OpenCores
URL https://opencores.org/ocsvn/openrisc/openrisc/trunk

Subversion Repositories openrisc

[/] [openrisc/] [trunk/] [gnu-old/] [gdb-6.8/] [gdb/] [doc/] [agentexpr.texi] - Blame information for rev 866

Go to most recent revision | Details | Compare with Previous | View Log

Line No. Rev Author Line
1 24 jeremybenn
@c \input texinfo
2
@c %**start of header
3
@c @setfilename agentexpr.info
4
@c @settitle GDB Agent Expressions
5
@c @setchapternewpage off
6
@c %**end of header
7
 
8
@c This file is part of the GDB manual.
9
@c
10
@c Copyright (C) 2003, 2004, 2005, 2006
11
@c               Free Software Foundation, Inc.
12
@c
13
@c See the file gdb.texinfo for copying conditions.
14
 
15
@node Agent Expressions
16
@appendix The GDB Agent Expression Mechanism
17
 
18
In some applications, it is not feasible for the debugger to interrupt
19
the program's execution long enough for the developer to learn anything
20
helpful about its behavior.  If the program's correctness depends on its
21
real-time behavior, delays introduced by a debugger might cause the
22
program to fail, even when the code itself is correct.  It is useful to
23
be able to observe the program's behavior without interrupting it.
24
 
25
Using GDB's @code{trace} and @code{collect} commands, the user can
26
specify locations in the program, and arbitrary expressions to evaluate
27
when those locations are reached.  Later, using the @code{tfind}
28
command, she can examine the values those expressions had when the
29
program hit the trace points.  The expressions may also denote objects
30
in memory --- structures or arrays, for example --- whose values GDB
31
should record; while visiting a particular tracepoint, the user may
32
inspect those objects as if they were in memory at that moment.
33
However, because GDB records these values without interacting with the
34
user, it can do so quickly and unobtrusively, hopefully not disturbing
35
the program's behavior.
36
 
37
When GDB is debugging a remote target, the GDB @dfn{agent} code running
38
on the target computes the values of the expressions itself.  To avoid
39
having a full symbolic expression evaluator on the agent, GDB translates
40
expressions in the source language into a simpler bytecode language, and
41
then sends the bytecode to the agent; the agent then executes the
42
bytecode, and records the values for GDB to retrieve later.
43
 
44
The bytecode language is simple; there are forty-odd opcodes, the bulk
45
of which are the usual vocabulary of C operands (addition, subtraction,
46
shifts, and so on) and various sizes of literals and memory reference
47
operations.  The bytecode interpreter operates strictly on machine-level
48
values --- various sizes of integers and floating point numbers --- and
49
requires no information about types or symbols; thus, the interpreter's
50
internal data structures are simple, and each bytecode requires only a
51
few native machine instructions to implement it.  The interpreter is
52
small, and strict limits on the memory and time required to evaluate an
53
expression are easy to determine, making it suitable for use by the
54
debugging agent in real-time applications.
55
 
56
@menu
57
* General Bytecode Design::     Overview of the interpreter.
58
* Bytecode Descriptions::       What each one does.
59
* Using Agent Expressions::     How agent expressions fit into the big picture.
60
* Varying Target Capabilities:: How to discover what the target can do.
61
* Tracing on Symmetrix::        Special info for implementation on EMC's
62
                                boxes.
63
* Rationale::                   Why we did it this way.
64
@end menu
65
 
66
 
67
@c @node Rationale
68
@c @section Rationale
69
 
70
 
71
@node General Bytecode Design
72
@section General Bytecode Design
73
 
74
The agent represents bytecode expressions as an array of bytes.  Each
75
instruction is one byte long (thus the term @dfn{bytecode}).  Some
76
instructions are followed by operand bytes; for example, the @code{goto}
77
instruction is followed by a destination for the jump.
78
 
79
The bytecode interpreter is a stack-based machine; most instructions pop
80
their operands off the stack, perform some operation, and push the
81
result back on the stack for the next instruction to consume.  Each
82
element of the stack may contain either a integer or a floating point
83
value; these values are as many bits wide as the largest integer that
84
can be directly manipulated in the source language.  Stack elements
85
carry no record of their type; bytecode could push a value as an
86
integer, then pop it as a floating point value.  However, GDB will not
87
generate code which does this.  In C, one might define the type of a
88
stack element as follows:
89
@example
90
union agent_val @{
91
  LONGEST l;
92
  DOUBLEST d;
93
@};
94
@end example
95
@noindent
96
where @code{LONGEST} and @code{DOUBLEST} are @code{typedef} names for
97
the largest integer and floating point types on the machine.
98
 
99
By the time the bytecode interpreter reaches the end of the expression,
100
the value of the expression should be the only value left on the stack.
101
For tracing applications, @code{trace} bytecodes in the expression will
102
have recorded the necessary data, and the value on the stack may be
103
discarded.  For other applications, like conditional breakpoints, the
104
value may be useful.
105
 
106
Separate from the stack, the interpreter has two registers:
107
@table @code
108
@item pc
109
The address of the next bytecode to execute.
110
 
111
@item start
112
The address of the start of the bytecode expression, necessary for
113
interpreting the @code{goto} and @code{if_goto} instructions.
114
 
115
@end table
116
@noindent
117
Neither of these registers is directly visible to the bytecode language
118
itself, but they are useful for defining the meanings of the bytecode
119
operations.
120
 
121
There are no instructions to perform side effects on the running
122
program, or call the program's functions; we assume that these
123
expressions are only used for unobtrusive debugging, not for patching
124
the running code.
125
 
126
Most bytecode instructions do not distinguish between the various sizes
127
of values, and operate on full-width values; the upper bits of the
128
values are simply ignored, since they do not usually make a difference
129
to the value computed.  The exceptions to this rule are:
130
@table @asis
131
 
132
@item memory reference instructions (@code{ref}@var{n})
133
There are distinct instructions to fetch different word sizes from
134
memory.  Once on the stack, however, the values are treated as full-size
135
integers.  They may need to be sign-extended; the @code{ext} instruction
136
exists for this purpose.
137
 
138
@item the sign-extension instruction (@code{ext} @var{n})
139
These clearly need to know which portion of their operand is to be
140
extended to occupy the full length of the word.
141
 
142
@end table
143
 
144
If the interpreter is unable to evaluate an expression completely for
145
some reason (a memory location is inaccessible, or a divisor is zero,
146
for example), we say that interpretation ``terminates with an error''.
147
This means that the problem is reported back to the interpreter's caller
148
in some helpful way.  In general, code using agent expressions should
149
assume that they may attempt to divide by zero, fetch arbitrary memory
150
locations, and misbehave in other ways.
151
 
152
Even complicated C expressions compile to a few bytecode instructions;
153
for example, the expression @code{x + y * z} would typically produce
154
code like the following, assuming that @code{x} and @code{y} live in
155
registers, and @code{z} is a global variable holding a 32-bit
156
@code{int}:
157
@example
158
reg 1
159
reg 2
160
const32 @i{address of z}
161
ref32
162
ext 32
163
mul
164
add
165
end
166
@end example
167
 
168
In detail, these mean:
169
@table @code
170
 
171
@item reg 1
172
Push the value of register 1 (presumably holding @code{x}) onto the
173
stack.
174
 
175
@item reg 2
176
Push the value of register 2 (holding @code{y}).
177
 
178
@item const32 @i{address of z}
179
Push the address of @code{z} onto the stack.
180
 
181
@item ref32
182
Fetch a 32-bit word from the address at the top of the stack; replace
183
the address on the stack with the value.  Thus, we replace the address
184
of @code{z} with @code{z}'s value.
185
 
186
@item ext 32
187
Sign-extend the value on the top of the stack from 32 bits to full
188
length.  This is necessary because @code{z} is a signed integer.
189
 
190
@item mul
191
Pop the top two numbers on the stack, multiply them, and push their
192
product.  Now the top of the stack contains the value of the expression
193
@code{y * z}.
194
 
195
@item add
196
Pop the top two numbers, add them, and push the sum.  Now the top of the
197
stack contains the value of @code{x + y * z}.
198
 
199
@item end
200
Stop executing; the value left on the stack top is the value to be
201
recorded.
202
 
203
@end table
204
 
205
 
206
@node Bytecode Descriptions
207
@section Bytecode Descriptions
208
 
209
Each bytecode description has the following form:
210
 
211
@table @asis
212
 
213
@item @code{add} (0x02): @var{a} @var{b} @result{} @var{a+b}
214
 
215
Pop the top two stack items, @var{a} and @var{b}, as integers; push
216
their sum, as an integer.
217
 
218
@end table
219
 
220
In this example, @code{add} is the name of the bytecode, and
221
@code{(0x02)} is the one-byte value used to encode the bytecode, in
222
hexadecimal.  The phrase ``@var{a} @var{b} @result{} @var{a+b}'' shows
223
the stack before and after the bytecode executes.  Beforehand, the stack
224
must contain at least two values, @var{a} and @var{b}; since the top of
225
the stack is to the right, @var{b} is on the top of the stack, and
226
@var{a} is underneath it.  After execution, the bytecode will have
227
popped @var{a} and @var{b} from the stack, and replaced them with a
228
single value, @var{a+b}.  There may be other values on the stack below
229
those shown, but the bytecode affects only those shown.
230
 
231
Here is another example:
232
 
233
@table @asis
234
 
235
@item @code{const8} (0x22) @var{n}: @result{} @var{n}
236
Push the 8-bit integer constant @var{n} on the stack, without sign
237
extension.
238
 
239
@end table
240
 
241
In this example, the bytecode @code{const8} takes an operand @var{n}
242
directly from the bytecode stream; the operand follows the @code{const8}
243
bytecode itself.  We write any such operands immediately after the name
244
of the bytecode, before the colon, and describe the exact encoding of
245
the operand in the bytecode stream in the body of the bytecode
246
description.
247
 
248
For the @code{const8} bytecode, there are no stack items given before
249
the @result{}; this simply means that the bytecode consumes no values
250
from the stack.  If a bytecode consumes no values, or produces no
251
values, the list on either side of the @result{} may be empty.
252
 
253
If a value is written as @var{a}, @var{b}, or @var{n}, then the bytecode
254
treats it as an integer.  If a value is written is @var{addr}, then the
255
bytecode treats it as an address.
256
 
257
We do not fully describe the floating point operations here; although
258
this design can be extended in a clean way to handle floating point
259
values, they are not of immediate interest to the customer, so we avoid
260
describing them, to save time.
261
 
262
 
263
@table @asis
264
 
265
@item @code{float} (0x01): @result{}
266
 
267
Prefix for floating-point bytecodes.  Not implemented yet.
268
 
269
@item @code{add} (0x02): @var{a} @var{b} @result{} @var{a+b}
270
Pop two integers from the stack, and push their sum, as an integer.
271
 
272
@item @code{sub} (0x03): @var{a} @var{b} @result{} @var{a-b}
273
Pop two integers from the stack, subtract the top value from the
274
next-to-top value, and push the difference.
275
 
276
@item @code{mul} (0x04): @var{a} @var{b} @result{} @var{a*b}
277
Pop two integers from the stack, multiply them, and push the product on
278
the stack.  Note that, when one multiplies two @var{n}-bit numbers
279
yielding another @var{n}-bit number, it is irrelevant whether the
280
numbers are signed or not; the results are the same.
281
 
282
@item @code{div_signed} (0x05): @var{a} @var{b} @result{} @var{a/b}
283
Pop two signed integers from the stack; divide the next-to-top value by
284
the top value, and push the quotient.  If the divisor is zero, terminate
285
with an error.
286
 
287
@item @code{div_unsigned} (0x06): @var{a} @var{b} @result{} @var{a/b}
288
Pop two unsigned integers from the stack; divide the next-to-top value
289
by the top value, and push the quotient.  If the divisor is zero,
290
terminate with an error.
291
 
292
@item @code{rem_signed} (0x07): @var{a} @var{b} @result{} @var{a modulo b}
293
Pop two signed integers from the stack; divide the next-to-top value by
294
the top value, and push the remainder.  If the divisor is zero,
295
terminate with an error.
296
 
297
@item @code{rem_unsigned} (0x08): @var{a} @var{b} @result{} @var{a modulo b}
298
Pop two unsigned integers from the stack; divide the next-to-top value
299
by the top value, and push the remainder.  If the divisor is zero,
300
terminate with an error.
301
 
302
@item @code{lsh} (0x09): @var{a} @var{b} @result{} @var{a<<b}
303
Pop two integers from the stack; let @var{a} be the next-to-top value,
304
and @var{b} be the top value.  Shift @var{a} left by @var{b} bits, and
305
push the result.
306
 
307
@item @code{rsh_signed} (0x0a): @var{a} @var{b} @result{} @code{(signed)}@var{a>>b}
308
Pop two integers from the stack; let @var{a} be the next-to-top value,
309
and @var{b} be the top value.  Shift @var{a} right by @var{b} bits,
310
inserting copies of the top bit at the high end, and push the result.
311
 
312
@item @code{rsh_unsigned} (0x0b): @var{a} @var{b} @result{} @var{a>>b}
313
Pop two integers from the stack; let @var{a} be the next-to-top value,
314
and @var{b} be the top value.  Shift @var{a} right by @var{b} bits,
315
inserting zero bits at the high end, and push the result.
316
 
317
@item @code{log_not} (0x0e): @var{a} @result{} @var{!a}
318
Pop an integer from the stack; if it is zero, push the value one;
319
otherwise, push the value zero.
320
 
321
@item @code{bit_and} (0x0f): @var{a} @var{b} @result{} @var{a&b}
322
Pop two integers from the stack, and push their bitwise @code{and}.
323
 
324
@item @code{bit_or} (0x10): @var{a} @var{b} @result{} @var{a|b}
325
Pop two integers from the stack, and push their bitwise @code{or}.
326
 
327
@item @code{bit_xor} (0x11): @var{a} @var{b} @result{} @var{a^b}
328
Pop two integers from the stack, and push their bitwise
329
exclusive-@code{or}.
330
 
331
@item @code{bit_not} (0x12): @var{a} @result{} @var{~a}
332
Pop an integer from the stack, and push its bitwise complement.
333
 
334
@item @code{equal} (0x13): @var{a} @var{b} @result{} @var{a=b}
335
Pop two integers from the stack; if they are equal, push the value one;
336
otherwise, push the value zero.
337
 
338
@item @code{less_signed} (0x14): @var{a} @var{b} @result{} @var{a<b}
339
Pop two signed integers from the stack; if the next-to-top value is less
340
than the top value, push the value one; otherwise, push the value zero.
341
 
342
@item @code{less_unsigned} (0x15): @var{a} @var{b} @result{} @var{a<b}
343
Pop two unsigned integers from the stack; if the next-to-top value is less
344
than the top value, push the value one; otherwise, push the value zero.
345
 
346
@item @code{ext} (0x16) @var{n}: @var{a} @result{} @var{a}, sign-extended from @var{n} bits
347
Pop an unsigned value from the stack; treating it as an @var{n}-bit
348
twos-complement value, extend it to full length.  This means that all
349
bits to the left of bit @var{n-1} (where the least significant bit is bit
350
0) are set to the value of bit @var{n-1}.  Note that @var{n} may be
351
larger than or equal to the width of the stack elements of the bytecode
352
engine; in this case, the bytecode should have no effect.
353
 
354
The number of source bits to preserve, @var{n}, is encoded as a single
355
byte unsigned integer following the @code{ext} bytecode.
356
 
357
@item @code{zero_ext} (0x2a) @var{n}: @var{a} @result{} @var{a}, zero-extended from @var{n} bits
358
Pop an unsigned value from the stack; zero all but the bottom @var{n}
359
bits.  This means that all bits to the left of bit @var{n-1} (where the
360
least significant bit is bit 0) are set to the value of bit @var{n-1}.
361
 
362
The number of source bits to preserve, @var{n}, is encoded as a single
363
byte unsigned integer following the @code{zero_ext} bytecode.
364
 
365
@item @code{ref8} (0x17): @var{addr} @result{} @var{a}
366
@itemx @code{ref16} (0x18): @var{addr} @result{} @var{a}
367
@itemx @code{ref32} (0x19): @var{addr} @result{} @var{a}
368
@itemx @code{ref64} (0x1a): @var{addr} @result{} @var{a}
369
Pop an address @var{addr} from the stack.  For bytecode
370
@code{ref}@var{n}, fetch an @var{n}-bit value from @var{addr}, using the
371
natural target endianness.  Push the fetched value as an unsigned
372
integer.
373
 
374
Note that @var{addr} may not be aligned in any particular way; the
375
@code{ref@var{n}} bytecodes should operate correctly for any address.
376
 
377
If attempting to access memory at @var{addr} would cause a processor
378
exception of some sort, terminate with an error.
379
 
380
@item @code{ref_float} (0x1b): @var{addr} @result{} @var{d}
381
@itemx @code{ref_double} (0x1c): @var{addr} @result{} @var{d}
382
@itemx @code{ref_long_double} (0x1d): @var{addr} @result{} @var{d}
383
@itemx @code{l_to_d} (0x1e): @var{a} @result{} @var{d}
384
@itemx @code{d_to_l} (0x1f): @var{d} @result{} @var{a}
385
Not implemented yet.
386
 
387
@item @code{dup} (0x28): @var{a} => @var{a} @var{a}
388
Push another copy of the stack's top element.
389
 
390
@item @code{swap} (0x2b): @var{a} @var{b} => @var{b} @var{a}
391
Exchange the top two items on the stack.
392
 
393
@item @code{pop} (0x29): @var{a} =>
394
Discard the top value on the stack.
395
 
396
@item @code{if_goto} (0x20) @var{offset}: @var{a} @result{}
397
Pop an integer off the stack; if it is non-zero, branch to the given
398
offset in the bytecode string.  Otherwise, continue to the next
399
instruction in the bytecode stream.  In other words, if @var{a} is
400
non-zero, set the @code{pc} register to @code{start} + @var{offset}.
401
Thus, an offset of zero denotes the beginning of the expression.
402
 
403
The @var{offset} is stored as a sixteen-bit unsigned value, stored
404
immediately following the @code{if_goto} bytecode.  It is always stored
405
most significant byte first, regardless of the target's normal
406
endianness.  The offset is not guaranteed to fall at any particular
407
alignment within the bytecode stream; thus, on machines where fetching a
408
16-bit on an unaligned address raises an exception, you should fetch the
409
offset one byte at a time.
410
 
411
@item @code{goto} (0x21) @var{offset}: @result{}
412
Branch unconditionally to @var{offset}; in other words, set the
413
@code{pc} register to @code{start} + @var{offset}.
414
 
415
The offset is stored in the same way as for the @code{if_goto} bytecode.
416
 
417
@item @code{const8} (0x22) @var{n}: @result{} @var{n}
418
@itemx @code{const16} (0x23) @var{n}: @result{} @var{n}
419
@itemx @code{const32} (0x24) @var{n}: @result{} @var{n}
420
@itemx @code{const64} (0x25) @var{n}: @result{} @var{n}
421
Push the integer constant @var{n} on the stack, without sign extension.
422
To produce a small negative value, push a small twos-complement value,
423
and then sign-extend it using the @code{ext} bytecode.
424
 
425
The constant @var{n} is stored in the appropriate number of bytes
426
following the @code{const}@var{b} bytecode.  The constant @var{n} is
427
always stored most significant byte first, regardless of the target's
428
normal endianness.  The constant is not guaranteed to fall at any
429
particular alignment within the bytecode stream; thus, on machines where
430
fetching a 16-bit on an unaligned address raises an exception, you
431
should fetch @var{n} one byte at a time.
432
 
433
@item @code{reg} (0x26) @var{n}: @result{} @var{a}
434
Push the value of register number @var{n}, without sign extension.  The
435
registers are numbered following GDB's conventions.
436
 
437
The register number @var{n} is encoded as a 16-bit unsigned integer
438
immediately following the @code{reg} bytecode.  It is always stored most
439
significant byte first, regardless of the target's normal endianness.
440
The register number is not guaranteed to fall at any particular
441
alignment within the bytecode stream; thus, on machines where fetching a
442
16-bit on an unaligned address raises an exception, you should fetch the
443
register number one byte at a time.
444
 
445
@item @code{trace} (0x0c): @var{addr} @var{size} @result{}
446
Record the contents of the @var{size} bytes at @var{addr} in a trace
447
buffer, for later retrieval by GDB.
448
 
449
@item @code{trace_quick} (0x0d) @var{size}: @var{addr} @result{} @var{addr}
450
Record the contents of the @var{size} bytes at @var{addr} in a trace
451
buffer, for later retrieval by GDB.  @var{size} is a single byte
452
unsigned integer following the @code{trace} opcode.
453
 
454
This bytecode is equivalent to the sequence @code{dup const8 @var{size}
455
trace}, but we provide it anyway to save space in bytecode strings.
456
 
457
@item @code{trace16} (0x30) @var{size}: @var{addr} @result{} @var{addr}
458
Identical to trace_quick, except that @var{size} is a 16-bit big-endian
459
unsigned integer, not a single byte.  This should probably have been
460
named @code{trace_quick16}, for consistency.
461
 
462
@item @code{end} (0x27): @result{}
463
Stop executing bytecode; the result should be the top element of the
464
stack.  If the purpose of the expression was to compute an lvalue or a
465
range of memory, then the next-to-top of the stack is the lvalue's
466
address, and the top of the stack is the lvalue's size, in bytes.
467
 
468
@end table
469
 
470
 
471
@node Using Agent Expressions
472
@section Using Agent Expressions
473
 
474
Here is a sketch of a full non-stop debugging cycle, showing how agent
475
expressions fit into the process.
476
 
477
@itemize @bullet
478
 
479
@item
480
The user selects trace points in the program's code at which GDB should
481
collect data.
482
 
483
@item
484
The user specifies expressions to evaluate at each trace point.  These
485
expressions may denote objects in memory, in which case those objects'
486
contents are recorded as the program runs, or computed values, in which
487
case the values themselves are recorded.
488
 
489
@item
490
GDB transmits the tracepoints and their associated expressions to the
491
GDB agent, running on the debugging target.
492
 
493
@item
494
The agent arranges to be notified when a trace point is hit.  Note that,
495
on some systems, the target operating system is completely responsible
496
for collecting the data; see @ref{Tracing on Symmetrix}.
497
 
498
@item
499
When execution on the target reaches a trace point, the agent evaluates
500
the expressions associated with that trace point, and records the
501
resulting values and memory ranges.
502
 
503
@item
504
Later, when the user selects a given trace event and inspects the
505
objects and expression values recorded, GDB talks to the agent to
506
retrieve recorded data as necessary to meet the user's requests.  If the
507
user asks to see an object whose contents have not been recorded, GDB
508
reports an error.
509
 
510
@end itemize
511
 
512
 
513
@node Varying Target Capabilities
514
@section Varying Target Capabilities
515
 
516
Some targets don't support floating-point, and some would rather not
517
have to deal with @code{long long} operations.  Also, different targets
518
will have different stack sizes, and different bytecode buffer lengths.
519
 
520
Thus, GDB needs a way to ask the target about itself.  We haven't worked
521
out the details yet, but in general, GDB should be able to send the
522
target a packet asking it to describe itself.  The reply should be a
523
packet whose length is explicit, so we can add new information to the
524
packet in future revisions of the agent, without confusing old versions
525
of GDB, and it should contain a version number.  It should contain at
526
least the following information:
527
 
528
@itemize @bullet
529
 
530
@item
531
whether floating point is supported
532
 
533
@item
534
whether @code{long long} is supported
535
 
536
@item
537
maximum acceptable size of bytecode stack
538
 
539
@item
540
maximum acceptable length of bytecode expressions
541
 
542
@item
543
which registers are actually available for collection
544
 
545
@item
546
whether the target supports disabled tracepoints
547
 
548
@end itemize
549
 
550
 
551
 
552
@node Tracing on Symmetrix
553
@section Tracing on Symmetrix
554
 
555
This section documents the API used by the GDB agent to collect data on
556
Symmetrix systems.
557
 
558
Cygnus originally implemented these tracing features to help EMC
559
Corporation debug their Symmetrix high-availability disk drives.  The
560
Symmetrix application code already includes substantial tracing
561
facilities; the GDB agent for the Symmetrix system uses those facilities
562
for its own data collection, via the API described here.
563
 
564
@deftypefn Function DTC_RESPONSE adbg_find_memory_in_frame (FRAME_DEF *@var{frame}, char *@var{address}, char **@var{buffer}, unsigned int *@var{size})
565
Search the trace frame @var{frame} for memory saved from @var{address}.
566
If the memory is available, provide the address of the buffer holding
567
it; otherwise, provide the address of the next saved area.
568
 
569
@itemize @bullet
570
 
571
@item
572
If the memory at @var{address} was saved in @var{frame}, set
573
@code{*@var{buffer}} to point to the buffer in which that memory was
574
saved, set @code{*@var{size}} to the number of bytes from @var{address}
575
that are saved at @code{*@var{buffer}}, and return
576
@code{OK_TARGET_RESPONSE}.  (Clearly, in this case, the function will
577
always set @code{*@var{size}} to a value greater than zero.)
578
 
579
@item
580
If @var{frame} does not record any memory at @var{address}, set
581
@code{*@var{size}} to the distance from @var{address} to the start of
582
the saved region with the lowest address higher than @var{address}.  If
583
there is no memory saved from any higher address, set @code{*@var{size}}
584
to zero.  Return @code{NOT_FOUND_TARGET_RESPONSE}.
585
@end itemize
586
 
587
These two possibilities allow the caller to either retrieve the data, or
588
walk the address space to the next saved area.
589
@end deftypefn
590
 
591
This function allows the GDB agent to map the regions of memory saved in
592
a particular frame, and retrieve their contents efficiently.
593
 
594
This function also provides a clean interface between the GDB agent and
595
the Symmetrix tracing structures, making it easier to adapt the GDB
596
agent to future versions of the Symmetrix system, and vice versa.  This
597
function searches all data saved in @var{frame}, whether the data is
598
there at the request of a bytecode expression, or because it falls in
599
one of the format's memory ranges, or because it was saved from the top
600
of the stack.  EMC can arbitrarily change and enhance the tracing
601
mechanism, but as long as this function works properly, all collected
602
memory is visible to GDB.
603
 
604
The function itself is straightforward to implement.  A single pass over
605
the trace frame's stack area, memory ranges, and expression blocks can
606
yield the address of the buffer (if the requested address was saved),
607
and also note the address of the next higher range of memory, to be
608
returned when the search fails.
609
 
610
As an example, suppose the trace frame @code{f} has saved sixteen bytes
611
from address @code{0x8000} in a buffer at @code{0x1000}, and thirty-two
612
bytes from address @code{0xc000} in a buffer at @code{0x1010}.  Here are
613
some sample calls, and the effect each would have:
614
 
615
@table @code
616
 
617
@item adbg_find_memory_in_frame (f, (char*) 0x8000, &buffer, &size)
618
This would set @code{buffer} to @code{0x1000}, set @code{size} to
619
sixteen, and return @code{OK_TARGET_RESPONSE}, since @code{f} saves
620
sixteen bytes from @code{0x8000} at @code{0x1000}.
621
 
622
@item adbg_find_memory_in_frame (f, (char *) 0x8004, &buffer, &size)
623
This would set @code{buffer} to @code{0x1004}, set @code{size} to
624
twelve, and return @code{OK_TARGET_RESPONSE}, since @file{f} saves the
625
twelve bytes from @code{0x8004} starting four bytes into the buffer at
626
@code{0x1000}.  This shows that request addresses may fall in the middle
627
of saved areas; the function should return the address and size of the
628
remainder of the buffer.
629
 
630
@item adbg_find_memory_in_frame (f, (char *) 0x8100, &buffer, &size)
631
This would set @code{size} to @code{0x3f00} and return
632
@code{NOT_FOUND_TARGET_RESPONSE}, since there is no memory saved in
633
@code{f} from the address @code{0x8100}, and the next memory available
634
is at @code{0x8100 + 0x3f00}, or @code{0xc000}.  This shows that request
635
addresses may fall outside of all saved memory ranges; the function
636
should indicate the next saved area, if any.
637
 
638
@item adbg_find_memory_in_frame (f, (char *) 0x7000, &buffer, &size)
639
This would set @code{size} to @code{0x1000} and return
640
@code{NOT_FOUND_TARGET_RESPONSE}, since the next saved memory is at
641
@code{0x7000 + 0x1000}, or @code{0x8000}.
642
 
643
@item adbg_find_memory_in_frame (f, (char *) 0xf000, &buffer, &size)
644
This would set @code{size} to zero, and return
645
@code{NOT_FOUND_TARGET_RESPONSE}.  This shows how the function tells the
646
caller that no further memory ranges have been saved.
647
 
648
@end table
649
 
650
As another example, here is a function which will print out the
651
addresses of all memory saved in the trace frame @code{frame} on the
652
Symmetrix INLINES console:
653
@example
654
void
655
print_frame_addresses (FRAME_DEF *frame)
656
@{
657
  char *addr;
658
  char *buffer;
659
  unsigned long size;
660
 
661
  addr = 0;
662
  for (;;)
663
    @{
664
      /* Either find out how much memory we have here, or discover
665
         where the next saved region is.  */
666
      if (adbg_find_memory_in_frame (frame, addr, &buffer, &size)
667
          == OK_TARGET_RESPONSE)
668
        printp ("saved %x to %x\n", addr, addr + size);
669
      if (size == 0)
670
        break;
671
      addr += size;
672
    @}
673
@}
674
@end example
675
 
676
Note that there is not necessarily any connection between the order in
677
which the data is saved in the trace frame, and the order in which
678
@code{adbg_find_memory_in_frame} will return those memory ranges.  The
679
code above will always print the saved memory regions in order of
680
increasing address, while the underlying frame structure might store the
681
data in a random order.
682
 
683
[[This section should cover the rest of the Symmetrix functions the stub
684
relies upon, too.]]
685
 
686
@node Rationale
687
@section Rationale
688
 
689
Some of the design decisions apparent above are arguable.
690
 
691
@table @b
692
 
693
@item What about stack overflow/underflow?
694
GDB should be able to query the target to discover its stack size.
695
Given that information, GDB can determine at translation time whether a
696
given expression will overflow the stack.  But this spec isn't about
697
what kinds of error-checking GDB ought to do.
698
 
699
@item Why are you doing everything in LONGEST?
700
 
701
Speed isn't important, but agent code size is; using LONGEST brings in a
702
bunch of support code to do things like division, etc.  So this is a
703
serious concern.
704
 
705
First, note that you don't need different bytecodes for different
706
operand sizes.  You can generate code without @emph{knowing} how big the
707
stack elements actually are on the target.  If the target only supports
708
32-bit ints, and you don't send any 64-bit bytecodes, everything just
709
works.  The observation here is that the MIPS and the Alpha have only
710
fixed-size registers, and you can still get C's semantics even though
711
most instructions only operate on full-sized words.  You just need to
712
make sure everything is properly sign-extended at the right times.  So
713
there is no need for 32- and 64-bit variants of the bytecodes.  Just
714
implement everything using the largest size you support.
715
 
716
GDB should certainly check to see what sizes the target supports, so the
717
user can get an error earlier, rather than later.  But this information
718
is not necessary for correctness.
719
 
720
 
721
@item Why don't you have @code{>} or @code{<=} operators?
722
I want to keep the interpreter small, and we don't need them.  We can
723
combine the @code{less_} opcodes with @code{log_not}, and swap the order
724
of the operands, yielding all four asymmetrical comparison operators.
725
For example, @code{(x <= y)} is @code{! (x > y)}, which is @code{! (y <
726
x)}.
727
 
728
@item Why do you have @code{log_not}?
729
@itemx Why do you have @code{ext}?
730
@itemx Why do you have @code{zero_ext}?
731
These are all easily synthesized from other instructions, but I expect
732
them to be used frequently, and they're simple, so I include them to
733
keep bytecode strings short.
734
 
735
@code{log_not} is equivalent to @code{const8 0 equal}; it's used in half
736
the relational operators.
737
 
738
@code{ext @var{n}} is equivalent to @code{const8 @var{s-n} lsh const8
739
@var{s-n} rsh_signed}, where @var{s} is the size of the stack elements;
740
it follows @code{ref@var{m}} and @var{reg} bytecodes when the value
741
should be signed.  See the next bulleted item.
742
 
743
@code{zero_ext @var{n}} is equivalent to @code{const@var{m} @var{mask}
744
log_and}; it's used whenever we push the value of a register, because we
745
can't assume the upper bits of the register aren't garbage.
746
 
747
@item Why not have sign-extending variants of the @code{ref} operators?
748
Because that would double the number of @code{ref} operators, and we
749
need the @code{ext} bytecode anyway for accessing bitfields.
750
 
751
@item Why not have constant-address variants of the @code{ref} operators?
752
Because that would double the number of @code{ref} operators again, and
753
@code{const32 @var{address} ref32} is only one byte longer.
754
 
755
@item Why do the @code{ref@var{n}} operators have to support unaligned fetches?
756
GDB will generate bytecode that fetches multi-byte values at unaligned
757
addresses whenever the executable's debugging information tells it to.
758
Furthermore, GDB does not know the value the pointer will have when GDB
759
generates the bytecode, so it cannot determine whether a particular
760
fetch will be aligned or not.
761
 
762
In particular, structure bitfields may be several bytes long, but follow
763
no alignment rules; members of packed structures are not necessarily
764
aligned either.
765
 
766
In general, there are many cases where unaligned references occur in
767
correct C code, either at the programmer's explicit request, or at the
768
compiler's discretion.  Thus, it is simpler to make the GDB agent
769
bytecodes work correctly in all circumstances than to make GDB guess in
770
each case whether the compiler did the usual thing.
771
 
772
@item Why are there no side-effecting operators?
773
Because our current client doesn't want them?  That's a cheap answer.  I
774
think the real answer is that I'm afraid of implementing function
775
calls.  We should re-visit this issue after the present contract is
776
delivered.
777
 
778
@item Why aren't the @code{goto} ops PC-relative?
779
The interpreter has the base address around anyway for PC bounds
780
checking, and it seemed simpler.
781
 
782
@item Why is there only one offset size for the @code{goto} ops?
783
Offsets are currently sixteen bits.  I'm not happy with this situation
784
either:
785
 
786
Suppose we have multiple branch ops with different offset sizes.  As I
787
generate code left-to-right, all my jumps are forward jumps (there are
788
no loops in expressions), so I never know the target when I emit the
789
jump opcode.  Thus, I have to either always assume the largest offset
790
size, or do jump relaxation on the code after I generate it, which seems
791
like a big waste of time.
792
 
793
I can imagine a reasonable expression being longer than 256 bytes.  I
794
can't imagine one being longer than 64k.  Thus, we need 16-bit offsets.
795
This kind of reasoning is so bogus, but relaxation is pathetic.
796
 
797
The other approach would be to generate code right-to-left.  Then I'd
798
always know my offset size.  That might be fun.
799
 
800
@item Where is the function call bytecode?
801
 
802
When we add side-effects, we should add this.
803
 
804
@item Why does the @code{reg} bytecode take a 16-bit register number?
805
 
806
Intel's IA-64 architecture has 128 general-purpose registers,
807
and 128 floating-point registers, and I'm sure it has some random
808
control registers.
809
 
810
@item Why do we need @code{trace} and @code{trace_quick}?
811
Because GDB needs to record all the memory contents and registers an
812
expression touches.  If the user wants to evaluate an expression
813
@code{x->y->z}, the agent must record the values of @code{x} and
814
@code{x->y} as well as the value of @code{x->y->z}.
815
 
816
@item Don't the @code{trace} bytecodes make the interpreter less general?
817
They do mean that the interpreter contains special-purpose code, but
818
that doesn't mean the interpreter can only be used for that purpose.  If
819
an expression doesn't use the @code{trace} bytecodes, they don't get in
820
its way.
821
 
822
@item Why doesn't @code{trace_quick} consume its arguments the way everything else does?
823
In general, you do want your operators to consume their arguments; it's
824
consistent, and generally reduces the amount of stack rearrangement
825
necessary.  However, @code{trace_quick} is a kludge to save space; it
826
only exists so we needn't write @code{dup const8 @var{SIZE} trace}
827
before every memory reference.  Therefore, it's okay for it not to
828
consume its arguments; it's meant for a specific context in which we
829
know exactly what it should do with the stack.  If we're going to have a
830
kludge, it should be an effective kludge.
831
 
832
@item Why does @code{trace16} exist?
833
That opcode was added by the customer that contracted Cygnus for the
834
data tracing work.  I personally think it is unnecessary; objects that
835
large will be quite rare, so it is okay to use @code{dup const16
836
@var{size} trace} in those cases.
837
 
838
Whatever we decide to do with @code{trace16}, we should at least leave
839
opcode 0x30 reserved, to remain compatible with the customer who added
840
it.
841
 
842
@end table

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.