Gdb: Difference between revisions
Line 543: | Line 543: | ||
<code>dump [format] memory ''filename'' ''start_addr'' ''end_addr''</code> |
<code>dump [format] memory ''filename'' ''start_addr'' ''end_addr''</code> |
||
<code>dump [format] value ''filename'' ''expr''</code> |
<code>dump [format] value ''filename'' ''expr''</code> |
||
=== Reverse debugging === |
|||
;References |
|||
* [https://sourceware.org/gdb/current/onlinedocs/gdb/Reverse-Execution.html GDB Manual - Reverse execution] |
|||
* [https://sourceware.org/gdb/current/onlinedocs/gdb/Process-Record-and-Replay.html#Process-Record-and-Replay GDB Manual - Recording Inferior’s Execution and Replaying It] |
|||
* [https://news.ycombinator.com/item?id=12101347 "Give me 15 minutes and I'll change your view of GDB" (video) (undo.io)] (Hacker News) |
|||
:* [https://www.gnu.org/software/gdb/news/reversible.html GDB news - reversible debug]. |
|||
;Example session |
|||
Say we have the following program: |
|||
<source lang="c"> |
|||
void error(void) |
|||
{ |
|||
// ... |
|||
} |
|||
void foo(void) |
|||
{ |
|||
// ... |
|||
bar(); // Calls error() if something goes wrong |
|||
baz(); |
|||
// ... |
|||
} |
|||
</source> |
|||
We want to debug function <code>bar</code>. We can use gdb reverse debugging as follows: |
|||
<source lang="bash"> |
|||
gdb myprog |
|||
</source> |
|||
<source lang="python"> |
|||
# Start recording when entering 'bar' |
|||
b bar |
|||
commands |
|||
record |
|||
continue |
|||
end |
|||
# Break if error |
|||
b error |
|||
# Stop recording when we exit bar |
|||
tbp baz |
|||
record stop |
|||
continue |
|||
end |
|||
</source> |
|||
If an error occurs, we can use the following commands to walk backward (see reference for more): |
|||
* The usual step or next, but in reverse: <code>reverse-next</code> or <code>rn</code>, <code>reverse-nexti</code> or <code>rni</code>, <code>reverse-step</code> or <code>rs</code>, <code>reverse-stepi</code> or <code>rsi</code>. |
|||
* Reverse continue (until next breakpoint, or record start): <code>reverse-continue</code> or <code>rc</code>. |
|||
* Reverse finish: <code>reverse-finish</code>. |
|||
Recording may be very slow. A faster alternative is to use [[rr]]. |
|||
== Python == |
== Python == |
Revision as of 16:03, 12 February 2020
References
- GDB: The GNU Project Debugger -- Documentation
- 7.2 Example Debugging Session: Segmentation Fault Example (unkownroad.com)
- Debugging with GDB (delorie.com)
- GDB commands (tutorialspoint.com)
- An Interactive Guide to Faster, Less Frustrating Debugging
- Norm Matloff's Debugging Tutorial (also guide to fast editing and gui debuggers DDD, GVD)
- 8 gdb tricks you should know (oracle.com)
- "Give me 15 minutes and I'll change your view of GDB" (video) (undo.io) (Hacker News)
GDB front-ends
There are several types of front-end for GDB:
- GDB built-in front-end (using TUI, Text User Interface)
- Front-end that customizes heavily .gdbinit file.
- Front-end using the newer MI2 interface.
- Front-end using the older MI interface.
More front-ends:
- GDB Front Ends
- How to highlight and color gdb output during interactive debugging?
- See HN post.
- See list on Mozilla rr
- GDB built-in
- GDB TUI — GDB own Text User Interface (C-x C-a: http://davis.lbl.gov/Manuals/GDB/gdb_21.html)
- gdbinit front-end
- IDE with gdb integration
- HOT VSCode https://code.visualstudio.com/docs/cpp/cpp-debug
- HOT Emacs https://www.gnu.org/software/emacs/manual/html_node/emacs/Debuggers.html
- Emacs is frequently touted as having the best GDB integration (better than DDD for instance) [1]. Must check for some tutorials [2].
- CLion https://www.jetbrains.com/clion/
- QtCreator http://doc.qt.io/qtcreator/
- Eclipse
- MI2 front-ends
- NEW gdbgui https://www.gdbgui.com/
- Seen on Mozilla rr.
- (Neovim) lldb.nvim
- Only for LLDB.
- (Vim) Conque-GDB
- Use old shell implementation, not the new neovim terminal.
- (Vim) pyclewn
- Read some comment it was not convenient, and would require extra plugin like https://github.com/notEvil/vim-debug.
- MI front-end (old interface)
GDBINIT Hacks
- Using colout one may color almost any gdb output.
Tools and libraries
- Capstone, the ultimate disassembly engine.
Tutorials
- GDB TUI mode, python, reverse debugging (with
record
).
Alternatives to GDB
rr
☒ | TODO: Have a look at rr |
RR is the Record and Replay Framework, developped by Mozilla, and is a replacement for and powerful enhancement of gdb.
LLDB
☒ | TODO: Have a look at LLDB |
The debugger from Apple, mostly compatible with GDB with more powerful feature, but for LLVM/CLang only.
No debugger
Some people don't use / like debuggers:
- I don't like debuggers. Never have, probably never will. I use gdb all the time, but I tend to use it not as a debugger, but as a disassembler on steroids that you can program.
- The most effective debugging tools are: your brain, a unit test, and the print statement.
- Any programmer not writing unit tests for their code in 2007 should be considered a pariah (*).
GDB configuration
GDB reads file ~/.gdbinit at start.
Some references:
Bare minimum configuration
From StackOverflow [3]:
set history save on
set print pretty
set output-radix 16
set height 0
Install Python modules for GDB
From pwndbg [4]:
# Find the Python version used by GDB.
PYVER=$(gdb -batch -q --nx -ex 'pi import platform; print(".".join(platform.python_version_tuple()[:2]))')
PYTHON=$(gdb -batch -q --nx -ex 'pi import sys; print(sys.executable)')
PYTHON="${PYTHON}${PYVER}"
# Find the Python site-packages that we need to use so that
# GDB can find the files once we've installed them.
SITE_PACKAGES=$(gdb -batch -q --nx -ex 'pi import site; print(site.getsitepackages()[0])')
# or to install in user mode:
SITE_PACKAGES=$(gdb -batch -q --nx -ex 'pi import site; print(site.getusersitepackages())')
# Install Python dependencies
sudo ${PYTHON} -m pip install --target ${SITE_PACKAGES} -Ur requirements.txt
Example of file requirements.txt
pip pycparser psutil>=3.1.0
Front-ends
Gef
Simple install script [5]:
# via the install script
$ wget -q -O- https://github.com/hugsy/gef/raw/master/scripts/gef.sh | sh
# manually
$ wget -O ~/.gdbinit-gef.py -q https://github.com/hugsy/gef/raw/master/gef.py
$ echo source ~/.gdbinit-gef.py >> ~/.gdbinit
Dependencies:
- Install keystone-engine, NOT keystone (fix error
AttributeError: 'module' object has no attribute 'KS_ARCH_X86'
):
pip3 install --no-binary keystone-engine keystone-engine
GDB dashboard
GDB dashboard is a modular visual interface for GDB in Python.
To install simply copy .gdbinit as ~/.gdbinit
cp gdb-dashboard/.gdbinit ~/.gdbinit
Alternatively, source it from ~/.gdbinit:
source ~/.gdbinit-dashboard
- Install pygments
Install pygments to get source highlighting
sudo pip install Pygments # Globally pip install Pygments # Locally
If GDB uses python3 (ldd $(which gdb))
), you'll need to install with pip3
:
sudo pip3 install Pygments # Globally pip3 install Pygments # Locally
To get the list of available styles:
python from pygments.styles import get_all_styles as styles python for s in styles(): print(s)
Alternative styles:
- Issues
Cannot write the dashboard: [Errno 10] No child process
issue #56
- This is a bug in the gdb vendor. Fix file platform.py:
@@ -1009,7 +1009,10 @@
except (AttributeError,os.error):
return default
output = string.strip(f.read())
- rc = f.close()
+ try:
+ rc = f.close()
+ except:
+ rc = 0
if not output or rc:
return default
else:
Cannot write the dashboard: Invalid character '?' in expression.
- Likely due to incorrect character in
info reg
. The register is evaluated viaparse_and_eval
Voltron
See Voltron.
GDB TUI
Some example inspired from Greg Law video on Youtube:
- Start TUI mode with Ctrl-X A, or
gdb -tui
, ortui enable
. - Ctrl-L repaint the screen.
- Ctrl-X 2 to split the layout, or
layout split
. tui reg float
for instance to change the register view.
Note that while in TUI mode, up and down keys will scroll the source code:
- Up / Down scroll the source code.
- Ctrl-P / Ctrl-N Previous or Next command in command history.
- Ctrl-O switch focus (does not work for me).
CGDB
☒ | TODO: Look at CGDB as simple alternative to GDB TUI |
Prepare debug session
- Compile with debug symbols, use option -g:
gcc -g program.c # -g : debug symbols
gcc -g -O0 program.c # ... -O0: disable optimization
- Force core dumps (see bash help ulimit):
ulimit -c unlimited
./a.out
# Segmentation fault (core dumped)
GDB invocation
gdb a.out
gdb a.out core.1234 # If coredump available
GDB commands
Reference
- GDB manual
- https://beej.us/guide/bggdb/
Break points and watch points | |
---|---|
|
Set a breakpoint at current line, at given line NUMBER or NUMBER lines after/before current line. Set breakpoint at LOCATION.
|
|
Idem, but temporary breakpoint. |
|
Set breakpoint at LOCATION.
|
|
Set commands to execute when a breakpoint is hit |
|
Stop execution when EXPR changes |
|
Stop execution when EXPR is accessed |
|
list breakpoints |
|
Clear breakpoint by LOCATION |
|
Delete all breakpoints |
|
Clear breakpoint by NUMBER (as listed by i b )
|
|
Disable breakpoint by NUMBER (as listed by i b )
|
|
Save current breakpoints as script FILE. Use source to reload.
|
Registers | |
|
Display registers |
Execute program | |
---|---|
|
Start (or restart) program. Arguments may include wildcards (*) and redirections (<, <<...) |
|
Start and break on main
|
|
Kill current program. |
|
Continue and interrupted program. |
|
Step (into) current line, or NUMBER lines. |
|
Step one (assembly) instruction exactly (N times) |
|
Run to next line (over current line) |
|
Step one (assembly) instruction exactly (N times), but over subroutine calls. |
|
Execute till returning from current selected frame. |
|
Run until temporary breakpoint set at LOCATION. |
|
Execute until the program reaches a source line greater than current (very handy). |
View stack | |
---|---|
|
Print backtrace of all stack frames, or innermost (outermost) COUNT frames if COUNT>0 (COUNT<0) |
|
Select frame FRAME and print stack frame |
|
Go up a level in the stack (frame calling current frame). |
|
Go down a level in the stack (frame called by current frame). |
View memory | |
---|---|
|
Display EXPR at each prompt (if within scope). |
|
Examine n memory locations at ADDR, format as n (
|
|
Print information on local variables / function arguments in the current frame |
|
print EXPR. |
|
Undisplay expression by NUMBER. |
View code | |
---|---|
|
List (10 by default) lines of current frame |
|
Disassemble a specified section of memory |
Miscellaneous | |
---|---|
|
Quit gdb. |
|
Get help on COMMAND, or search commands related to WORD. |
|
Source script FILE. |
RETURN | Repeat last command. |
|
Load symbols from FILE at given ADDR. |
Change memory
set VARIABLE = VALUE
For instance, given a program
int main(void){
char[] person = "Bob";
char[] p2 = "Alice";
printf("Hello %s\n");
}
set main::person = { 'S', 'a', 'm', 0x00 }
set main::person = "Sam"
# To change memory directly:
set {char [4]}0x43f800 = {0x01, 0x02, 0x03, 0x04}
Alternatively we can use strcpy
[6]:
(gdb) p malloc(20) $3 = (void *) 0x6ce81808 (gdb) p strcpy($3, "my string") $4 = 1827149832 (gdb) x/s $3 0x6ce81808: "my string"
Dump / restore
For instance, to load an Intel hex file:
restore firmware.hex
To generate the same file:
dump ihex memory firmware.hex 0x00400000 0x0040FFFF
Note that dump
can also save the result of an expression:
dump [format] memory filename start_addr end_addr
dump [format] value filename expr
Reverse debugging
- References
- GDB Manual - Reverse execution
- GDB Manual - Recording Inferior’s Execution and Replaying It
- "Give me 15 minutes and I'll change your view of GDB" (video) (undo.io) (Hacker News)
- Example session
Say we have the following program:
void error(void)
{
// ...
}
void foo(void)
{
// ...
bar(); // Calls error() if something goes wrong
baz();
// ...
}
We want to debug function bar
. We can use gdb reverse debugging as follows:
gdb myprog
# Start recording when entering 'bar'
b bar
commands
record
continue
end
# Break if error
b error
# Stop recording when we exit bar
tbp baz
record stop
continue
end
If an error occurs, we can use the following commands to walk backward (see reference for more):
- The usual step or next, but in reverse:
reverse-next
orrn
,reverse-nexti
orrni
,reverse-step
orrs
,reverse-stepi
orrsi
. - Reverse continue (until next breakpoint, or record start):
reverse-continue
orrc
. - Reverse finish:
reverse-finish
.
Recording may be very slow. A faster alternative is to use rr.
Python
See gdb python.
Tips
Use RETURN to repeat last command
Pressing RETURN repeats all last command:
- Commands like
s
(step) orn
(next). Very handy to step in the code. - Command like
x/16w 0x10100000
orx/16i 0x10100000
, each time printing 16 new words.
Define a custom label for breakpoint in C/C++
Say we want to set a breakpoint at a specified location in source file, but this position may move over time. The easiest is to use an asm
statement to define the label [7]:
#include <stdio.h>
int main () {
void *ret_p = &&ret;
printf("ret: %p\n", ret_p);
goto *ret_p;
return 1;
ret:
asm("RET:")
return 0;
}
This will add a symbol table entry as follows.
gcc -Wl,--export-dynamic t.c -ldl
readelf -s a.out | grep RET
# 41: 0804858a 0 NOTYPE LOCAL DEFAULT 13 RET
Use help
to test a command abbreviation
Don't know if f
stands for finish
or frame
? Just use help f
:
help f
# Select and print a stack frame.
# ...
8 gdb tricks you should know
From https://blogs.oracle.com/ksplice/entry/8_gdb_tricks_you_should:
- Use
break WHERE if COND
- For instance
break context_switch if next == init_task
.
- Use
command
- This sets commands to be executed when a breakpoint is hit. For instance
b do_mmap_pgoff
# Breakpoint 1 at 0xffffffff8111a441: file mm/mmap.c, line 940.
command 1
# Type commands for when breakpoint 1 is hit, one per line.
# End with a line saying just "end".
>print addr
>print len
>print prot
>end
- Use
gdb --args
to specify runtime arguments
gdb --args pizzamaker --deep-dish --toppings=pepperoni
# ...
show args
# Argument list to give program being debugged when it is started is
# " --deep-dish --toppings=pepperoni".
b main
# ...
- Finding source files
- Use
directory
to add directory to search for source files.
list main
# 1192 ls.c: No such file or directory.
# in ls.c
directory ~/src/coreutils-7.4/src/
# Source directories searched: /home/nelhage/src/coreutils-7.4:$cdir:$cwd
list main
- Use
set substitute-path
to fix absolute paths
list schedule
# 5519 /build/buildd/linux-2.6.32/kernel/sched.c: No such file or directory.
# in /build/buildd/linux-2.6.32/kernel/sched.c
set substitute-path /build/buildd/linux-2.6.32 /home/nelhage/src/linux-2.6.32/
list schedule
- Use gcc
-ggdb3
to add MACRO's symbol as gdb macro
- Use gdb's variable like
$1
but also define your own
set $foo = 4
p $foo
# $3 = 4
- Use register variables
- All CPU registers are available as variables like
$R0
,$R1
, but gdb also defines cross-architectures ones like$sp
and$pc
. For instance, if$rsi
register is used to pass the 1st parameter,
break write if $rsi == 2
- The
x
command
x/s 0xffffffff81946000
# ffffffff81946000 <>: "root=/dev/sda1 quiet"
# Use x/i as a quick way to disassemble memory
x/5i schedule
# 0xffffffff8154804a <schedule>: push %rbp
# 0xffffffff8154804b <schedule+1>: mov $0x11ac0,%rdx
# 0xffffffff81548052 <schedule+8>: mov %gs:0xb588,%rax
# 0xffffffff8154805b <schedule+17>: mov %rsp,%rbp
# 0xffffffff8154805e <schedule+20>: push %r15
# Print code surround current pc
x/20i $ip-40
- Use the
@
symbol
- The following works if source code is something like int a[ 10 ] = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 };:
p a
# $1 = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
- But if the array is much bigger, or array is a C++ vector, we can use
@
:
p *&a[0]@10
# $1 = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
p *&a[550]@4
# $1 = {551, 552, 553, 554}
Use value history variables $
See summary list below. For more details, check GDB manual on Value History.
$1 # History value 1
$2 # History value 2
$ # MOST RECENT value in the history
$$ # ... and value before that
$$2 # ... and value before that
$$0 # Same as $
$$1 # Same as $$
For instance:
p *$ # Dereference last value
p *$.next # ... follow the chain
<RETURN> # ... again
<RETURN> # ... again
show values # Print the last 10 values.
Disassemble at an arbitrary address
disas FUNCTION
command only works for defined FUNCTION
. To disassemble at an arbitrary address:
x/i 0x10100000
one instruction at address0x10100000
,x/16i 0x10100000
(16 instruction) at addressOx10100000
,x/16i *0x10100000
(16 instruction) at address contained atOx10100000
,x/16i $PC
disassemble 16 instructions at PC.
Redirect STDIN
Redirect STDIN with the run
command:
gdb ./myprog
run <input.txt # Run with stdin redirected
One can also pass parameters with the run
command (or use gdb --args
command-line parameter).
Exit gdb if run fails
Use python script
def tryRun():
try:
gdb.execute("run")
except:
print("Exception occured during gdb command: run")
gdb.execute("quit 1")
Define custom gdb command
Define custom gdb command using define
:
# define in .gdbinit
define sf
where # find out where the program is
info args # show arguments
info locals # show local variables
end
See also Gdb python to define more powerful custom commands.
Load symbols from another ELF file
This is useful in embedded systems where some part of the code are already loaded or stored in a ROM. When the debugger stops in a function for which it doesn't have the symbols, it cannot decode the stack and provide a correct backtrace. The fix is to load the symbols for that function using the command add-symbol-file
.
add-symbol-file a.out 0 # Add symbol from file a.out, at offset 0
Typically the offset to give is the lowest address in the ELF file.
Modify memory content
Use set
[8]. Simplest is to modify a variable:
set variable i = 10
But GDB can write in any memory location:
set {int}0x83040 = 4
set *((int *)0x83040) = 4
Remote debug with gdbserver
Start the gdb server on the remote machine:
gdbserver --multi 192.168.20.1:6666 # CLIENT_ADDR:REMOTE_PORT
This will listen on port 6666
, waiting for connection from client 192.168.20.1
On the client, start the GDB client:
gdb-multiarch ./my_exec # multiarch necessary if client/server are different arch
Then, in GDB:
target extended-remote {REMOTE_ADDR}:{REMOTE_PORT}
set remote exec-file /path/on/remote/to/my_exec
If the remote executable uses dynamic libraries, these must be sent to the client. To accelerate the loading, copy first the libraries locally on the client, then tell GDB where to find them [9]:
set sysroot /d/st/courses/training_obfu/formation_reverse/dynamic/tp/qmessage/pi_root
set solib-absolute-prefix /d/st/courses/training_obfu/formation_reverse/dynamic/tp/qmessage/pi_root
set solib-search-path /d/st/courses/training_obfu/formation_reverse/dynamic/tp/qmessage/pi_root
Reverse debugging
From Greg Law's incredible video.
Assume we have an application that crashes at random. We want to debug it when it crashes.
First we setup some breakpoint and start recording automatically:
gdb a.out
start
break main
command
record
continue
end
break _exit.c:32 # Hack. to break on exit
command
run
end
We also make sure pagination is disabled:
set pagination off
Now we cont
until the code crashes. We start to reverse debug the program:
p $pc
# 1 = (void (*)()) 0x5e0c5d00
x 0x5e0c5d00
# 0x5e0c5d00 Cannot access memory at address 0x5e0c5d00
bt
# ... the stack is corrupted. Let's step back...
reverse-stepi
# 0x00000000004806ac in main () at bubble_sort.:43
# 43 }
# ... we're back in normal land
bt
# 0x00000000004806ac in main () at bubble_sort.:43
disas
# 0x00000000004806ac <+135>: retq
# ... so indeed we tried to return, but likely the stack is corrupted
Let's look at our stack:
print $sp
# 2 = (void *) 0x7fffffffdc98
print *(long **) 0x7fffffffdc98
# 3 = (long *) 0x5e4c5d00
# ... this the address we would jump to if RETQ
watch *(long **) 0x7fffffffdc98
# Hardware watchpoint 4: *(long **) 0x7fffffffdc98
We have set our hardware watchpoint, and will reverse continue! This will bring us to the point where the corruption occured:
reverse-continue
# old value = (long *) 0x5e4c5d00
# new value = (long *) 0xffff7a36ec5 <__libc_start_main+245>
# 0x00000000004806a8 in main () at bubble_sort.:37
print i
4 = 35
We were indeed overwriting the stack because of array overflow!
Use Catch to break on syscall
This was used by HN to debug a complex bugs in some Python profiler [10]:
# This looks for "lseek" followed by "close" without intervening "read".
set height 0
catch syscall close
catch syscall read
catch syscall lseek
disable 1 2
commands 2
disable 1 2
continue
end
commands 3
if $rdi == 31
enable 1 2
continue
else
continue
end
end
Printing and Examing memory
- Getting rid of octal
- By default, gdb uses octal' to print char string, which is a major PITA. Use
p/x
orp/a
to work-around that, or use examine (x
)
- Dealing with examine default format / unit size
- The complete examine syntax is
x/nfu addr
, where n is the repeat count, f is the format (same as for print, ie. one ofx
,d
,u
,o
,t
,a
,c
,f
,s
), and u is the unit size (one ofb
,h
,w
,g
). - If not specified, examine uses a default value for the format (
x
initially) and unit size (w
for x format,g
for a format). But the default changes every time you use print or examine!
Printing arrays and pointers (to arrays)
Given the C code:
uint8_t arr[8] = {0x12, 0x34, 0x56, 0x78, 0x11, 0x22, 0x33, 0x44};
uint8_t *p = arr;
Using print or p:
# -- print: arr and *p
p arr
p *p@8
# $1 = "\022\064Vx\021\"3D"
p/a arr
p/x arr
p/a *p@8
p/x *p@8
# $2 = {0x12, 0x34, 0x56, 0x78, 0x11, 0x22, 0x33, 0x44}
p *p
# $3 = 0x12
# -- print: &arr, p and &p
p &arr
# $4 = (uint8_t (*)[8]) 0x404030 <arr>
p p
# $4 = (uint8_t *) 0x404030 <arr> "\022\064Vx\021\"3D"
p/a &arr
p/a p
# $5 = 0x404030 <arr>
p/x &arr
p/x p
# $3 = 0x404030
p &p
# $1 = (uint8_t **) 0x404040 <p>
p/a &p
# $2 = 0x404040 <p>
p/x &p
# $3 = 0x404040
# -- print: More cases with @
p arr@2
# $8 = {"\022\064Vx\021\"3D", "\000\000\000\000\001\000\000"}
p/a arr@2
p/x arr@2
# $9 = {{0x12, 0x34, 0x56, 0x78, 0x11, 0x22, 0x33, 0x44}, {0xa2, 0xa1, 0xb2, 0xb1, 0x0, 0x0, 0x0, 0x0}}
p p@8
# $7 = {0x404030 <arr> "\022\064Vx\021\"3D", 0x100000001 <error: Cannot access memory at address 0x100000001>, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}
p/a p@8
# $8 = {0x404030 <arr>, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}
p/x p@8
# $9 = {0x404030, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}
Using examine or x:
# -- examine: arr, &arr, p (all points to same address)
# ... We force FORMAT and UNIT SIZE to avoid relying on previous default setting.
x/xw arr
x/xw &arr
x/xw p
# 0x404030 <arr>: 0x78563412
# ... From now on, all examine will use hexadecimal, and unit size for hex is 'word'.
x/xg arr
x/xg &arr
x/xg p
# 0x404030 <arr>: 0x4433221178563412
# ... From now on, all examine will use hexadecimal, and unit size for hex is 'giant'.
x/xb arr
x/xb &arr
x/xb p
# 0x404030 <arr>: 0x12
# ... From now on, all examine will use hexadecimal, and unit size for hex is 'byte'.
x/8b arr
x/8b &arr
x/8b p
# 0x404030 <arr>: 0x12 0x34 0x56 0x78 0x11 0x22 0x33 0x44
# -- examine: address 'a' format is always SIGNED, which may gives strange results:
# ... same as 'x' if positive:
x/xw arr
x/aw arr
# 0x404030 <arr>: 0x78563412
# ... but different is negative. This is because 'a' takes the value as an address (negative=stack).
set arr[3]=0x80
x/aw arr
# 0x404030 <arr>: 0xffffffff80563412
x/xw arr
# 0x404030 <arr>: 0x80563412
# -- examine: &p (address of pointer p itself)
x/aw &p
# 0x404050 <p>: 0x404030 <arr>
# ... note again difference with 'hexadecimal' format:
x/xw &p
# 0x404050 <p>: 0x00404030
# -- examine: bad cases (usually)
x *p
# 0x1: Cannot access memory at address 0x12
x &p@8
# Only values in memory can be extended with '@'.
x/xb arr
x/xb arr@8
# 0x404030 <arr>: 0x12
# ... @8 has no effect. One must use x/8xb
- Notes
- We can use both
p/x
andp/a
to remove octal format. The small advantage forp/a
is that it will also prints to nearest preceding symbol.
p/a some_struct # Address mode... but strangely it removes octal. WTF?
p
andx
always default to last used format, unless one is specified. The default forx
is x, and changes each time you usex
orprint
[11]:
Printing struct and pointers (to struct)
Given the C code:
struct {
uint16_t a;
uint16_t b;
} S = {0xa1a2,0xb1b2}, *s = &S;
Using print or p:
# -- print: S and *s
p S
p/a S
p/x S
p *s
p/a *s
p/x *s
# $9 = {
# a = 0xa1a2,
# b = 0xb1b2
# }
# -- print: &S, s and &s
p &S
p s
# $1 = (struct {...} *) 0x404038 <S>
p/a &S
p/a s
# $2 = 0x404038 <S>
p/x &S
p/x s
# $3 = 0x404038
p &s
# $4 = (struct {...} **) 0x404040 <s>
p/a &s
# $5 = 0x404040 <s>
p/x &s
# $6 = 0x404040
# -- print: More cases with @
p S@2
p/a S@2
p/x S@2
# $2 = {{
# a = 0xa1a2,
# b = 0xb1b2
# }, {
# a = 0x0,
# b = 0x0
# }}
p s@2
p/a s@2
# $2 = {0x404038 <S>, 0x0}
p/x s@2
# $2 = {0x404038, 0x0}
Using examine or x:
# -- examine: &S, s, in hexadecimal format
x/xw &S
x/xw s
# 0x404038 <S>: 0xb1b2a1a2
x/xg &S
x/xg s
# 0x404038 <S>: 0x00000000b1b2a1a2
x/xb &S
x/xb s
# 0x404038 <S>: 0xa2
# -- examine: &S, s, in address format
x/aw &S
x/aw s
# 0x404038 <S>: 0xffffffffb1b2a1a2
x/ab &S
x/ab s
# 0x404038 <S>: 0xffffffffffffffa2
x/ag &S
# 0x404038 <S>: 0xb1b2a1a2
# ... This is because address is 0x00000000b1b2a1a2, and leading zeroes are removed.
# -- examine: bad cases (usually)
x/xb S
x/xb *s
# Value can't be converted to integer.
x/xb &S@8
# Only values in memory can be extended with '@'.
x/xw s
x/xw s@4
# 0x404040 <s>: 0x00404038
# ... @8 has no effect. One must use x/4xw
Examples
Simple Segmentation Fault Example
(From [12])
Example program segfault.c:
#include <stdio.h>
#include <stdlib.h>
int main(int argc, char **argv)
{
char *buf;
buf = malloc(1<<31);
fgets(buf, 1024, stdin);
printf("%s\n", buf);
return 1;
}
|
Compile and launch gdb:
gcc -g segfault.c
gdb a.out
The debug session run
backtrace
frame 3
print buf
kill
break segfault.c:8
run
print buf
next
print buf Fix the bug, then start again, watching now watch buf
# Start again, answer 'y' when asked to start from beginning
run
# Break at watch point, let's _c_ontinue
c
|
More GDB stuff
display i # Display i at each stop
display/4i $pc # Display the 4 next instruction at each stop
u # Continue until we reach an higher pc address
Using gdb-dashboard
da # Print dashboard again
da reg # Remove register
da reg # Add it back
da m w 0x1000 0x10 # Watch memory zone at 0x1000 for 16 bytes
da m w 0x2000 0x10 # Add a second zone at 0x2000
Frequently used commands
info reg
x/i $pc
GDB script
Breakpoint command lists
See help commands
(or here)
Example script:
break foo if x>0
commands
silent
printf "x is %d\n",x
cont
end
- Use
silent
to make the breakpoint silent. - Use condition (here
if x>0
) on breakpoint to break conditionally.