Some terminology:
lldb
is a command-line debuggerLLVMis the compiler framework that includes many things, including the
clang
compiler that we are using, as well as lldb
gdb
is the debugger that was used in the past, and is often used elsewhere – it is analogous to lldb
in how it worksA debugger is a utility program that allows you to run a program under development while controlling its execution and examining the internal values of variables. We think of a program running inside
a debugger. The debugger allows us to control the execution of the program by pausing its execution and then resuming it. While paused, we can find out where we are in the program, what values variables have, reset the values of variables, etc. If a program crashes, the debugger can tell you exactly where the program crashed. The principles and commands described in this document are specific to the lldb debuggers under UNIX, but every debugger has similar commands.
We’ll use debuggers initially on binary files. When using them on code you wrote, you want to compile with the -g
flag to enable debugging symbols, which will make the debugger much more useful.
lldb
portal.cs.virginia.edu
and running module load clang-llvm
)lldb program_to_debug
The following sections describe the important types of things you can do with lldb
, organized by category
of activity.
The following all assume you are in a debugger
Command | Meaning |
---|---|
run |
(re)start the program |
run x y z |
(re)start the program with command line arguments x , y , and z |
step |
step one source-code-line forward, entering functions if stepping on call |
next |
step one source-code-line forward, skipping to return if stepping on call |
stepi |
step one ISA-instruction forward, entering functions if stepping on call |
nexti |
step one ISA-instruction forward, skipping to return if stepping on call |
finish |
run until the next return |
continue |
resume running after run was interrupted (e.g., after a breakpoint or step ). |
exit |
leave the debugger |
You might also want to use Ctrl+C to interrupt a program if it is running too long (this works on the command line for programs run without a debugger too).
A breakpoint is a program location where the debugger pauses when running so you can see what’s around it.
When run
, the debugger pauses right before executing the code on which you place a breakpoint.
Command | Meaning |
---|---|
br set -n main |
set a breakpoint on the first line of main |
br foo.c:23 |
set a breakpoint on the line 23 of foo.c (must be a line with code, not a comment, blank line, etc) |
br list |
list all breakpoints |
br delete 1 |
delete breakpoint number 1 (as indicated in the list) |
To inspect the code and call stack,
Command | Meaning |
---|---|
bt |
show a backtrace : a list of call s used to reach here |
up |
select the stack frame of the caller of the current stack frame |
down |
undo a previous up |
di -f |
diassemble the code for the current call f rame. |
di -n main |
diassemble the code for the function n amed main |
di -n main -b |
diassemble the code for the function n amed main , with byte encoding of instructions included |
di -s 0x1234 -c 20 |
diassemble 20 bytes starting at address 0x1234 |
If you need to peek inside registers or memory,
Command | Meaning |
---|---|
frame info |
show information about the current stack frame |
register read |
show the contents of the program registers |
register read --format i |
show the contents of the program registers, formated as signed integers |
register read rax rdx |
show the contents of rax and rdx (only) |
me rea -s4 -fx -c8 0x1234 |
me mory rea d, with a c ount of 8 values, each value’s s ize being 4 bytes, f ormated in hex adecimal, from address 0x1234 |
cmdadd
See the cmdadd example for a detailed walkthrough.
recfib
The program recfib
is supposed to print out the nth Fibonacci number, where n is provided on the command line, as e.g.
./recfib 0
The 0th Fibonacci number is 1
./recfib 4
The 4th Fibonacci number is 5
./recfib 6
The 6th Fibonacci number is 13
However, the program prints the wrong numbers.
Your task: use lldb
to find the bug, then use a hex editor to fix it.
Hex editors
We used an online hex-editor in Lab 03, and that can be used again here. There are also various hex-editor applications, such as
If editing binaries becomes a common part of your workflow (it won’t in this class, but might later in your careers) then picking a hex editor you like will be worth your while.
Note: the simplest fix (though not the only one) includes changing the conditions of a jump. There are multiple encodings of jumps, but the most common is a two-byte encoding, where the second byte is a relative offset and the first byte indicates the condition of the jump:
Instruction | First byte of short jumpoperation |
---|---|
je |
74 |
jne |
75 |
jl |
7C |
jge |
7D |
jle |
7E |
jg |
7F |
If you need to fill extra bytes, you can always insert nop
instructions: 0x90
swaps the contents of %eax
and %eax
(i.e., does nothing) and can fill space freely.
We compiled recfib
with the -g
flag, so you’ll see some source code as well as assembly.
Linux has a notion of file permissions
which we’ll learn more about in CSO2. One of those permissions is executable
, meaning a file can be run as a program. Depending on how you download recfib
and get it onto portal
, it might or might not have that permission.
If lldb
’s run
command gives an error message like 'A' packet has an error
, try exiting lldb
and running chmod +x recfib
to enable executable permissions on the recfib
file.
To check-off this lab, show a TA your working code. The TA may also request that you discuss how you used the debugger to solve the problem and/or that you do a few simple debugger actions for them.