From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from aserp2120.oracle.com (aserp2120.oracle.com [141.146.126.78]) by sourceware.org (Postfix) with ESMTPS id 53B3B3885C2A for ; Mon, 13 Jul 2020 12:25:04 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 53B3B3885C2A Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 06DCGp5e115958 for ; Mon, 13 Jul 2020 12:25:03 GMT Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70]) by aserp2120.oracle.com with ESMTP id 3275ckxnh2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL) for ; Mon, 13 Jul 2020 12:25:03 +0000 Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1]) by aserp3020.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 06DCDTXI017794 for ; Mon, 13 Jul 2020 12:25:03 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by aserp3020.oracle.com with ESMTP id 327qb0h0ud-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 13 Jul 2020 12:25:03 +0000 Received: from abhmp0008.oracle.com (abhmp0008.oracle.com [141.146.116.14]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id 06DCP2Du005142 for ; Mon, 13 Jul 2020 12:25:02 GMT Received: from termi.localdomain (/77.12.186.84) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 13 Jul 2020 05:25:02 -0700 From: "Jose E. Marchesi" To: gdb-patches@sourceware.org Subject: [PATCH V5 0/3] eBPF support Date: Mon, 13 Jul 2020 14:24:55 +0200 Message-Id: <20200713122458.21339-1-jose.marchesi@oracle.com> X-Mailer: git-send-email 2.25.0.2.g232378479e MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9680 signatures=668680 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=972 malwarescore=0 mlxscore=0 spamscore=0 phishscore=0 suspectscore=15 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2006250000 definitions=main-2007130092 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9680 signatures=668680 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=15 priorityscore=1501 bulkscore=0 adultscore=0 lowpriorityscore=0 phishscore=0 spamscore=0 impostorscore=0 malwarescore=0 mlxlogscore=980 clxscore=1015 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2006250000 definitions=main-2007130092 X-Spam-Status: No, score=-5.6 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 13 Jul 2020 12:25:07 -0000 [Changes from V4: - Rebased to today's master. - Remove bpf-tdep.h. - Clarify in bpf_frame_this_id why this_id is not set. - Make the GDB patch independent from the sim patch. - Indentation/style fixes. - Copyright year fixed in sim/bpf/Makefile.in - CGEN_MAIN -> CGEN_MAINT typo fixed in sim/bpf/Makefile.in - Removed XXX comments from sim/bpf/Makefile.in - Removed spurious comment from sim/bpf/sim-if.c] Hi good peoples! This patch series adds support for the eBPF virtual architecture to GDB [1]. The first patch contains the basic bits to GDB in order to support the bpf-unknown-none target. Breakpointing and instruction single-stepping works, but the debugging support in eBPF is still very minimal. This is mainly due to the many limitations imposed by the architecture (disjoint stack, maximum stack size, etc). We are working to overcome these limitations, by introducing a variant called xbpf, already supported in GCC with the -mxbpf option, whose purpose is to ease debugging and to be used in other contexts different than the Linux kernel, less restrictive. The second patch adds a basic CGEN-based instruction simulator for eBPF. It can run many eBPF programs and works well with GDB. A testsuite covering the supported instructions is also included. We will be expanding it in order to emulate the several kernel contexts in which eBPF programs can run, so eBPF developers can use GDB to debug their programs without having to load them in a running kernel. Currently the only kernel helper implemented in the simulator is printk, which is used by the tests. We of course commit to maintain and evolve this stuff :) [1] Support for eBPF has been already added to both binutils and GCC. Jose E. Marchesi (3): gdb: support for eBPF sim: eBPF simulator sim: generated files for the eBPF simulator gdb/ChangeLog | 12 + gdb/Makefile.in | 2 + gdb/bpf-tdep.c | 373 + gdb/configure.tgt | 6 + gdb/doc/ChangeLog | 6 + gdb/doc/gdb.texinfo | 21 + sim/ChangeLog | 42 + sim/MAINTAINERS | 1 + sim/bpf/Makefile.in | 203 + sim/bpf/aclocal.m4 | 119 + sim/bpf/arch.c | 35 + sim/bpf/arch.h | 50 + sim/bpf/bpf-helpers.c | 175 + sim/bpf/bpf-helpers.def | 194 + sim/bpf/bpf-helpers.h | 31 + sim/bpf/bpf-sim.h | 31 + sim/bpf/bpf.c | 327 + sim/bpf/config.in | 248 + sim/bpf/configure | 15942 ++++++++++++++++++++++++++ sim/bpf/configure.ac | 13 + sim/bpf/cpu.c | 69 + sim/bpf/cpu.h | 81 + sim/bpf/cpuall.h | 65 + sim/bpf/decode-be.c | 1129 ++ sim/bpf/decode-be.h | 94 + sim/bpf/decode-le.c | 1129 ++ sim/bpf/decode-le.h | 94 + sim/bpf/decode.h | 37 + sim/bpf/defs-be.h | 383 + sim/bpf/defs-le.h | 383 + sim/bpf/eng.h | 24 + sim/bpf/mloop.in | 165 + sim/bpf/sem-be.c | 3207 ++++++ sim/bpf/sem-le.c | 3207 ++++++ sim/bpf/sim-if.c | 214 + sim/bpf/sim-main.h | 51 + sim/bpf/traps.c | 33 + sim/configure | 8 + sim/configure.tgt | 3 + sim/testsuite/ChangeLog | 17 + sim/testsuite/configure | 9 +- sim/testsuite/sim/bpf/allinsn.exp | 26 + sim/testsuite/sim/bpf/alu.s | 109 + sim/testsuite/sim/bpf/alu32.s | 99 + sim/testsuite/sim/bpf/endbe.s | 46 + sim/testsuite/sim/bpf/endle.s | 43 + sim/testsuite/sim/bpf/jmp.s | 120 + sim/testsuite/sim/bpf/jmp32.s | 120 + sim/testsuite/sim/bpf/ldabs.s | 87 + sim/testsuite/sim/bpf/mem.s | 56 + sim/testsuite/sim/bpf/mov.s | 54 + sim/testsuite/sim/bpf/testutils.inc | 38 + sim/testsuite/sim/bpf/xadd.s | 44 + 53 files changed, 29072 insertions(+), 3 deletions(-) create mode 100644 gdb/bpf-tdep.c create mode 100644 sim/bpf/Makefile.in create mode 100644 sim/bpf/aclocal.m4 create mode 100644 sim/bpf/arch.c create mode 100644 sim/bpf/arch.h create mode 100644 sim/bpf/bpf-helpers.c create mode 100644 sim/bpf/bpf-helpers.def create mode 100644 sim/bpf/bpf-helpers.h create mode 100644 sim/bpf/bpf-sim.h create mode 100644 sim/bpf/bpf.c create mode 100644 sim/bpf/config.in create mode 100755 sim/bpf/configure create mode 100644 sim/bpf/configure.ac create mode 100644 sim/bpf/cpu.c create mode 100644 sim/bpf/cpu.h create mode 100644 sim/bpf/cpuall.h create mode 100644 sim/bpf/decode-be.c create mode 100644 sim/bpf/decode-be.h create mode 100644 sim/bpf/decode-le.c create mode 100644 sim/bpf/decode-le.h create mode 100644 sim/bpf/decode.h create mode 100644 sim/bpf/defs-be.h create mode 100644 sim/bpf/defs-le.h create mode 100644 sim/bpf/eng.h create mode 100644 sim/bpf/mloop.in create mode 100644 sim/bpf/sem-be.c create mode 100644 sim/bpf/sem-le.c create mode 100644 sim/bpf/sim-if.c create mode 100644 sim/bpf/sim-main.h create mode 100644 sim/bpf/traps.c create mode 100644 sim/testsuite/sim/bpf/allinsn.exp create mode 100644 sim/testsuite/sim/bpf/alu.s create mode 100644 sim/testsuite/sim/bpf/alu32.s create mode 100644 sim/testsuite/sim/bpf/endbe.s create mode 100644 sim/testsuite/sim/bpf/endle.s create mode 100644 sim/testsuite/sim/bpf/jmp.s create mode 100644 sim/testsuite/sim/bpf/jmp32.s create mode 100644 sim/testsuite/sim/bpf/ldabs.s create mode 100644 sim/testsuite/sim/bpf/mem.s create mode 100644 sim/testsuite/sim/bpf/mov.s create mode 100644 sim/testsuite/sim/bpf/testutils.inc create mode 100644 sim/testsuite/sim/bpf/xadd.s -- 2.25.0.2.g232378479e