This is an old revision of the document!
Google defines a debugger as:
There is an important concept we must acknowledge here- a debugger is a program, just like the programs we've been writing.
But as a program, it works with other programs. It is a program for programs. See the depth there?
GDB, the GNU Debugger, is certainly not the only debugger in existence, but it is most likely among the most available general purpose debuggers we can get our hands on.
Learning one debugger, like GDB, well will introduce you to many important concepts that all debuggers share (some just may enable certain actions better than others, or be more specialized for certain tasks– but they all, as debuggers, share a common underlying functionality).
The prime value we are looking to get out of our debugger use is to aid us in finding (and therefore fixing) runtime and logical errors in programs we write. It is also a phenomenal investigative tool, allowing us to see what a particular piece of code is ACTUALLY doing, as far down as the assembly instructions, but in our case the line-by-line execution of our programs in C.
Common fundamental features a debugger may provide:
There are many, many more features, but we're just getting started, and these are by far the most useful for us in our endeavors.
To take full advantage of the debugging environment, we must instruct the compiler at compile time to include debug-specific information.
We can do this by adding a -g to the compiler's argument list. It can go anywhere on the command-line, provided where it is placed doesn't violate any syntax rules of the other arguments.
$ gcc -g -o hello hello.c
A debugger acts as a sort of wrapper when running a program. It runs the desired program within it, so that we can use the debugger's features to better study what is going on.
As such, we need to start a debugging session as follows:
$ gdb ./hello
Note we run the program as usual, but we take care to prefix it with “gdb” (so gdb knows what program to run).
If your program is segfaulting, a quick and easy way to use the debugger is to let it run as normal, and when the program crashes it will provide you with information on where the problem took place. In some cases, this can be enough to identify and fix problems (more involved use of the debugger requires you to know increasingly more specifically where the problem is taking place, so starting off with strategies like this will only help you in further debugging efforts).
Let's take a program that will segfault on execution:
#include <stdio.h> struct thing { int val; struct thing *other; }; int main() { struct thing *stuff; char c, *s, hi = 0, len = 0; while ((c = fgetc(stdin)) != '\n') { *(s+len) = c; fprintf(stdout, "just read: '%c' (%hhd)\n", *(s+len), *(s+len)); len = len + 1; if (c > hi) hi = c; } fprintf(stdout, "%s\n", s); stuff -> val = hi; fprintf(stdout, "Highest value encountered was: '%c' (%hhd)\n", stuff -> val, stuff -> val); return(0); }
Type this in and name it (I'll use input.c as my example name).
Compile it with debugging support:
$ gcc -g -o input input.c $
The debugger is only useful with code free of syntax errors (because it requires the code to successfully compile to work). If your code does not compile, you cannot use the debugger to help fix the problem.
Now, let us start gdb with input as our debug target:
$ gdb ./input
A smallish banner message will appear, and at the very bottom will be a “(gdb)” prompt. This is where you'll be entering various commands.
For starters, let us just run the program and see what happens. We do this by issuing the “run” command at the gdb prompt:
(gdb) run
It'll appear to pause; that's because it is expecting input… so type in something (hello) and hit ENTER to allow it to proceed, you should then see something resembling the following:
(gdb) run Starting program: /home/user/input hello just read: 'h' (104) just read: 'e' (101) just read: 'l' (108) just read: 'l' (108) just read: 'o' (111) hello Program received signal SIGSEGV, Segmentation fault. 0x0000000000400682 in main () at input.c:23 23 stuff -> val = hi; (gdb)
Aha! A segfault! And look at what the debugger just told us… the EXACT line that, when processed, results in a segfault:
0x0000000000400682 in main () at input.c:23 23 stuff -> val = hi;
In fact, there are 3 important pieces of information that are immediately useful to us:
Now, we also know that the code compiled cleanly– no warnings or errors. So there are no syntax errors.
So what could the problem be?
For that, more debugging steps are in order.
First, if there were multiple function calls at work, it might help to know the function call order that took place (how did we get here– the problem may not be here, but in something that came before). It is a good idea to perform a function call backtrace, showing where we are back to where we started (we always start at main()).. so if there do not appear to be any problems here, we can come up with strategies for testing prerequisite functions.
To do a backtrace, simply type bt at the “(gdb)” prompt. In our case here, there's only one function, so it'll only report 1 thing (main):
(gdb) bt #0 0x0000000000400682 in main () at input.c:23 (gdb)
Now that we know our problem is on line 23 of main(), and if just knowing that didn't lead to identifying and fixing the problem (you did go back and take a look, right? The debugger assists you in solving problems, it does not solve problems for you), we'll have to dig a little deeper.
The next approach we should take is setting a break point. A breakpoint is essentially a cue given to the debugger to STOP execution once it reaches a given line. It is important to realize that the line in question HAS NOT yet been run, but is ABOUT to be run.
So, we know the problem is on line 23, so let us set a breakpoint there:
(gdb) break 23 Breakpoint 1 at 0x40067a: file input.c, line 23. (gdb)
Now, let us start execution once again:
(gdb) run The program being debugged has been started already. Start it from the beginning? (y or n) y Starting program: /home/username/input hello just read: 'h' (104) just read: 'e' (101) just read: 'l' (108) just read: 'l' (108) just read: 'o' (111) hello Breakpoint 1, main () at input.c:23 23 stuff -> val = hi; (gdb)
Okay… we've done it… re-run the program, and this time stopped just short of where the segfault seems to be taking place.