Skip to content

Latest commit

 

History

History
727 lines (532 loc) · 32.5 KB

dbgovl32.rst

File metadata and controls

727 lines (532 loc) · 32.5 KB

ABI for the Arm Architecture: Support for Debugging Overlaid Programs

2021Q3

Date of Issue: 1st November 2021

image

Preamble

Abstract

This specification defines an extension to the ABI for the Arm Architecture to support debugging overlaid programs. No tool chain is required to support this extension but tools that support debugging overlaid programs should do so in one of the ways specified in The ABI Extension.

Keywords

Debugging ABI for the Arm Architecture; debugging; ABI

Latest release and defects report

Please check Application Binary Interface for the Arm® Architecture for the latest release of this document.

Please report defects in this specification to the issue tracker page on GitHub.

Licence

This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.

Grant of Patent License. Subject to the terms and conditions of this license (both the Public License and this Patent License), each Licensor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Licensed Material, where such license applies only to those patent claims licensable by such Licensor that are necessarily infringed by their contribution(s) alone or by combination of their contribution(s) with the Licensed Material to which such contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Licensed Material or a contribution incorporated within the Licensed Material constitutes direct or contributory patent infringement, then any licenses granted to You under this license for that Licensed Material shall terminate as of the date such litigation is filed.

About the license

As identified more fully in the Licence section, this project is licensed under CC-BY-SA-4.0 along with an additional patent license. The language in the additional patent license is largely identical to that in Apache-2.0 (specifically, Section 3 of Apache-2.0 as reflected at https://www.apache.org/licenses/LICENSE-2.0) with two exceptions.

First, several changes were made related to the defined terms so as to reflect the fact that such defined terms need to align with the terminology in CC-BY-SA-4.0 rather than Apache-2.0 (e.g., changing “Work” to “Licensed Material”).

Second, the defensive termination clause was changed such that the scope of defensive termination applies to “any licenses granted to You” (rather than “any patent licenses granted to You”). This change is intended to help maintain a healthy ecosystem by providing additional protection to the community against patent litigation claims.

Contributions

Contributions to this project are licensed under an inbound=outbound model such that any such contributions are licensed by the contributor under the same terms as those in the Licence section.

Trademark notice

The text of and illustrations in this document are licensed by Arm under a Creative Commons Attribution–Share Alike 4.0 International license ("CC-BY-SA-4.0”), with an additional clause on patents. The Arm trademarks featured here are registered trademarks or trademarks of Arm Limited (or its subsidiaries) in the US and/or elsewhere. All rights reserved. Please visit https://www.arm.com/company/policies/trademarks for more information about Arm’s trademarks.

Copyright (c) 2008, 2018, 2021, Arm Limited and its affiliates. All rights reserved.

About this document

Change control

Current status and anticipated changes

The following support level definitions are used by the Arm ABI specifications:

Release

Arm considers this specification to have enough implementations, which have received sufficient testing, to verify that it is correct. The details of these criteria are dependent on the scale and complexity of the change over previous versions: small, simple changes might only require one implementation, but more complex changes require multiple independent implementations, which have been rigorously tested for cross-compatibility. Arm anticipates that future changes to this specification will be limited to typographical corrections, clarifications and compatible extensions.

Beta

Arm considers this specification to be complete, but existing implementations do not meet the requirements for confidence in its release quality. Arm may need to make incompatible changes if issues emerge from its implementation.

Alpha

The content of this specification is a draft, and Arm considers the likelihood of future incompatible changes to be significant.

All content in this document is at the Release quality level.

Change history

If there is no entry in the change history table for a release, there are no changes to the content of the document for that release.

Issue Date Change
A 10th October 2008 First public release.
2018Q4 21st December 2018 Minor typographical fixes, updated links.
2021Q1 12th April 2021

References

This document refers to the following documents.

Ref Author(s) or links Title
ABI https://github.com/ARM-software/abi-aa/releases Application Binary Interface for the Arm® Architecture
ADDENDA32 Addenda to, and Errata in, the ABI for the Arm Architecture
AADWARF32 DWARF for the Arm Architecture
AAELF32 ELF for the Arm Architecture
GNUOV http://sourceware.org/gdb/current/onlinedocs/gdb/Overlays.html#Overlays Debugging Programs That Use Overlays (GDB documentation suite)

Terms and abbreviations

This document defines its terms and abbreviations in the document text.

Acknowledgements

Lauterbach Datentechnik GmbH gave valuable review of earlier drafts of this specification.

The Interface Between Linkers and Debuggers

Summary

The ABI for the Arm® Architecture [ABI] specifies ELF [AAELF32] as the executable file format and DWARF 3.0 [AADWARF32] as the debugging data format.

This note describes the obligations a producer of an executable ELF file (a linker) must meet to support debugging overlaid programs.

Terminology

In this note the terms virtual address and address are used interchangeably to describe addresses in a target system used by a program. This note is not concerned with the possibility that an external agent such as a debugger might ‘see’ addresses differently to an executing program.

A linker has two views of a program’s address space that become distinct in the presence of overlaid, position-independent, and relocatable program fragments (code or data).

  • The load address of a program fragment is the target address to a linker expects an external agent such as a program loader, dynamic linker, or debugger to copy the fragment from the ELF file. This is not necessarily the address at which the fragment will execute.
  • The execution address of a program fragment is the target address at which a linker expects the fragment will reside whenever it participates in the program’s execution.

Of course, if a fragment is position-independent or relocatable, its execution address can vary during execution.

Standard ELF views

The ELF standard specifies two views of an executable ELF file.

In the program view, each program header of type PT_LOAD describes:

  • A contiguous region of the file containing the initializing content for a program segment.
  • A contiguous region of target address-space to which an external agent will copy that content.

In a program header, target addresses should be load addresses (Terminology) because an external agent is expected to load the program segment there.

In the section view, each section header describes:

  • A contiguous region of the file occupied by the content of the section.
  • And, if the section will appear in memory, a corresponding contiguous region of the target address-space. These addresses must be execution addresses.

The ELF standard permits the section view to be omitted from an executable ELF file and this is typically done when executable files are not intended to be debugged. The segment view suffices to support loading and execution.

In practice, the section view is never omitted when an ELF file is intended to be debugged.

DWARF debug tables and the section view of an ELF file can embody only one interpretation of target addresses. Because debuggers debug the execution of a program it is logically necessary for this to be the execution address view. By the same argument, ELF symbols must (almost always) define target execution addresses.

Relating different views of target addresses

In the absence of relocatable, position-independent, or overlaid program fragments, a debugger has no use for load addresses.

For example, a debugger stepping through a self-installing program will always ‘see’ execution addresses.

Load addresses might still have meaning to the user of a debugger, but their availability can be a quality of implementation. Non availability does not reduce a debugger’s necessary functionality.

Relocatable and position-independent program fragments cause difficulties for debuggers that are beyond the scope of this note so we mention them no more.

Overlaid program fragments cause the following difficulty.

Multiple debug sections that should refer to distinct program fragments (and that do refer to distinct relocatable program fragments prior to static linking) actually refer to the same region of target memory that is time-multiplexed between multiple program fragments.

Stated simply, given a target execution address, several different debug sections might relate to it and there is no obvious way to choose among them.

The remainder of this section explains how to make the relationship between target addresses and debug sections unambiguous.

Finding section and symbol load addresses

Each program header PH of type PT_LOAD defines

  • A half-open extent of the ELF file, [PH.p_offset, PH.p_offset + PH.p_filesz).
  • A half-open extent of load-address space, [PH.p_paddr, PH.p_paddr + PH.p_memsz).

It is guaranteed that p_memsz ≥ p_filesz.

Note

Strictly speaking the ELF standard guarantees that the memory interval [PH.p_vaddr + PH.p_filesz, PH.p_vaddr + PH.p_memsz) will be set to zero. Many embedded systems allow it to be uninitialized.

Note

Some linkers – notably GNU ld – use PH.p_paddr to hold the load address of a segment. We adopt that convention in this note and propose it as an extension to the ABI in The ABI Extension.

Each section header SH defines:

  • A half-open extent of the ELF file, [SH.sh_offset, SH.sh_offset + filesz), where filesz is SH.sh_size or 0 if SH.sh_type = SHT_NOBITS.
  • A half-open extent of execution-address space, [SH.sh_addr, SH.sh_addr + SH.sh_size).

For any section SH whose file extent overlaps the file extent of a segment PH and any file offset off that lies in both file extents the load address LA and execution address EA corresponding to off are:

LA(off) = PH.p_paddr + (off - PH.p_offset)

EA(off) = SH.sh_addr + (off - SH.sh_offset)

Conditional on the corresponding file offset off lying in both the segment file extent and the section file extent

LA = EA + PH.p_paddr - SH.sh_addr + SH.sh_offset - PH.p_offset

This gives the load address corresponding to each target execution address and, in the presence of overlaid program fragments will give multiple load addresses for the same execution address.

In particular, this allows the load address of every section that is part of the program to be computed from information already present in the ELF file.

Note

Normally a program section cannot intersect more than one program segment.

Note

When two or more segments are overlaid at the same load address and contain only sections of type SHT_NOBITS (zero-initialized or uninitialized data) and there is no intervening file content between the segments, the sections and the segments all have identical (empty) file extents. It is then impossible to match sections to a loaded segment via a unique file extent which makes it impossible to locate the debugging sections appropriate to the loaded segment.

This obscure corner case can be avoided if a linker ensures that every program segment has a unique file offset, p_offset. This can be done by adding padding bytes between adjacent segments with empty file extents (Linker obligations).

Once a load address is known for each section, the load address of every section-relative symbol S can be found.

S.st_shndx identifies the section header SH for the section in which S is defined.

S.st_value - SH.sh_addr is the offset of S in the section described by SH.

S.load_address = SH.load_address + (S.st_value - SH.sh_addr).

From above:

SH.load_address = SH.sh_addr + PH.p_paddr - SH.sh_addr + SH.sh_offset - PH.p_offset

= PH.p_paddr + (SH.sh_offset - PH.p_offset)

Finding which overlay is currently executing

In a typical embedded application, each section S in a set {S} of sections with overlapping execution extents has a distinct extent in load-address space. The section executing is the one for which the content of the execution-address space extent is identical to the content in the corresponding load-address space extent1.

Note

This definition only works for read-only segments that have not been accidentally corrupted. In other cases a debugger must observe or collude with the overlay manager to discover which segment is live.

Note

If the overlay system uses a centralized overlay manager (rather than loading overlays in an ad-hoc, distributed manner) it might be possible for a debugger to observe the load address and execution address used by the overlay manager in a code fragment resembling

memcpy(execution address, load address, segment length)

The static structure of overlays is, of course, discernable from execution address, load address, and section length of each section that overlaps another in the execution-address space.

Relating debug sections to program sections

In a relocatable file, a debug section refers to a location in a program section via a relocated location.

A relocation directive refers to the debug section being relocated via the sh_info field in the relocation section header and the r_offset field in the relocation itself. It refers to the program section via a symbol (identified by ELF32_R_SYM(r_info)) that refers to the program section via st_shndx and st_value (an offset in the section).

At this stage of linking, a reference from a debug section to a location in a program section is a pair of pairs

<debug section index, debug section offset>, <program section index, program section offset>

During static linking the program pair is reduced to single value, the execution address. This is ambiguous in the presence of overlaid sections.

Resolving the ambiguity requires some of the original relocation information. We propose two ways to represent that in an ELF file.

  • Retain the relevant subset (or all) of the original relocations in the executable ELF file.
  • Emit a new ELF section called .ARM.debug_overlay of type SHT_ARM_DEBUG_OVERLAY = SHT_LOUSER + 4 containing a table of entries as follows:

    debug section offset, debug section index, program section index

The description earlier in this section shows that the second representation can be calculated from the relevant subset of the retained relocation data.

GNU ld has an option (--emit-relocs) to retain all relocations in the executable file. Clearly this is sufficient.

A better option is to retain only relocations of debug sections (those with names matching *debug*) with respect to overlaid program sections (--emit-overlay-debug-relocs). An overlay-aware linker will readily recognize these sections.

For some linkers it might be easier to build a .ARM.debug_overlay section directly, as each relocation directive is processed, than to emit the original relocations filtered for relevance.

The ABI Extension

We extend the ABI for the Arm Architecture (ABI) as noted in this section. The extension is optional and no tool chain is required to support in order to claim conformance to the ABI. However, tools that support debugging overlaid programs should do so in one of the ways specified here.

Terminology

A linker has two views of a program’s address space that become distinct in the presence of overlaid program fragments (code or data).

  • The load address of a program fragment is the address to which a linker expects an external agent such as a program loader, dynamic linker, or debugger to copy the fragment from the ELF file. This is not necessarily the address at which the fragment will execute.
  • The execution address of a program fragment is the address at which a linker expects the fragment will reside whenever it participates in the program’s execution.

Linker obligations

A linker claiming to support the debugging of overlaid programs shall ensure the following in the executable ELF files it produces.

  • Each program fragment that overlaps another in the execution address space shall be described by a distinct ELF section header.
  • Target addresses recorded in section header sh_addr fields and symbol st_value fields shall be execution addresses.
  • Target addresses recorded in p_paddr fields of program headers of type PT_LOAD shall be load addresses.
  • Each program segment described by a program header PH of type PT_LOAD shall occupy a different extent [PH.p_offset, PH.p_offset + PH.p_filesz) in the ELF file. (An empty extent shall not overlap any other extent).

In addition, a linker claiming to support debugging of overlaid programs shall do at least one of the following.

  • Provide a means to retain all original relocations in the executable file. GNU ld does this using the command option --emit-relocs.
  • Provide a means to retain just those original relocations that relocate debug sections with respect to overlaid program sections. A linker might provide a command option such as --emit-overlay-debug-relocs.
  • Add a debug-overlay ELF section (specified in The debug-overlay section, below) to the executable file.

The debug-overlay section

The debug-overlay section header
Field Value
sh_name .ARM.debug_overlay
sh_type SHT_ARM_DEBUGOVERLAY = SHT_LOPROC + 4 = 0x70000004
sh_flags 0
sh_addr 0
sh_offset The section’s file offset.
sh_size The byte size of the section, a multiple of sh_entsize.
sh_link 0
sh_info 0
sh_addralign 0
sh_entsize 8 or 12 (the size of an entry).

The debug-overlay section is a table of fixed size rows, each row containing three values.

The debug-overlay section row format
Field Offset Size Value
dbg_offset 0 4 The offset in the debug section of the field containing the execution address.
dbg_shndx
4

2

------------+

4

The index in the ELF file’s section header table of a debug section that refers to an overlaid program section (via a potentially ambiguous execution address).
ov_shndx

6

--------------+

8

2

------------+

4

The index in the ELF file’s section header table of the overlaid section referred to by the debug section.
sh_entsize +

8

------------+

12

If section indexes are smaller than SHN_XINDEX (0xffff).

-------------------------------------------------------------------------------------------------------------------------------------------------------------------+

If any section index needs to be greater than SHN_XINDEX – 1.

Rationale

The size of many consolidated debug sections exceeds 216 bytes so offsets need to be 4-byte quantities.

In reality, the indexes of consolidated sections will usually fit into 1 byte. However, a 6 byte entry does not fit well with the 4-byte alignment requirement of 4-byte offsets and saves little space compared with 8-byte entries.

A linker only needs to generate a section containing 12-byte entries when it would in any case need to generate a section of type SHT_SYMTAB_SHNDX in order to accommodate values of st_shndx greater than SHN_XINDEX – 1.

A linker should usually generate a debug-overlay section containing 8-byte entries.

Integration with GNU overlay management (speculative in r2.07)

The GNU debugger GDB features some support for debugging overlaid programs and defines a memory-resident table, identified by the _ovly_table symbol, for communicating between an overlay manager and GDB [GNUOV]. Each row in _ovly_table[] contains <execution address, size, load address, loaded> for an overlay segment.

From an embedded perspective there are a number of issues with this.

  • The whole table must be writable (RAM) because the flag field loaded needs to be writable. In most embedded applications the other fields are read-only so they could reside in ROM.
  • In a distributed overlay manager (e.g. each segment loads its successor explicitly) this data might need to replicated in _ovly_table[] just for the convenience of a debugger that could use a copy held on the host.
  • It does not solve the problem of relating an overlaid program section to the debug sections that refer to it (for which --emit-relocs, a debug overlay section [The debug-overlay section], or similar, is needed).

To integrate this mechanism in a manner more useful to embedded systems we propose the following.

  • Define a new .ARM.overlay_table section of type SHT_ARM_OVERLAYSECTION` = 0x70000005 with contents exactly as defined by [GNUOV].
  • The section header’s sh_flags field contains SHF_ALLOC if the section resides in memory, otherwise the section is an offline section used by a debugger.
  • If the sh_flags field contains SHF_ALLOC and not SHF_WRITE, the table resides in ROM.

Otherwise the section resides in RAM and is used exactly as described by [GNUOV]. This is also the interpretation when the symbol _ovly_table exists but there is no .ARM.overlay_table section.

When the .ARM.overlay_table section exists and is not resident in RAM

  • The loaded field of each _ovly_table entry is unused and the symbol _ovly_loaded identifies a separate byte array in RAM recording the loaded status of the corresponding overlay segments.

  1. Assuming the program has not altered writable memory and that initializing contents are unique.