad_alloc::`vftable'
02bffb5c  0016f088 ; exception descriptor area (compiler-specific)
...

然后,您可以使用dt 02bffb70 mymodule!std :: bad_alloc检查异常对象


您可以尝试在进程存储器中查找上下文签名:

s -d 0 L10000000 / 4 0001003f

如果幸运的话,这将返回找到上下文的内存地址,然后可以使用.cxr将当前上下文设置为该位置。

之所以可行,是因为Windows中的CONTEXT结构(在引发异常时创建)始终以0001003f值开头(仅对X86有效!)。

(摘自"高级Windows调试"一书中的提示)