For anyone who doesn’t know, in the older references, core meant memory, so when the core is dumped is actually writing the current state of memory into a file
If I remember correctly, the term goes back to the 1950's when they used magnetic iron cores for memory. I'm sure I read it in a 'history of Unix' book of some sort.
@@PeterJepson123 read the same thing in "Unix - a History and a memoir" by Brian Kernighan. Recommend it to anyone interested in Computer and Software history
Print debugging still is the most universal way of debugging. You can do it local, you can do it remote you can do it in embedded, you can do it in a high volume processing code that would be just time consuming to step through (or when you don't know exactly where the problem is and can't put conditional breakpoints). Core files can only help with memory problems (when your code crashes), but won't help when it doesn't crash, but just produces wrong resutls.
Prints are great at looking at long sequences of events too, which in a debugger can be quite difficult to setup several break-points and then have to poke around the entire local variable state at every break. Prints get straight to the point.
@@TheGameMakeGuy Not just logfiles, quite often there's also options to place the software or a component into debug mode and have even more verbouse print debug outputs. In addition to also being able to generate a memory dump, a configuration dump and whatnot. Personally I think debugging should be proportional to the issue or risk at hand. I wouldn't read a core dump to find a misplaced closing bracket, but if a prod sever is crashing mysteriously when it's running on client hardware alongside other applications which naturally have not been perfectly tested for compatibility from development but aren't expected to cause issues then obviously a core dump becomes a highly appropriate troubleshooting option.
@@SerBallisterIt does matter how you use them, though. You (the programmer) have to actually understand what the code should be doing so you can add only necessary print statements that let you follow the process and see where it went wrong.
Debugging complex systems with time dependent interactions (user input, network connections, video game AI, user interfaces etc) are pretty much impossible with a debugger. The biggest problem here is that the debugger is extremely invasive in terms of time. You hit a break point and it literally freezes your entire application. This is a bit of an issue if you have code that interacts with real time things, which lets face it, is most of the difficult work in software engineering. I do use debuggers where I can and where it's the best tool for the matter at hand. But I am here objecting to the click-bait. Yes, please carry on using logging for debugging, as most debugging of complex systems really requires it.
or you could actually watch the video and realize that it's about post-mortem debugging of core dumps and not time invasive interactive debugging with breakpoints.
@sverkeren Or you could realize that debugging tools or core dumps aren't the Swiss army knives of debugging and that a simple print statement may be the best option at the moment. Also, this video is advice for programming in C and may not be applicable to any programming language. Still fitting to call it clickbait
@@everydaynova663 really, both techniques should be in your toolbelt. cores can tell you things that print statements can not, and print statements can tell you things dumps can not. dumps tell you where you are, prints tell you how you got there.
Core files and debuggers are indeed very useful. But honestly... the occasional debugging printf() is perfectly fine too. I've caught a lot of bugs that way without having to fire up a debugger.
Depending on the situation printf or equivalent might be only way without changing changing threading/timing. Running a full debugger isn't a light weight process.
Don't do "typedef unsigned int uint32_t". The size of an int is compiler dependant (although it usually is 32 bits). Include stdint.h if you *need* exact size integer types.
After writing software for 40 years in many languages, from the highest to lowest levels, including patches to some of the software used in this video, here's what I've learned about debugging: 1. The best debugging technique is to just read the code. If the code is too complex to trace in your head, it probably needs to be rewritten anyway. 2. After that, nothing beats print style debugging. It's easy, simple, and works in almost any context. 3. Debuggers and profilers are nice luxuries to have sometimes, but are frequently not feasible.
6:04 I think I noticed a small error in the if statement the last index of an array is always the size of the array minus one because arrays starts at 0 (except in LUA). So the maximum index of the array is 99, and not 100. if you select a box with 100 as ID, your program will segfault because index 100 is out of bounds. To fix that, you have to either replace the ">" sign to ">=" sign, or you can do if (i > 99) { ... }.
Typical “off-by-one” error. Program perhaps won't segfault: static g_Boxes takes 6800 bytes, hence it'll span two 4 KiB pages with 1392 writable bytes left after it (speaking x86'ish).
For those unfamiliar with C: "@System64 MC" is correct - and the index should be checked against 99 or less. The index variable "i", declared as an "unsigned int" will not go below zero, so you don't have to worry about that. I could not see what the read_int() function does if the user inputs a negative number.
minor correction: "ulimit -c unlimited" means allow a core file be created with unlimited size, not "the kernel is allowed to produce an unlimited amount of core files"
This man is the perfect programming RUclipsr for me. I’ve noticed lately at my uni in my courses that all the other students complain at an assignment/task that needs to be done in C (we’re in Operating Systems and we just wrote the first part of a shell where we had to create and implement the cd, pwd, and exit commands, now we’re going to exec the other commands as well as their arguments, and the whole class whined out loud when they were told that was the next assignment due next week. He also teased at the possibility of making us write our own memory allocator, which got even more audible rejection from the other students). However, I get excited at the thought of it. I love writing in C, I love the challenges it brings. My professor even pointed it out to me when I went to see him during his office hour to discuss getting an internship, how to go about it, what to prepare for, etc. that I seemed to really enjoy working at a low level close to the hardware. So, as a guy who seemingly loves writing low-level code, finding a programming RUclipsr whose channel name is literally “Low Level Learning” is the best thing that I’ve found on RUclips this year so far.
It's a whole lot harder to use the core file when a released product crashes (no debug symbols). It is also much harder to use core files to track down crashes in multi-threaded programs, and impossible if the problem is caused by a deadlock elsewhere in the code.
Compiling with symbols only adds to the binary's size, but doesn't actually affect execution speed, as the runtime linker knows not to bind the debugging information into the process image, which is to say: binaries should always be built with debugging symbols embedded in them, they don't hurt runtime performance in any way, and the few milliseconds of loading time can very well save much misery later.
@@anujmchitale it is ALWAYS an option; you could compile with debugging information, then use (g)objdump to extract that information into a separate file, which you could then use if you need to debug the binary. You should never compile without generating debug symbols.
@@AnnatarTheMaia A classic reply without knowing the slightest about the system that the person might be using. Debugging goes beyond the "binary" when talking about microcontrollers. It's the system as a whole that needs to be debugged, which includes hardware responses. This objdump approach doesn't work when doing realtime debugging on the microcontroller itself. If a kernel isn't running on it.
@@anujmchitale as someone who has learned to program by banging the hardware directly in the constrained system with only 64 KB of bank switched memory, on a microprocessor with only three eight bit registers, I thank you kindly for insulting me, and I want you to know that I took your response very personally.
It would also be helpful to demonstrate how to write test cases and how best to separate into multiple modules. Also, you should check the number only once when read in from the user as well as stop using magic numbers. Might also want to demonstrate using `gdb` even if your program isn't crashing.
For Linux C++ users, I really recommend compiling your project (-g -O0) against the backward-cpp library. You will have a nicely printed stack trace from your segfault. It is probably sufficient to understand where the bug comes from, else yes, use gdb and the core dump.
cross platform stack traces were meant to be in C++20, but alas, the committee moves too slow. There is source_location, which you can use for debugging. source_location also doubles as a scrappy way to achieve compile-time reflection! You can extract class member's names as strings by abusing auto and source_location.
@@DefaultBoyBand -Og enables function inlining, so not exactly the best thing for stack traces, you need to additionally specify -fno-inline alongside it
@@windowsos-exestoppedworkin5391 iam just starting,Iam interested in low level programming stuff... high level languages and frameworks... They hide a lot of details.
@@avg_user-dd2yb if you are interested then you should check out FPGAs, essentially reconfigurable hardware that you can use to make essentially any digital circuit like processors, the “game”, “Turing Complete” is good for this too, you start off making basic logic gates and latches and stuff and end up making a computer and programming it in assembly. If you are only interested in assembly then “Shenzhen IO” is good too. The most complete way to understand it at a very low level is to know how the processor itself works and be mostly able to build one.
When I switched from python and C# to C, one of the problems I had was that there's no stack traces when something goes wrong. But this is actually even more useful than a stack trace. Amazing
The gdb gives you the stack traces. You could type backtrace or just bt from the core. You can also type where at a breakpoint. In our products we caught signals, then processed the exception - servers are NOT allowed to crash. There again in C++ there are lots of ways to better handle exceptions than in C.
@@stephenhookings1985 Yeah, I meant stack traces that print out automatically when there's an exception. I figured you can get that from gdb, but you have to know it's there.
I believe there’s still a bug. You can enter 100 and it still crashes as the index is 0-99 😉I find it remarkable that you remember all the the commands. I always have to look em up. Then again I hardly debug, my code is usually error free 😅 I actually just wrote my first ever C program on the Amiga to just open a window and draw random computed pixels. And not being able to run the binary on my Mac (Aros HDF required UAE version 4 which is not released on Mac yet). So I upload my cross compiled binary and awaited the first crash… but it worked, first time! Usually that’s a no go. Especially with a whole new windowing environment.
@@akaikangaroo Can you name ONE 😝🤪 And obviously I don’t agree because 0 makes sense because also memory starts at 0000 making it ONE is a silly western construct. Because we a westerners were too stupid to not define zero, unlike the Indian Al-Khowarizini did. For ever gatefuk to him, now programming zero index makes complete sense 😁
When I saw that "i > 100" code, I immediately thought it was wrong and came to write a comment, but of course someone has already pointed it out. It should have been "i >= 100".
You code on the Amiga, that's why your programs are usually error free, because the Amiga shapes and reinforces correct programming. That explains a lot. Someone who has never programmed on the Amiga has no chance in hell of ever understanding why that is so. Good on you!
Scanf with the right precautions works fine. Sure fscanf or whatever it was is technically better security wise, but is slower and lacks features. Just make sure to specify how much scanf is supposed to take in.
That's correct. It was completely unnecessary for this example and probably is almost never necessary as the compiler usually knows pretty well what it does with how it uses the registers. If you ever happen to go that deep you most likely want to turn around and check your bug on a higher level.
Agreed. While useful for specific problems, it’s a very security researcher mindset which is not useful for the debugging needs for the vast amount of software devs out there, especially on nontrivial projects unlike this toy example.
Good video , i just saw a video from Dave Plummer (ex Microsoft software engineer) and i learned to use the f_s functions all the other F functions are not safe, can bus buffer overflow , the new way so use prtinf_s, the video of Dave is called Stupid C tricks , i saw it and he's right , has to do witn functions not taken in account buffer lengts, and not checking them , not adding null remintator and so on, there are new functions and they have in common that they are named as the original functions but added with _s , these are safe functions can not induce a buffer overflow, good explanation also from Dave.
Not always debugging used to fix crashes and sometimes gdb can't show proper backtraces due to absence of debug symbols or code version of the build. Also real-time tight programs will not let to stop themselves so prints is the only choice in many situations.
Another way to avoid the print statements that get confusing is to use asserts. Forcibly fail when the conditions you're desiring aren't met, or the conditions you're seeing are. It's printf debugging but only one message prints, and it means it's much more comprehensible when something does go wrong. It doesn't always substitute a debugger, but they're good practice anyway, so it's a good idea to use them regardless of if you're debugging or not
For Windows fellows, the equivelant is a .dmp file that is either next to the program or some crashes folder, and Visual Studio would be used to open it
Or you can gcc -fsanitize=address to see where the segmentation dump core occurred, we use this method alot to understand where the pointer has failed. If not this, valgrind is the second choice of command to understand memory leaks.
Holy shit, this is so useful! I cannot tell you the number of hours I’ve spent tracking down sigsegvs! I didn’t even know the (core dumped) meant anything 😂
For this simple example, printing i would have found the bug sooner. However, I do see that this can be useful for truly complex bugs, but not necessarily better than print statements.
Something that print debugging allows, but no traditional debugger (to my knowledge) supports, is seeing how certain values in your program evolve over time, like in any kind of loop. Seeing the change over time allows me to figure out a potential pattern, and from there derive the issue way faster than most other traditional debugging techniques. This becomes even more valuable in a language like Rust which has really rich formatting support and prevents most types of crashes from the get go, so the majority of bugs I need to fix are logic bugs, where finding patterns is often pretty fast.
"...is seeing how certain values in your program evolve over time, like in any kind of loop." DTrace is what you want. You can trace the program live while it is running, with no sideeffects on your program. You can even build your own DTrace probe points into your program, and they won't even affect performance, because they won't trigger unless DTrace is used... And if you're on Windows, Microsoft has just added support for DTrace...
Cool trick - I think I used this once a long time ago. Typically I just hit run on my IDE and it stops the debugger automatically on the line where the crash happens. Takes about 5 seconds to fix a bug like this.
This is a great video thanks. I generally use ifdef debug printf() style to isolate an offending function and create a new entry point and test that function to destruction. The only debugging tool I've been using is valgrind --leak-check=full. This is great. Cheers mate.
@@LowLevelTV I actually learned a lot about low level programming in this channel (your videos give me the necessary motivation to research a lot more)
Well, "the box" was obviously a reference to the movie 7, and the "Dave" was a reference to the "2001: a space odyssey". Is there something like that for php as well, or do the test units have to do everything?
@@Brad_Script Actually it's a term for a specific type of memory that was in use at some time in the distant past, magnetic-core memory, usually shortened to core memory, where data was stored on magnetic rings.
If your program takes some input and provides some output, you can then feed it input and when it crashes, you can check the core file, instead of running each instance inside of gdb.
I'm confused at what looking at the registers gave us - you opened it and said what we were trying to do but didn't say anything about why that was bad or how we could use that information. Seems you could have just looked at the program .c file and gotten the information without looking at the assembly
Wow, this was a really well presented video. I never used this feature before, because I thought stuff like that would be overkill in most scenarios. But the way you showcased it made it seem pretty handy, while note being as complicated as I imagined. I will definitely try this out next time I code something.
3:07 I was going to do what you did there to core_pattern but I found that apport already had a pattern in there. I'm concerned that if I did what you did, then I'd be messing with apport and that sound improper. Is there way to get the core dump for your programs where you can find it while leaving system error handling unaltered?
I've been patiently waiting till I finally stumbled across someone who explains these concepts as well as you. Thank you so much sir! I am so excited to learn with you :)
Best tool for me yet: Dtrace. Once ported a large library from Linux and could remove 30% of all lines (trace/debug code). Replaced it with some Dtrace scripts, to have equivalent functionality, no need to recompile with instrumentation.
There's still a bug in this program. You're checking for a box index > 100, when the array of boxes ranges from 0 to 99, so if you try to print box 100, it'll segfault...
Yes, 100 will index outside the array. But it will most probably not segfault the program but instead corrupt some innocent variable that happens to sit next to the array in memory.
Extra tip, if you have compiled with -g you should have debug symbols too and you can see the crashed code in gdb with "list". But why live like this? This is the 21st century and if you have a repro case like that you can debug it directly in VS code, and see all variables right there. Core files are nice when either the repro is difficult or you are debugging someone else's crash. The assembly part of the video was a bit unnecessary imo. You won't be able to figure out the array size easily by looking at the registers.
Yeah, this is my primary complaint about programming in Linux/GCC: everything is just harder then MSVC. Heck, when you *have* to support Linux nowadays, I just code in MSVC on Windows and use CLANG to do the compilation on Windows, then once that works just use CLANG on Linux to generate the executable. I can't imagine having to actually DEVELOP on Linux using either GCC or CLANG.
This is great if you’re writing for a PC environment. Can’t use core files on embedded, a debugger and a robust logging system is the best to debug quickly. Also 99.99% opening up the assembly to see what’s going on is just to take more time than looking at the source
I've used vscode extensions for debugging and when i run with debugging it crashes and automatically goes to the line number and i can inspect call stack, parameters, variables etc.
Ive spent 30 years working in software development and never had an issue with print debugging. In fact its got me out of many holes. And sometimes its the only option if running the code on the server is the only option and you aren't able to run a debugger or similar on the server.
Very helpful video. I think the core dump is for the linux machine you are running. Can we do the same for target microcontrollers. If yes, can you tell how to do it? Beginner here.
GDB has a remote debugging function that you can debug any application over network on your computer (provided that you have built a cross toolchain for the architecture).
It depends on your microcontroller as well as which operating system, if any, you are running on it. GDB is pretty printing what the hardware is complaining about. Not a trivial answer to your question.
The funniest experience of learning c is starting using print statements for debugging. Learning about debuggers and perror. End up programming drivers going back to using printk to print statements in order to debug :p
i had a rendering program and i wanted to debug one part of a function which is called thrice for every pixel, i was confused why printf was making sdl not render the frames even though the printf was working, took me over an hour to realise i wrote code that was so slow i didnt even notice it was running
It may not be handy for this example in particular as this this this example is a common issue most people can fix, but knowing how to see the state of the registers is nice when things get complex and you want to pinpoint maybe one portion of a line, which asm can do. Also the register names were on the side of the table outputted
Completely unnecessary actually. I'm not sure what exactly you mean with the first question but if you mean what the content of the registers was that's what's printed in the table. If you ever want to go the route of debugging registers, gdb has some handy tools for printing formatted values.
I usually add a couple of debugging options to programs, even shell scripts, which enable either some basic logging or that plus an overkill data dump. That way I can trace behavior without code changes. A "debugger" isn't always viable for whatever reason.
Love ur content. Is there any reason you typedef unsigned int uint32_t instead of using uint32_t from stdint.h?...i mean i guess one reason could be less overhead if you're not using the other ints from that library, but also you dont know if int is going to be 32 bits on all systems....
For anyone who doesn’t know, in the older references, core meant memory, so when the core is dumped is actually writing the current state of memory into a file
👍
If I remember correctly, the term goes back to the 1950's when they used magnetic iron cores for memory. I'm sure I read it in a 'history of Unix' book of some sort.
@@PeterJepson123 read the same thing in "Unix - a History and a memoir" by Brian Kernighan. Recommend it to anyone interested in Computer and Software history
That is true! Lovely book all around. Kernighan is such an amazing person!
@@PeterJepson123 My mom worked on those back in her college days.
Print debugging still is the most universal way of debugging. You can do it local, you can do it remote you can do it in embedded, you can do it in a high volume processing code that would be just time consuming to step through (or when you don't know exactly where the problem is and can't put conditional breakpoints). Core files can only help with memory problems (when your code crashes), but won't help when it doesn't crash, but just produces wrong resutls.
Prints are great at looking at long sequences of events too, which in a debugger can be quite difficult to setup several break-points and then have to poke around the entire local variable state at every break. Prints get straight to the point.
@@TheGameMakeGuy Not just logfiles, quite often there's also options to place the software or a component into debug mode and have even more verbouse print debug outputs. In addition to also being able to generate a memory dump, a configuration dump and whatnot. Personally I think debugging should be proportional to the issue or risk at hand. I wouldn't read a core dump to find a misplaced closing bracket, but if a prod sever is crashing mysteriously when it's running on client hardware alongside other applications which naturally have not been perfectly tested for compatibility from development but aren't expected to cause issues then obviously a core dump becomes a highly appropriate troubleshooting option.
You can also use /assertions/ if the language has that feature.
@@SerBallisterIt does matter how you use them, though.
You (the programmer) have to actually understand what the code should be doing so you can add only necessary print statements that let you follow the process and see where it went wrong.
Yeah this core debugging is useful but doesn’t replace other forms of debugging.
6:13 Fun fact, this is a mistake. As this array's length is 100, its maximum value is 99, so entering 100 will cause a crash anyway.
I would have used >= 100
@@JosefdeJoanelli Yes, but he didn't do it.
@@glowiak3430I know
Nice! I came to comments to see if anyone else caught this off-by-1 error
I assume it was intentional to drive engagement, but yet here I am.
Debugging complex systems with time dependent interactions (user input, network connections, video game AI, user interfaces etc) are pretty much impossible with a debugger. The biggest problem here is that the debugger is extremely invasive in terms of time. You hit a break point and it literally freezes your entire application. This is a bit of an issue if you have code that interacts with real time things, which lets face it, is most of the difficult work in software engineering.
I do use debuggers where I can and where it's the best tool for the matter at hand. But I am here objecting to the click-bait. Yes, please carry on using logging for debugging, as most debugging of complex systems really requires it.
or you could actually watch the video and realize that it's about post-mortem debugging of core dumps and not time invasive interactive debugging with breakpoints.
@sverkeren Or you could realize that debugging tools or core dumps aren't the Swiss army knives of debugging and that a simple print statement may be the best option at the moment. Also, this video is advice for programming in C and may not be applicable to any programming language. Still fitting to call it clickbait
@@everydaynova663 really, both techniques should be in your toolbelt. cores can tell you things that print statements can not, and print statements can tell you things dumps can not. dumps tell you where you are, prints tell you how you got there.
Absolutely right !
@@sverkeren ah, but I did not watch the video because I do not like clickbait. See...
Core files and debuggers are indeed very useful. But honestly... the occasional debugging printf() is perfectly fine too. I've caught a lot of bugs that way without having to fire up a debugger.
Depending on the situation printf or equivalent might be only way without changing changing threading/timing. Running a full debugger isn't a light weight process.
Sometimes, you just can't use gdb, like when trying to debug bare metal Raspberry Pi code, so you have to do print debugging over UART.
Or LED blinking :) while the best gdb for bare metal is the oscilloscope :D Instead of printf I know preferring the dbg-macro library for C++
@@pikachuchujelly4119 I'm using gdb to debug stm32, don't know what are you talking about
@@pikachuchujelly4119 That might be the easiest option, but it's most assuredly not the only way. You could probably use the GPIO and LEDs too.
Don't do "typedef unsigned int uint32_t". The size of an int is compiler dependant (although it usually is 32 bits). Include stdint.h if you *need* exact size integer types.
Yeah, stdint.h has been around for _how_ long now? Even VS 6 had some homebrew versions made for it at some point.
or just program in Rust
@@dmitryhetman1509 ikr, Go ftw
@@biigsmokee if you've moved to Rust because of fixed width integer types you're probably not staying.
plus it makes your program more portable technically
After writing software for 40 years in many languages, from the highest to lowest levels, including patches to some of the software used in this video, here's what I've learned about debugging:
1. The best debugging technique is to just read the code. If the code is too complex to trace in your head, it probably needs to be rewritten anyway.
2. After that, nothing beats print style debugging. It's easy, simple, and works in almost any context.
3. Debuggers and profilers are nice luxuries to have sometimes, but are frequently not feasible.
So you're saying a nice pretty-printer is more important than a nice debugger? 👀
This is very basic debugging for crashes but the video title sounded like more. Print statements to deal with non fatal errors are still quite useful.
100% agree. This is probably the first comment I've seen from you where you don't sound angry lol
@@vastabyss6496 I'm not angry generally. Just the way things come across via text on the web probably makes it seem that way.
6:04 I think I noticed a small error in the if statement
the last index of an array is always the size of the array minus one because arrays starts at 0 (except in LUA). So the maximum index of the array is 99, and not 100. if you select a box with 100 as ID, your program will segfault because index 100 is out of bounds. To fix that, you have to either replace the ">" sign to ">=" sign, or you can do if (i > 99) { ... }.
Typical “off-by-one” error. Program perhaps won't segfault: static g_Boxes takes 6800 bytes, hence it'll span two 4 KiB pages with 1392 writable bytes left after it (speaking x86'ish).
@@-wx-78- Yeah, but it might overwrite unrelated memory.
@@chlorobyte_projects Definitely.
Indexes in LUA start at 1? Absolute madness.
For those unfamiliar with C: "@System64 MC" is correct - and the index should be checked against 99 or less. The index variable "i", declared as an "unsigned int" will not go below zero, so you don't have to worry about that. I could not see what the read_int() function does if the user inputs a negative number.
minor correction: "ulimit -c unlimited" means allow a core file be created with unlimited size, not "the kernel is allowed to produce an unlimited amount of core files"
This man is the perfect programming RUclipsr for me. I’ve noticed lately at my uni in my courses that all the other students complain at an assignment/task that needs to be done in C (we’re in Operating Systems and we just wrote the first part of a shell where we had to create and implement the cd, pwd, and exit commands, now we’re going to exec the other commands as well as their arguments, and the whole class whined out loud when they were told that was the next assignment due next week. He also teased at the possibility of making us write our own memory allocator, which got even more audible rejection from the other students). However, I get excited at the thought of it. I love writing in C, I love the challenges it brings. My professor even pointed it out to me when I went to see him during his office hour to discuss getting an internship, how to go about it, what to prepare for, etc. that I seemed to really enjoy working at a low level close to the hardware. So, as a guy who seemingly loves writing low-level code, finding a programming RUclipsr whose channel name is literally “Low Level Learning” is the best thing that I’ve found on RUclips this year so far.
0:12 no, this has never been me, because, I have (honestly) never been in a situation where I couldn’t find the problem using print statements
It's a whole lot harder to use the core file when a released product crashes (no debug symbols). It is also much harder to use core files to track down crashes in multi-threaded programs, and impossible if the problem is caused by a deadlock elsewhere in the code.
And absolutely not an option for me, programming for microcontrollers. 😂
Compiling with symbols only adds to the binary's size, but doesn't actually affect execution speed, as the runtime linker knows not to bind the debugging information into the process image, which is to say: binaries should always be built with debugging symbols embedded in them, they don't hurt runtime performance in any way, and the few milliseconds of loading time can very well save much misery later.
@@anujmchitale it is ALWAYS an option; you could compile with debugging information, then use (g)objdump to extract that information into a separate file, which you could then use if you need to debug the binary. You should never compile without generating debug symbols.
@@AnnatarTheMaia A classic reply without knowing the slightest about the system that the person might be using.
Debugging goes beyond the "binary" when talking about microcontrollers.
It's the system as a whole that needs to be debugged, which includes hardware responses.
This objdump approach doesn't work when doing realtime debugging on the microcontroller itself. If a kernel isn't running on it.
@@anujmchitale as someone who has learned to program by banging the hardware directly in the constrained system with only 64 KB of bank switched memory, on a microprocessor with only three eight bit registers, I thank you kindly for insulting me, and I want you to know that I took your response very personally.
It would also be helpful to demonstrate how to write test cases and how best to separate into multiple modules. Also, you should check the number only once when read in from the user as well as stop using magic numbers. Might also want to demonstrate using `gdb` even if your program isn't crashing.
Already using gdb on low level stuff, it’s ironic… thanks a lot man I’m really blessed by ur channel.
For Linux C++ users, I really recommend compiling your project (-g -O0) against the backward-cpp library. You will have a nicely printed stack trace from your segfault. It is probably sufficient to understand where the bug comes from, else yes, use gdb and the core dump.
cross platform stack traces were meant to be in C++20, but alas, the committee moves too slow. There is source_location, which you can use for debugging. source_location also doubles as a scrappy way to achieve compile-time reflection! You can extract class member's names as strings by abusing auto and source_location.
use -fsanitize=address
-Og is better for debugging (just a tip)
@@DefaultBoyBand -Og enables function inlining, so not exactly the best thing for stack traces, you need to additionally specify -fno-inline alongside it
@@atijohn8135 huh... didn't know that! thanks
I like how you said we can look at the assembly instructions to debug this and resigned from doing so as soon as you saw them
This is super helpful for beginners as well! Thanks a lot!!
You're so welcome!
@@LowLevelTV can you make a tutorial on making basic interpreter and compilers using c,would be really helpful.
I absolutely agree, I keep trying to write a compiler in C but I suck so I eventually give up and then I start over and the cycle repeats
@@windowsos-exestoppedworkin5391 iam just starting,Iam interested in low level programming stuff... high level languages and frameworks... They hide a lot of details.
@@avg_user-dd2yb if you are interested then you should check out FPGAs, essentially reconfigurable hardware that you can use to make essentially any digital circuit like processors, the “game”, “Turing Complete” is good for this too, you start off making basic logic gates and latches and stuff and end up making a computer and programming it in assembly. If you are only interested in assembly then “Shenzhen IO” is good too.
The most complete way to understand it at a very low level is to know how the processor itself works and be mostly able to build one.
Won't your program still crash for i = 100?
it will but it's just a small oversight on his part, it's not critical to the topic at hand
When I switched from python and C# to C, one of the problems I had was that there's no stack traces when something goes wrong. But this is actually even more useful than a stack trace. Amazing
The gdb gives you the stack traces. You could type backtrace or just bt from the core.
You can also type where at a breakpoint.
In our products we caught signals, then processed the exception - servers are NOT allowed to crash. There again in C++ there are lots of ways to better handle exceptions than in C.
@@stephenhookings1985 Yeah, I meant stack traces that print out automatically when there's an exception. I figured you can get that from gdb, but you have to know it's there.
@@ishashkaor, you know how to find it. Manuals are amazing.
I believe there’s still a bug. You can enter 100 and it still crashes as the index is 0-99 😉I find it remarkable that you remember all the the commands. I always have to look em up. Then again I hardly debug, my code is usually error free 😅
I actually just wrote my first ever C program on the Amiga to just open a window and draw random computed pixels. And not being able to run the binary on my Mac (Aros HDF required UAE version 4 which is not released on Mac yet). So I upload my cross compiled binary and awaited the first crash… but it worked, first time! Usually that’s a no go. Especially with a whole new windowing environment.
That's why one-indexed languages rule🙂
@@akaikangaroo Can you name ONE 😝🤪 And obviously I don’t agree because 0 makes sense because also memory starts at 0000 making it ONE is a silly western construct. Because we a westerners were too stupid to not define zero, unlike the Indian Al-Khowarizini did. For ever gatefuk to him, now programming zero index makes complete sense 😁
@@CallousCoder Lua, Julia and 18 more😜
When I saw that "i > 100" code, I immediately thought it was wrong and came to write a comment, but of course someone has already pointed it out. It should have been "i >= 100".
You code on the Amiga, that's why your programs are usually error free, because the Amiga shapes and reinforces correct programming. That explains a lot. Someone who has never programmed on the Amiga has no chance in hell of ever understanding why that is so. Good on you!
Woah this is cool! I wish I'd known about this when I still wrote in C back in uni. Great video!
Thank you!
Also, don't use scanf. Use the secure variants, and try to reject input as soon as it is parsed, not later on as per his example.
Scanf with the right precautions works fine. Sure fscanf or whatever it was is technically better security wise, but is slower and lacks features. Just make sure to specify how much scanf is supposed to take in.
What are the secure variants?
You should at least fix it properly with >= 100… instead of > 100
Wanted to write the same thing
But the index starts at zero, 100 will overflow
5:22 it's move [rdx + rax] *into* eax, not the other way around
if i knew this in my first year where i've learned trees and graphs in C imagine all the seg faults
thank you for this!
What is the point of looking at the assembly instructions and register states? To me, it looked like you gained nothing from looking at them.
That's correct. It was completely unnecessary for this example and probably is almost never necessary as the compiler usually knows pretty well what it does with how it uses the registers. If you ever happen to go that deep you most likely want to turn around and check your bug on a higher level.
Agreed. While useful for specific problems, it’s a very security researcher mindset which is not useful for the debugging needs for the vast amount of software devs out there, especially on nontrivial projects unlike this toy example.
Good video , i just saw a video from Dave Plummer (ex Microsoft software engineer) and i learned to use the f_s functions all the other F functions are not safe, can bus buffer overflow , the new way so use prtinf_s, the video of Dave is called Stupid C tricks , i saw it and he's right , has to do witn functions not taken in account buffer lengts, and not checking them , not adding null remintator and so on, there are new functions and they have in common that they are named as the original functions but added with _s , these are safe functions can not induce a buffer overflow, good explanation also from Dave.
RUclips programmers: COME OUT WITH YOUR PRINT STATEMENTS UP
Me: You'll never take my print statements, copper! NEVER!
5:18 in gdb is used AT&T assembly notation ; INSTRUCTION ORIGIN, DESTINATION ; and not in INTEL (more used) assembly notation (aka. INST DEST, ORIG)
Not always debugging used to fix crashes and sometimes gdb can't show proper backtraces due to absence of debug symbols or code version of the build. Also real-time tight programs will not let to stop themselves so prints is the only choice in many situations.
5:21, the mov instruction actually does the opposite of what you said, because it's in AT&T syntax.
Another way to avoid the print statements that get confusing is to use asserts. Forcibly fail when the conditions you're desiring aren't met, or the conditions you're seeing are. It's printf debugging but only one message prints, and it means it's much more comprehensible when something does go wrong. It doesn't always substitute a debugger, but they're good practice anyway, so it's a good idea to use them regardless of if you're debugging or not
2:01 yeah, hacking string with segment fault then u core dump and other things that i forgot
Great video Dave! Informative as always.
Thanks for watching
For Windows fellows, the equivelant is a .dmp file that is either next to the program or some crashes folder, and Visual Studio would be used to open it
What's the Windows' equivalent of the runtime linker, ld.so.1?
Or you can gcc -fsanitize=address to see where the segmentation dump core occurred, we use this method alot to understand where the pointer has failed. If not this, valgrind is the second choice of command to understand memory leaks.
Holy shit, this is so useful! I cannot tell you the number of hours I’ve spent tracking down sigsegvs! I didn’t even know the (core dumped) meant anything 😂
For this simple example, printing i would have found the bug sooner. However, I do see that this can be useful for truly complex bugs, but not necessarily better than print statements.
Something that print debugging allows, but no traditional debugger (to my knowledge) supports, is seeing how certain values in your program evolve over time, like in any kind of loop. Seeing the change over time allows me to figure out a potential pattern, and from there derive the issue way faster than most other traditional debugging techniques.
This becomes even more valuable in a language like Rust which has really rich formatting support and prevents most types of crashes from the get go, so the majority of bugs I need to fix are logic bugs, where finding patterns is often pretty fast.
You can have debuggers stop every time a value changes for a variable. I think that does exactly what you're talking about.
"...is seeing how certain values in your program evolve over time, like in any kind of loop." DTrace is what you want. You can trace the program live while it is running, with no sideeffects on your program. You can even build your own DTrace probe points into your program, and they won't even affect performance, because they won't trigger unless DTrace is used... And if you're on Windows, Microsoft has just added support for DTrace...
You also can use the flag -fsanitize=address -g flag for these seg fault , buffer overflow, etc...
Cool trick - I think I used this once a long time ago.
Typically I just hit run on my IDE and it stops the debugger automatically on the line where the crash happens. Takes about 5 seconds to fix a bug like this.
This is a great video thanks. I generally use ifdef debug printf() style to isolate an offending function and create a new entry point and test that function to destruction. The only debugging tool I've been using is valgrind --leak-check=full. This is great. Cheers mate.
Thanks for sharing!
Really nice ! This is why I want to learn assembly it's really helpful in all cases
Glad it was helpful!
What I'm trying to understand here is how the values in rax and rdx gave away the nature of the issue.
Half a semester of debugging seg faults, why did I not look this up earlier? THE PAIN!
Holy mother of valgrind, I was just struggling with debugging a program when you dropped this video...now my program works. Thanks :)
Glad it helped!
@@LowLevelTV I actually learned a lot about low level programming in this channel (your videos give me the necessary motivation to research a lot more)
Well, "the box" was obviously a reference to the movie 7, and the "Dave" was a reference to the "2001: a space odyssey".
Is there something like that for php as well, or do the test units have to do everything?
DTrace.
I never knew what "core dumped" meant, this makes so much more sense now! Thank you :)
core is archaic term for memory
@@Brad_Script Actually it's a term for a specific type of memory that was in use at some time in the distant past, magnetic-core memory, usually shortened to core memory, where data was stored on magnetic rings.
03:16 Security hint:
Always use "su -" when changing to root to avoid keeping a compromised environment.
Excellent tutorial. Although not a solution for every bug, it's still a great way to debug C memory-related issues.
What difference did the inclusion of the core file make? , it seems gdb-ing the program and the running it would produce the same result
If your program takes some input and provides some output, you can then feed it input and when it crashes, you can check the core file, instead of running each instance inside of gdb.
Still allowing index 100 and that's bad too :P
Ah, Seven reference.
ayyy this guy gets it
Took me a while to get it. Wow, thanks 😹😹😹
I'm confused at what looking at the registers gave us - you opened it and said what we were trying to do but didn't say anything about why that was bad or how we could use that information. Seems you could have just looked at the program .c file and gotten the information without looking at the assembly
Wow, this was a really well presented video. I never used this feature before, because I thought stuff like that would be overkill in most scenarios. But the way you showcased it made it seem pretty handy, while note being as complicated as I imagined. I will definitely try this out next time I code something.
Try gdb Save and reverse execution functionalities. It's pain to learn, but super usefull with the worst bugs.
Nice syntax, I really like when someone takes care of readability and looks at the same time!
Hint : use sudo -i instead of sudo su. Same experience except all commands you’ll use can be logged properly as a sudo use.
I wish I knew this 25 years ago. I had to dwbug the code differently. It would have greatly improved my debugging speed.
3:07 I was going to do what you did there to core_pattern but I found that apport already had a pattern in there. I'm concerned that if I did what you did, then I'd be messing with apport and that sound improper. Is there way to get the core dump for your programs where you can find it while leaving system error handling unaltered?
I've been patiently waiting till I finally stumbled across someone who explains these concepts as well as you. Thank you so much sir! I am so excited to learn with you :)
I use coredumpctl on Linux. I didn't know you can change the directory where core dumps are saved. Very interesting. Thanks 🙏
Thank you so much... it's really hard to find good content about gdb.
Happy to help!
Best tool for me yet: Dtrace.
Once ported a large library from Linux and could remove 30% of all lines (trace/debug code). Replaced it with some Dtrace scripts, to have equivalent functionality, no need to recompile with instrumentation.
recently i've been using assert alot more, and that's been much better than print statements for some usecases
An address sanitizer compile with -g would help lots as well
There's still a bug in this program. You're checking for a box index > 100, when the array of boxes ranges from 0 to 99, so if you try to print box 100, it'll segfault...
Yes, 100 will index outside the array. But it will most probably not segfault the program but instead corrupt some innocent variable that happens to sit next to the array in memory.
Which is even worse now as this could plant a random time bomb in your program you would have a very hard time finding
I didn't know you can actually configure core like that. This is pretty useful.
Extra tip, if you have compiled with -g you should have debug symbols too and you can see the crashed code in gdb with "list".
But why live like this? This is the 21st century and if you have a repro case like that you can debug it directly in VS code, and see all variables right there. Core files are nice when either the repro is difficult or you are debugging someone else's crash.
The assembly part of the video was a bit unnecessary imo. You won't be able to figure out the array size easily by looking at the registers.
Yeah, this is my primary complaint about programming in Linux/GCC: everything is just harder then MSVC. Heck, when you *have* to support Linux nowadays, I just code in MSVC on Windows and use CLANG to do the compilation on Windows, then once that works just use CLANG on Linux to generate the executable. I can't imagine having to actually DEVELOP on Linux using either GCC or CLANG.
This is great if you’re writing for a PC environment. Can’t use core files on embedded, a debugger and a robust logging system is the best to debug quickly. Also 99.99% opening up the assembly to see what’s going on is just to take more time than looking at the source
I’m about to start using GDB in my codebase - thank you so much 👍🏻
printing variables is pretty useful without needing to understand registers or set breakpoints. i personally use both.
Nice explanation of debugging. Thanks!
„we can actually look at assembly instructions to figure out what went wrong“
Proceeds to briefly show assembly but not actually use it
Can't do this on most Microcontrollers, but I'll keep it in mind whenever I write a PC program in C.
I've used vscode extensions for debugging and when i run with debugging it crashes and automatically goes to the line number and i can inspect call stack, parameters, variables etc.
Wow today i learned why some say tack instead of dash. Interesting. Still makes my eye twitch every time I hear it.
Really it goes to the core!
In modern IDEs you can also set breakpoints that log something
As a computer engineering student and with knowing the assembly language, I`ll take my chances in print statements instead reading assembly code..
Hi, wanna know why do you have two naming patterns for your methods?
read_int() and EditBox(), for example.
Is there any technical reason for that?
if(i >= 100){
printf("....");
return;
}
Not just greater.
Love ur videos!
What's really fun is when your program cores with the -o option, but doesn't when you specify -g!
Excuse me, but I add a bunch of prints to figure out what's wrong and eventually I DO crack the code. Works every time.
Plenty of things print statements can't do
Ive spent 30 years working in software development and never had an issue with print debugging. In fact its got me out of many holes. And sometimes its the only option if running the code on the server is the only option and you aren't able to run a debugger or similar on the server.
Okay, and what if you're curious how the function initially get this value that crashed this problem?
Like if your error have multiple steps
What was that dive into the assembly for? Pretty random.
You probably meant >= 100, if you will type 100 as a box id you will have the same SEGFAULT
Unlikely. It will still be an array overflow, but it will likely be on the same memory page, and therefore not a segmentation fault.
Very helpful video. I think the core dump is for the linux machine you are running. Can we do the same for target microcontrollers. If yes, can you tell how to do it? Beginner here.
GDB has a remote debugging function that you can debug any application over network on your computer (provided that you have built a cross toolchain for the architecture).
It depends on your microcontroller as well as which operating system, if any, you are running on it.
GDB is pretty printing what the hardware is complaining about.
Not a trivial answer to your question.
The reason I do print debugging is rarely to debug crashes, it's to understand the flow of logic.
The funniest experience of learning c is starting using print statements for debugging. Learning about debuggers and perror. End up programming drivers going back to using printk to print statements in order to debug :p
Useful. Nice introspective.
i had a rendering program and i wanted to debug one part of a function which is called thrice for every pixel, i was confused why printf was making sdl not render the frames even though the printf was working, took me over an hour to realise i wrote code that was so slow i didnt even notice it was running
How did you know which register was the rdx or rax? And why did we need the "info registers" command anyways?
It may not be handy for this example in particular as this this this example is a common issue most people can fix, but knowing how to see the state of the registers is nice when things get complex and you want to pinpoint maybe one portion of a line, which asm can do.
Also the register names were on the side of the table outputted
Completely unnecessary actually. I'm not sure what exactly you mean with the first question but if you mean what the content of the registers was that's what's printed in the table. If you ever want to go the route of debugging registers, gdb has some handy tools for printing formatted values.
This process is great for complied languages, not so easy to do for interpreted languages.
gdb is built-in in xcode runtime for mac users if any bug exist in runtime of their compiled c code
I'll stay loyal to my prints, thank you
I usually add a couple of debugging options to programs, even shell scripts, which enable either some basic logging or that plus an overkill data dump. That way I can trace behavior without code changes. A "debugger" isn't always viable for whatever reason.
I will be using print debugging and you cant stop me. It is the best and only way to debug.
Love ur content. Is there any reason you typedef unsigned int uint32_t instead of using uint32_t from stdint.h?...i mean i guess one reason could be less overhead if you're not using the other ints from that library, but also you dont know if int is going to be 32 bits on all systems....