1dda17b36SConrad Meyer.\"- 2dda17b36SConrad Meyer.\" Copyright (c) 2019 Conrad Meyer <cem@FreeBSD.org> 3dda17b36SConrad Meyer.\" 4dda17b36SConrad Meyer.\" Redistribution and use in source and binary forms, with or without 5dda17b36SConrad Meyer.\" modification, are permitted provided that the following conditions 6dda17b36SConrad Meyer.\" are met: 7dda17b36SConrad Meyer.\" 1. Redistributions of source code must retain the above copyright 8dda17b36SConrad Meyer.\" notice, this list of conditions and the following disclaimer. 9dda17b36SConrad Meyer.\" 2. Redistributions in binary form must reproduce the above copyright 10dda17b36SConrad Meyer.\" notice, this list of conditions and the following disclaimer in the 11dda17b36SConrad Meyer.\" documentation and/or other materials provided with the distribution. 12dda17b36SConrad Meyer.\" 13dda17b36SConrad Meyer.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 14dda17b36SConrad Meyer.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 15dda17b36SConrad Meyer.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 16dda17b36SConrad Meyer.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 17dda17b36SConrad Meyer.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 18dda17b36SConrad Meyer.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 19dda17b36SConrad Meyer.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 20dda17b36SConrad Meyer.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 21dda17b36SConrad Meyer.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 22dda17b36SConrad Meyer.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 23dda17b36SConrad Meyer.\" SUCH DAMAGE. 24dda17b36SConrad Meyer.\" 25d5f3e80fSMitchell Horne.Dd November 10, 2022 26dda17b36SConrad Meyer.Dt NETGDB 4 27dda17b36SConrad Meyer.Os 28dda17b36SConrad Meyer.Sh NAME 29dda17b36SConrad Meyer.Nm netgdb 30dda17b36SConrad Meyer.Nd protocol for debugging the kernel with GDB over the network 31dda17b36SConrad Meyer.Sh SYNOPSIS 32d5f3e80fSMitchell HorneTo compile NetGDB support into the kernel, place the following lines in your 33d5f3e80fSMitchell Hornekernel configuration file: 34dda17b36SConrad Meyer.Bd -ragged -offset indent 35d5f3e80fSMitchell Horne.Cd "options DDB" 36d5f3e80fSMitchell Horne.Cd "options GDB" 37d5f3e80fSMitchell Horne.Cd "options INET" 38d5f3e80fSMitchell Horne.Cd "options DEBUGNET" 39d5f3e80fSMitchell Horne.Cd "options NETGDB" 40dda17b36SConrad Meyer.Ed 41dda17b36SConrad Meyer.Sh DESCRIPTION 42dda17b36SConrad Meyer.Nm 43dda17b36SConrad Meyeris a UDP-based protocol for communicating with a remote GDB client via an 44dda17b36SConrad Meyerintermediary proxy. 45dda17b36SConrad Meyer.Pp 46dda17b36SConrad MeyerA 47dda17b36SConrad Meyer.Nm 48dda17b36SConrad Meyersession is started by using the 49dda17b36SConrad Meyer.Ic netgdb Fl s Ar server Oo Fl g Ar gateway Fl c Ar client Fl i Ar iface Oc 50dda17b36SConrad Meyercommand in 51dda17b36SConrad Meyer.Xr ddb 4 52dda17b36SConrad Meyerto connect to a proxy server. 53dda17b36SConrad MeyerWhen the connection is made, the proxy server logs a message that a 54dda17b36SConrad Meyer.Nm 55dda17b36SConrad Meyerclient has connected. 56dda17b36SConrad MeyerIt subsequently establishes a TCP listening socket and logs a message 57dda17b36SConrad Meyerspecifying which port it is listening on. 58dda17b36SConrad MeyerThen it waits for a GDB client to connect. 59dda17b36SConrad MeyerThe GDB command to connect is: 60dda17b36SConrad Meyer.Bd -ragged -offset indent 61dda17b36SConrad Meyer.Ic target remote Aq Ar proxyip:proxyport 62dda17b36SConrad Meyer.Ed 63dda17b36SConrad Meyer.Pp 64dda17b36SConrad MeyerAt this point, the server proxies traffic back and forth between 65dda17b36SConrad Meyer.Nm 66dda17b36SConrad Meyerand the ordinary GDB client, speaking the ordinary GDB remote protocol. 67dda17b36SConrad MeyerThe 68dda17b36SConrad Meyer.Nm 69*8aa5bb0eSJose Luis Duransession is identical to any other kernel GDB session from the perspective 70dda17b36SConrad Meyerof the GDB debugger. 71dda17b36SConrad Meyer.Sh IMPLEMENTATION NOTES 72dda17b36SConrad MeyerThe UDP protocol is based on the same packet structure and a subset of the 73dda17b36SConrad Meyerexact same message types as 74dda17b36SConrad Meyer.Xr netdump 4 . 75dda17b36SConrad MeyerIt uses the 76dda17b36SConrad Meyer.Dv HERALD , 77dda17b36SConrad Meyer.Dv DATA ( née VMCORE ) , 78dda17b36SConrad Meyerand 79dda17b36SConrad Meyer.Dv FINISHED 80dda17b36SConrad Meyermessage types. 81dda17b36SConrad MeyerLike 82dda17b36SConrad Meyer.Xr netdump 4 , 83dda17b36SConrad Meyerthe client's initial 84dda17b36SConrad Meyer.Dv HERALD 85dda17b36SConrad Meyermessage is acknowledged from a random source port, and the client sends 86dda17b36SConrad Meyersubsequent communication to that port. 87dda17b36SConrad Meyer.Pp 88dda17b36SConrad MeyerUnlike 89dda17b36SConrad Meyer.Xr netdump 4 , 90dda17b36SConrad Meyerthe initial 91dda17b36SConrad Meyer.Dv HERALD 92dda17b36SConrad Meyerport is 20025. 93dda17b36SConrad MeyerAdditionally, 94dda17b36SConrad Meyerthe proxy server sends responses to the source port of the client's initial 95dda17b36SConrad Meyer.Dv HERALD , 96dda17b36SConrad Meyerrather than a separate reserved port. 97dda17b36SConrad Meyer.Nm 98dda17b36SConrad Meyermessage and acknowledgements are bidirectional. 99dda17b36SConrad MeyerThe sequence number and acknowledgement protocol is otherwise identical to 100dda17b36SConrad Meyerthe unidirectional version used by netdump; it just runs in both directions. 101dda17b36SConrad MeyerAcknowledgements are sent to and from the same addresses and ports as 102dda17b36SConrad Meyerregular messages. 103dda17b36SConrad Meyer.Pp 104dda17b36SConrad MeyerThe first version of the 105dda17b36SConrad Meyer.Nm 106dda17b36SConrad Meyerprotocol uses the protocol number 107dda17b36SConrad Meyer.Dv Sq 0x2515f095 108dda17b36SConrad Meyerin the 32-bit 109dda17b36SConrad Meyer.Va aux2 110dda17b36SConrad Meyerparameter of the initial 111dda17b36SConrad Meyer.Dv HERALD 112dda17b36SConrad Meyermessage. 113dda17b36SConrad Meyer.Pp 114dda17b36SConrad MeyerThe list of supported network drivers and protocol families is identical to 115dda17b36SConrad Meyerthat of 116dda17b36SConrad Meyer.Xr netdump 4 . 117dda17b36SConrad Meyer.Sh DIAGNOSTICS 118dda17b36SConrad MeyerThe following variable is available via both 119dda17b36SConrad Meyer.Xr sysctl 8 120dda17b36SConrad Meyerand 121dda17b36SConrad Meyer.Xr loader 8 122dda17b36SConrad Meyer(as a tunable): 123dda17b36SConrad Meyer.Bl -tag -width "indent" 124dda17b36SConrad Meyer.It Va debug.gdb.netgdb.debug 125dda17b36SConrad MeyerControl debug message verbosity. 126dda17b36SConrad MeyerDebug messages are disabled by default. 127dda17b36SConrad MeyerThey may be enabled by setting the variable to a non-zero value. 128dda17b36SConrad Meyer.El 129dda17b36SConrad Meyer.Sh SEE ALSO 130dda17b36SConrad Meyer.Xr ddb 4 , 131dda17b36SConrad Meyer.Xr gdb 4 , 132dda17b36SConrad Meyer.Xr netdump 4 133dda17b36SConrad Meyer.Sh HISTORY 134dda17b36SConrad Meyer.Nm 135dda17b36SConrad Meyerfirst appeared in 136dda17b36SConrad Meyer.Fx 13.0 . 137dda17b36SConrad Meyer.Sh BUGS 138dda17b36SConrad Meyer.Nm 139dda17b36SConrad Meyermay only be used after the kernel has panicked, due to limitations in the 140dda17b36SConrad Meyertreatment of locking primitives under 141dda17b36SConrad Meyer.Xr ddb 4 . 142dda17b36SConrad Meyer.Sh SECURITY CONSIDERATIONS 143dda17b36SConrad MeyerVersion 1 of the 144dda17b36SConrad Meyer.Nm 145dda17b36SConrad Meyerprotocol has no security properties whatsoever. 146dda17b36SConrad MeyerAll messages are sent and acknowledged in cleartext, and no message 147dda17b36SConrad Meyerauthentication codes are used to prevent attackers from forging messages. 148dda17b36SConrad MeyerIt is absolutely inappropriate for use across the public internet. 149