gdb reverse debugging fails with “Process record does not support instruction 0xf0d at address”

前端 未结 3 1440
失恋的感觉
失恋的感觉 2020-12-20 15:12

i started to try reverse debugging with gdb 7, followin the tutorial:

http://www.sourceware.org/gdb/wiki/ProcessRecord/Tutorial

and I thoug

相关标签:
3条回答
  • 2020-12-20 15:40

    Sounds like precord is still buggy.

    Please make sure you are using the latest released GDB 7.1, and file a bug. Output from x/i 0x2aaaab4c4b4e will likely be helpful. So will be exact distribution and versions of GCC and libc.so.6

    0 讨论(0)
  • 2020-12-20 15:55

    AVX is not supported as of GDB 7.11.1

    Maybe this is the same problem as mentioned at:

    • gdb reverse debugging avx2
    • https://sourceware.org/ml/gdb/2016-08/msg00028.html

    since your trace mentions memcpy, which uses AVX instructions in Ubuntu 16.04, but it is hard to be sure without a minimal example.

    rr is an awesome working alternative: https://github.com/mozilla/rr Here is a minimal working example: Setting breakpoint in GDB where the function returns

    0 讨论(0)
  • 2020-12-20 15:59

    This is because this insn is still not support by prec.

    It is fixed now. You can try the gdb-cvs-head.

    0 讨论(0)
提交回复
热议问题