英雄联盟直播软件下载

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
GNU Debugger
GDB Archer Fish by Andreas Arnez.svg
GNU gdb 12.1 screenshot.png
Developer(s) GNU Project
Initial release 1986 ; 36 years ago  ( 1986 )
Stable release
12.1 [1]   Edit this on Wikidata / 1 May 2022
Repository
Written in C
Operating system Unix-like , Windows
Type Debugger
License GPLv3
Website www .gnu .org /software /gdb

The GNU Debugger ( GDB ) is a portable debugger that runs on many Unix-like systems and works for many programming languages , including Ada , C , C++ , Objective-C , Free Pascal , Fortran , Go , [2] and partially others. [3]

History [ edit ]

GDB was first written by Richard Stallman in 1986 as part of his GNU system, after his GNU Emacs was "reasonably stable". [4] GDB is free software released under the GNU General Public License (GPL). It was modeled after the DBX debugger, which came with Berkeley Unix distributions. [4]

From 1990 to 1993 it was maintained by John Gilmore . [5] Now it is maintained by the GDB Steering Committee which is appointed by the Free Software Foundation . [6]

Technical details [ edit ]

Features [ edit ]

GDB offers extensive facilities for tracing and altering the execution of computer programs . The user can monitor and modify the values of programs' internal variables , and even call functions independently of the program's normal behavior.

GDB target processors (as of 2003) include: Alpha , ARM , AVR , H8/300 , Altera Nios/Nios II , System/370 , System 390 , X86 and its 64-bit extension X86-64 , IA-64 "Itanium", Motorola 68000 , MIPS , PA-RISC , PowerPC , SuperH , SPARC , and VAX . Lesser-known target processors supported in the standard release have included A29K , ARC , ETRAX CRIS , D10V , D30V , FR-30 , FR-V , Intel i960 , 68HC11 , Motorola 88000 , MCORE , MN10200 , MN10300 , NS32K , Stormy16 , and Z8000 . (Newer releases will likely not support some of these.) GDB has compiled-in simulators for even lesser-known target processors such like M32R or V850 . [7]

GDB is still actively being developed. As of version 7.0 new features include support for Python scripting [8] and as of version 7.8 GNU Guile scripting as well. [9] Since version 7.0, support for "reversible debugging" — allowing a debugging session to step backward, much like rewinding a crashed program to see what happened — is available. [10]

Remote debugging [ edit ]

GDB offers a "remote" mode often used when debugging embedded systems. Remote operation is when GDB runs on one machine and the program being debugged runs on another. GDB can communicate to the remote "stub" that understands GDB protocol through a serial device or TCP/IP. [11] A stub program can be created by linking to the appropriate stub files provided with GDB, which implement the target side of the communication protocol. [12] Alternatively, gdbserver can be used to remotely debug the program without needing to change it in any way.

The same mode is also used by KGDB for debugging a running Linux kernel on the source level with gdb. With KGDB, kernel developers can debug a kernel in much the same way as they debug application programs. It makes it possible to place breakpoints in kernel code, step through the code, and observe variables. On architectures where hardware debugging registers are available, watchpoints can be set which trigger breakpoints when specified memory addresses are executed or accessed. KGDB requires an additional machine which is connected to the machine to be debugged using a serial cable or Ethernet . On FreeBSD , it is also possible to debug using FireWire direct memory access (DMA). [13]

Graphical user interface [ edit ]

The debugger does not contain its own graphical user interface , and defaults to a command-line interface , although it does contain a text user interface . Several front-ends have been built for it, such as UltraGDB , Xxgdb , Data Display Debugger (DDD), Nemiver , KDbg , the Xcode debugger, GDBtk/Insight, Seer, and HP Wildebeest Debugger GUI (WDB GUI). IDEs such as Codelite , Code::Blocks , Dev-C++ , Geany , GNAT Programming Studio (GPS), KDevelop , Qt Creator , Lazarus , MonoDevelop , Eclipse , NetBeans , and Visual Studio can interface with GDB. GNU Emacs has a "GUD mode" and tools for Vim exist (e.g. clewn). These offer facilities similar to debuggers found in IDEs.

Some other debugging tools have been designed to work with GDB, such as memory leak detectors.

Internals [ edit ]

GDB uses a system call named ptrace (the name is an abbreviation of "process trace") to observe and control the execution of another process, and examine and change the process's memory and register. A list of common gdb commands and corresponding ptrace calls are listed below:

  • (gdb) start : PTRACE_TRACEME – makes parent a tracer (called by a tracee)
  • (gdb) attach PID: PTRACE_ATTACH – attach to a running process
  • (gdb) stop: kill(child_pid, SIGSTOP) (or PTRACE_INTERRUPT)
  • (gdb) continue: PTRACE_CONT
  • (gdb) info registers : PTRACE_GET(FP)REGS(ET) and PTRACE_SET(FP)REGS(ET)
  • (gdb) x : PTRACE_PEEKTEXT and PTRACE_POKETEXT

A breakpoint is implemented by replacing an instruction at a given memory address with another special instruction. Executing breakpoint instruction causes SIGTRAP.

Examples of commands [ edit ]

gdb program Debug "program" (from the shell)
run -v Run the loaded program with the parameters
bt Backtrace (in case the program crashed)
info registers Dump all registers
disas $pc-32, $pc+32 Disassemble

An example session [ edit ]

Consider the following source-code written in C :

			
			
				#include
			
			
			
				
				
				
					#include
				
				
				
					
					
					
						#include
					
					
					
						
						
						
							size_t
						
						
						
							foo_len
						
						
							(
						
						
						
							const
						
						
						
							char
						
						
						
							*
						
						
							s
						
						
						
							)
						
						
						
							{
						
						
						
						
							return
						
						
						
							strlen
						
						
							(
						
						
						
							s
						
						
						
							);
						
						
						
							}
						
						
						
							int
						
						
						
							main
						
						
							(
						
						
						
							int
						
						
						
							argc
						
						
							,
						
						
						
							char
						
						
						
							*
						
						
							argv
						
						
							[]
						
						
						
							)
						
						
						
							{
						
						
						
						
							const
						
						
						
							char
						
						
						
							*
						
						
							a
						
						
						
							=
						
						
						
							NULL
						
						
							;
						
						
						
						
							printf
						
						
							(
						
						
						
							"size of a = %lu
						
						
							\n
						
						
							"
						
						
							,
						
						
						
							foo_len
						
						
							(
						
						
							a
						
						
							)
						
						
						
							);
						
						
						
						
							exit
						
						
							(
						
						
						
						
						
							);
						
						
						
							}
						
						
					

Using the GCC compiler on Linux , the code above must be compiled using the -g flag in order to include appropriate debug information on the binary generated, thus making it possible to inspect it using GDB. Assuming that the file containing the code above is named example.c , the command for the compilation could be:

				
				
					$
				
				gcc example.c -Og -g -o example
			

And the binary can now be run:

				
				
					$
				
				./example
				
					Segmentation fault
				
			

Since the example code, when executed, generates a segmentation fault , GDB can be used to inspect the problem.

				
				
					$
				
				gdb ./example
				
					GNU gdb (GDB) Fedora (7.3.50.20110722-13.fc16)
				
				
					Copyright (C) 2011 Free Software Foundation, Inc.
				
				
					License GPLv3+: GNU GPL version 3 or later
					
					
						This is free software: you are free to change and redistribute it.
					
					
						There is NO WARRANTY, to the extent permitted by law. Type "show copying"
					
					
						and "show warranty" for details.
					
					
						This GDB was configured as "x86_64-redhat-linux-gnu".
					
					
						For bug reporting instructions, please see:
					
					
						
							...
						
						
							Reading symbols from /path/example...done.
						
						
							(gdb)
						
						
							run
						
						
							Starting program: /path/example
						
						
							Program received signal SIGSEGV, Segmentation fault.
						
						
							0x0000000000400527 in foo_len (s=0x0) at example.c:7
						
						
							7 return strlen (s);
						
						
							(gdb)
						
						
							print s
						
						
							$
						
						
							1
						
						
							=
						
						0x0
					

The problem is present in line 7, and occurs when calling the function strlen (because its argument, s , is NULL ). Depending on the implementation of strlen ( inline or not), the output can be different, e.g.:

			
			
				GNU gdb (GDB) 7.3.1
			
			
				Copyright (C) 2011 Free Software Foundation, Inc.
			
			
				License GPLv3+: GNU GPL version 3 or later
				
				
					This is free software: you are free to change and redistribute it.
				
				
					There is NO WARRANTY, to the extent permitted by law. Type "show copying"
				
				
					and "show warranty" for details.
				
				
					This GDB was configured as "i686-pc-linux-gnu".
				
				
					For bug reporting instructions, please see:
				
				
					
						...
					
					
						Reading symbols from /tmp/gdb/example...done.
					
					
						(gdb)
					
					
						run
					
					
						Starting program: /tmp/gdb/example
					
					
						Program received signal SIGSEGV, Segmentation fault.
					
					
						0xb7ee94f3 in strlen () from /lib/i686/cmov/libc.so.6
					
					
						(gdb)
					
					
						bt
					
					
						#
					
					
					0xb7ee94f3
					
						in
					
					strlen
					
						()
					
					from /lib/i686/cmov/libc.so.6
					
						#
					
					
						1
					
					0x08048435
					
						in
					
					foo_len
					
						(
					
					
						s
					
					
						=
					
					0x0
					
						)
					
					at example.c:7
					
						#
					
					
						2
					
					0x0804845a
					
						in
					
					main
					
						(
					
					
						argc
					
					
						=
					
					
						,
						
							argv
						
						
							=
						
						
							
								)
							
							at example.c:14
						

To fix the problem, the variable a (in the function main ) must contain a valid string. Here is a fixed version of the code:

					
					
						#include
					
					
					
						
						
						
							#include
						
						
						
							
							
							
								#include
							
							
							
								
								
								
									size_t
								
								
								
									foo_len
								
								
									(
								
								
								
									const
								
								
								
									char
								
								
								
									*
								
								
									s
								
								
								
									)
								
								
								
									{
								
								
								
								
									return
								
								
								
									strlen
								
								
									(
								
								
									s
								
								
									);
								
								
								
									}
								
								
								
									int
								
								
								
									main
								
								
									(
								
								
								
									int
								
								
								
									argc
								
								
									,
								
								
								
									char
								
								
								
									*
								
								
									argv
								
								
									[]
								
								
								
									)
								
								
								
									{
								
								
								
								
									const
								
								
								
									char
								
								
								
									*
								
								
									a
								
								
								
									=
								
								
								
									"This is a test string"
								
								
									;
								
								
								
								
									printf
								
								
									(
								
								
								
									"size of a = %lu
								
								
									\n
								
								
									"
								
								
									,
								
								
								
									foo_len
								
								
									(
								
								
									a
								
								
									)
								
								
								
									);
								
								
								
								
									exit
								
								
									(
								
								
								
								
								
									);
								
								
								
									}
								
								
							

Recompiling and running the executable again inside GDB now gives a correct result:

GDB prints the output of printf in the screen, and then informs the user that the program exited normally.

See also [ edit ]

References [ edit ]

  1. ^ "GDB 12.1 released!" ; author name string: Joel Brobecker; publication date: 1 May 2022; retrieved: 2 May 2022.
  2. ^ "GDB Documentation - Supported Languages" . Retrieved 2011-11-28 .
  3. ^ "GDB Documentation - Summary" . Retrieved 2011-11-28 .
  4. ^ a b "Richard Stallman lecture at the Royal Institute of Technology, Sweden (1986-10-30)" . Retrieved 2006-09-21 . Then after GNU Emacs was reasonably stable, which took all in all about a year and a half, I started getting back to other parts of the system. I developed a debugger which I called GDB which is a symbolic debugger for C code, which recently entered distribution. Now this debugger is to a large extent in the spirit of DBX, which is a debugger that comes with Berkeley Unix.
  5. ^ "John Gilmore (activist)" . hyperleap.com .
  6. ^ "GDB Steering Committee" . Retrieved 2008-05-11 .
  7. ^ "GDB Documentation - Summary - Contributors" . Retrieved 2011-12-01 .
  8. ^ "GDB 7.0 Release Notes" . Retrieved 2011-11-28 .
  9. ^ Joel Brobecker (2014-07-29). "GDB 7.8 released!" . Retrieved 2014-07-30 .
  10. ^ "Reverse Debugging with GDB" . Retrieved 2014-01-20 .
  11. ^ "Howto: GDB Remote Serial Protocol: Writing a RSP Server" (PDF) .
  12. ^ "Implementing a remote stub" .
  13. ^ "Kernel debugging with Dcons" .

External links [ edit ]

Documentation [ edit ]

Tutorials [ edit ]