debugger icon indicating copy to clipboard operation
debugger copied to clipboard

Step over on a call instruction lets target run freely when using lldb to connect to a gdbserver

Open xusheng6 opened this issue 1 year ago • 1 comments

Repro steps:

  1. Download https://crackmes.one/crackme/66b5fa2c90c4c2830c821d0a to a Linux machine
  2. Run gdbserver 0.0.0.0:31337 -- ./crackme666adv
  3. Open the file in bina (on macOS)
  4. Debugger - Connect to remote process
  5. Input the IP address and connect to it
  6. Run the target until it breaks at the entry point
  7. Put a breakpoint on 00001325 call printf
  8. Resume the target and wait for the breakpoint to be reached
  9. Step over
  10. Notice the target runs on its own and prompts for input, rather than breaking at call printf

xusheng6 avatar Sep 02 '24 04:09 xusheng6

To be fair, there is some pecularity with this binary -- I tested with a helloword binary and we can step over on the printf call just normally

xusheng6 avatar Nov 07 '24 08:11 xusheng6