* NEWS: Mention "info auto-load-scripts".
[deliverable/binutils-gdb.git] / gdb / doc / agentexpr.texi
CommitLineData
f418dd93 1@c \input texinfo
c906108c 2@c %**start of header
f418dd93
DJ
3@c @setfilename agentexpr.info
4@c @settitle GDB Agent Expressions
5@c @setchapternewpage off
c906108c
SS
6@c %**end of header
7
16d1a084
DJ
8@c This file is part of the GDB manual.
9@c
44944448
JB
10@c Copyright (C) 2003, 2004, 2005, 2006, 2009, 2010, 2011
11@c Free Software Foundation, Inc.
16d1a084
DJ
12@c
13@c See the file gdb.texinfo for copying conditions.
14
f418dd93
DJ
15@node Agent Expressions
16@appendix The GDB Agent Expression Mechanism
c906108c 17
d3e8051b 18In some applications, it is not feasible for the debugger to interrupt
c906108c
SS
19the program's execution long enough for the developer to learn anything
20helpful about its behavior. If the program's correctness depends on its
21real-time behavior, delays introduced by a debugger might cause the
22program to fail, even when the code itself is correct. It is useful to
23be able to observe the program's behavior without interrupting it.
24
25Using GDB's @code{trace} and @code{collect} commands, the user can
26specify locations in the program, and arbitrary expressions to evaluate
27when those locations are reached. Later, using the @code{tfind}
28command, she can examine the values those expressions had when the
29program hit the trace points. The expressions may also denote objects
30in memory --- structures or arrays, for example --- whose values GDB
31should record; while visiting a particular tracepoint, the user may
32inspect those objects as if they were in memory at that moment.
33However, because GDB records these values without interacting with the
34user, it can do so quickly and unobtrusively, hopefully not disturbing
35the program's behavior.
36
37When GDB is debugging a remote target, the GDB @dfn{agent} code running
38on the target computes the values of the expressions itself. To avoid
39having a full symbolic expression evaluator on the agent, GDB translates
40expressions in the source language into a simpler bytecode language, and
41then sends the bytecode to the agent; the agent then executes the
42bytecode, and records the values for GDB to retrieve later.
43
44The bytecode language is simple; there are forty-odd opcodes, the bulk
45of which are the usual vocabulary of C operands (addition, subtraction,
46shifts, and so on) and various sizes of literals and memory reference
47operations. The bytecode interpreter operates strictly on machine-level
48values --- various sizes of integers and floating point numbers --- and
49requires no information about types or symbols; thus, the interpreter's
50internal data structures are simple, and each bytecode requires only a
51few native machine instructions to implement it. The interpreter is
52small, and strict limits on the memory and time required to evaluate an
53expression are easy to determine, making it suitable for use by the
54debugging agent in real-time applications.
55
56@menu
57* General Bytecode Design:: Overview of the interpreter.
58* Bytecode Descriptions:: What each one does.
59* Using Agent Expressions:: How agent expressions fit into the big picture.
60* Varying Target Capabilities:: How to discover what the target can do.
c906108c
SS
61* Rationale:: Why we did it this way.
62@end menu
63
64
65@c @node Rationale
66@c @section Rationale
67
68
69@node General Bytecode Design
70@section General Bytecode Design
71
72The agent represents bytecode expressions as an array of bytes. Each
73instruction is one byte long (thus the term @dfn{bytecode}). Some
74instructions are followed by operand bytes; for example, the @code{goto}
75instruction is followed by a destination for the jump.
76
77The bytecode interpreter is a stack-based machine; most instructions pop
78their operands off the stack, perform some operation, and push the
79result back on the stack for the next instruction to consume. Each
80element of the stack may contain either a integer or a floating point
81value; these values are as many bits wide as the largest integer that
82can be directly manipulated in the source language. Stack elements
83carry no record of their type; bytecode could push a value as an
84integer, then pop it as a floating point value. However, GDB will not
85generate code which does this. In C, one might define the type of a
86stack element as follows:
87@example
88union agent_val @{
89 LONGEST l;
90 DOUBLEST d;
91@};
92@end example
93@noindent
94where @code{LONGEST} and @code{DOUBLEST} are @code{typedef} names for
95the largest integer and floating point types on the machine.
96
97By the time the bytecode interpreter reaches the end of the expression,
98the value of the expression should be the only value left on the stack.
99For tracing applications, @code{trace} bytecodes in the expression will
100have recorded the necessary data, and the value on the stack may be
101discarded. For other applications, like conditional breakpoints, the
102value may be useful.
103
104Separate from the stack, the interpreter has two registers:
105@table @code
106@item pc
107The address of the next bytecode to execute.
108
109@item start
110The address of the start of the bytecode expression, necessary for
111interpreting the @code{goto} and @code{if_goto} instructions.
112
113@end table
114@noindent
115Neither of these registers is directly visible to the bytecode language
116itself, but they are useful for defining the meanings of the bytecode
117operations.
118
119There are no instructions to perform side effects on the running
120program, or call the program's functions; we assume that these
121expressions are only used for unobtrusive debugging, not for patching
122the running code.
123
124Most bytecode instructions do not distinguish between the various sizes
125of values, and operate on full-width values; the upper bits of the
126values are simply ignored, since they do not usually make a difference
127to the value computed. The exceptions to this rule are:
128@table @asis
129
130@item memory reference instructions (@code{ref}@var{n})
131There are distinct instructions to fetch different word sizes from
132memory. Once on the stack, however, the values are treated as full-size
133integers. They may need to be sign-extended; the @code{ext} instruction
134exists for this purpose.
135
136@item the sign-extension instruction (@code{ext} @var{n})
137These clearly need to know which portion of their operand is to be
138extended to occupy the full length of the word.
139
140@end table
141
142If the interpreter is unable to evaluate an expression completely for
143some reason (a memory location is inaccessible, or a divisor is zero,
144for example), we say that interpretation ``terminates with an error''.
145This means that the problem is reported back to the interpreter's caller
146in some helpful way. In general, code using agent expressions should
147assume that they may attempt to divide by zero, fetch arbitrary memory
148locations, and misbehave in other ways.
149
150Even complicated C expressions compile to a few bytecode instructions;
151for example, the expression @code{x + y * z} would typically produce
152code like the following, assuming that @code{x} and @code{y} live in
153registers, and @code{z} is a global variable holding a 32-bit
154@code{int}:
155@example
156reg 1
157reg 2
158const32 @i{address of z}
159ref32
160ext 32
161mul
162add
163end
164@end example
165
166In detail, these mean:
167@table @code
168
169@item reg 1
170Push the value of register 1 (presumably holding @code{x}) onto the
171stack.
172
173@item reg 2
174Push the value of register 2 (holding @code{y}).
175
176@item const32 @i{address of z}
177Push the address of @code{z} onto the stack.
178
179@item ref32
180Fetch a 32-bit word from the address at the top of the stack; replace
181the address on the stack with the value. Thus, we replace the address
182of @code{z} with @code{z}'s value.
183
184@item ext 32
185Sign-extend the value on the top of the stack from 32 bits to full
186length. This is necessary because @code{z} is a signed integer.
187
188@item mul
189Pop the top two numbers on the stack, multiply them, and push their
190product. Now the top of the stack contains the value of the expression
191@code{y * z}.
192
193@item add
194Pop the top two numbers, add them, and push the sum. Now the top of the
195stack contains the value of @code{x + y * z}.
196
197@item end
198Stop executing; the value left on the stack top is the value to be
199recorded.
200
201@end table
202
203
204@node Bytecode Descriptions
205@section Bytecode Descriptions
206
207Each bytecode description has the following form:
208
209@table @asis
210
211@item @code{add} (0x02): @var{a} @var{b} @result{} @var{a+b}
212
213Pop the top two stack items, @var{a} and @var{b}, as integers; push
214their sum, as an integer.
215
216@end table
217
218In this example, @code{add} is the name of the bytecode, and
219@code{(0x02)} is the one-byte value used to encode the bytecode, in
d3e8051b 220hexadecimal. The phrase ``@var{a} @var{b} @result{} @var{a+b}'' shows
c906108c
SS
221the stack before and after the bytecode executes. Beforehand, the stack
222must contain at least two values, @var{a} and @var{b}; since the top of
223the stack is to the right, @var{b} is on the top of the stack, and
224@var{a} is underneath it. After execution, the bytecode will have
225popped @var{a} and @var{b} from the stack, and replaced them with a
226single value, @var{a+b}. There may be other values on the stack below
227those shown, but the bytecode affects only those shown.
228
229Here is another example:
230
231@table @asis
232
233@item @code{const8} (0x22) @var{n}: @result{} @var{n}
234Push the 8-bit integer constant @var{n} on the stack, without sign
235extension.
236
237@end table
238
239In this example, the bytecode @code{const8} takes an operand @var{n}
240directly from the bytecode stream; the operand follows the @code{const8}
241bytecode itself. We write any such operands immediately after the name
242of the bytecode, before the colon, and describe the exact encoding of
243the operand in the bytecode stream in the body of the bytecode
244description.
245
246For the @code{const8} bytecode, there are no stack items given before
247the @result{}; this simply means that the bytecode consumes no values
248from the stack. If a bytecode consumes no values, or produces no
249values, the list on either side of the @result{} may be empty.
250
251If a value is written as @var{a}, @var{b}, or @var{n}, then the bytecode
252treats it as an integer. If a value is written is @var{addr}, then the
253bytecode treats it as an address.
254
255We do not fully describe the floating point operations here; although
256this design can be extended in a clean way to handle floating point
257values, they are not of immediate interest to the customer, so we avoid
258describing them, to save time.
259
260
261@table @asis
262
263@item @code{float} (0x01): @result{}
264
265Prefix for floating-point bytecodes. Not implemented yet.
266
267@item @code{add} (0x02): @var{a} @var{b} @result{} @var{a+b}
268Pop two integers from the stack, and push their sum, as an integer.
269
270@item @code{sub} (0x03): @var{a} @var{b} @result{} @var{a-b}
271Pop two integers from the stack, subtract the top value from the
272next-to-top value, and push the difference.
273
274@item @code{mul} (0x04): @var{a} @var{b} @result{} @var{a*b}
275Pop two integers from the stack, multiply them, and push the product on
276the stack. Note that, when one multiplies two @var{n}-bit numbers
277yielding another @var{n}-bit number, it is irrelevant whether the
278numbers are signed or not; the results are the same.
279
280@item @code{div_signed} (0x05): @var{a} @var{b} @result{} @var{a/b}
281Pop two signed integers from the stack; divide the next-to-top value by
282the top value, and push the quotient. If the divisor is zero, terminate
283with an error.
284
285@item @code{div_unsigned} (0x06): @var{a} @var{b} @result{} @var{a/b}
286Pop two unsigned integers from the stack; divide the next-to-top value
287by the top value, and push the quotient. If the divisor is zero,
288terminate with an error.
289
290@item @code{rem_signed} (0x07): @var{a} @var{b} @result{} @var{a modulo b}
291Pop two signed integers from the stack; divide the next-to-top value by
292the top value, and push the remainder. If the divisor is zero,
293terminate with an error.
294
295@item @code{rem_unsigned} (0x08): @var{a} @var{b} @result{} @var{a modulo b}
296Pop two unsigned integers from the stack; divide the next-to-top value
297by the top value, and push the remainder. If the divisor is zero,
298terminate with an error.
299
300@item @code{lsh} (0x09): @var{a} @var{b} @result{} @var{a<<b}
301Pop two integers from the stack; let @var{a} be the next-to-top value,
302and @var{b} be the top value. Shift @var{a} left by @var{b} bits, and
303push the result.
304
f418dd93 305@item @code{rsh_signed} (0x0a): @var{a} @var{b} @result{} @code{(signed)}@var{a>>b}
c906108c
SS
306Pop two integers from the stack; let @var{a} be the next-to-top value,
307and @var{b} be the top value. Shift @var{a} right by @var{b} bits,
308inserting copies of the top bit at the high end, and push the result.
309
310@item @code{rsh_unsigned} (0x0b): @var{a} @var{b} @result{} @var{a>>b}
311Pop two integers from the stack; let @var{a} be the next-to-top value,
312and @var{b} be the top value. Shift @var{a} right by @var{b} bits,
313inserting zero bits at the high end, and push the result.
314
315@item @code{log_not} (0x0e): @var{a} @result{} @var{!a}
316Pop an integer from the stack; if it is zero, push the value one;
317otherwise, push the value zero.
318
319@item @code{bit_and} (0x0f): @var{a} @var{b} @result{} @var{a&b}
320Pop two integers from the stack, and push their bitwise @code{and}.
321
322@item @code{bit_or} (0x10): @var{a} @var{b} @result{} @var{a|b}
323Pop two integers from the stack, and push their bitwise @code{or}.
324
325@item @code{bit_xor} (0x11): @var{a} @var{b} @result{} @var{a^b}
326Pop two integers from the stack, and push their bitwise
327exclusive-@code{or}.
328
329@item @code{bit_not} (0x12): @var{a} @result{} @var{~a}
330Pop an integer from the stack, and push its bitwise complement.
331
332@item @code{equal} (0x13): @var{a} @var{b} @result{} @var{a=b}
333Pop two integers from the stack; if they are equal, push the value one;
334otherwise, push the value zero.
335
336@item @code{less_signed} (0x14): @var{a} @var{b} @result{} @var{a<b}
337Pop two signed integers from the stack; if the next-to-top value is less
338than the top value, push the value one; otherwise, push the value zero.
339
340@item @code{less_unsigned} (0x15): @var{a} @var{b} @result{} @var{a<b}
341Pop two unsigned integers from the stack; if the next-to-top value is less
342than the top value, push the value one; otherwise, push the value zero.
343
344@item @code{ext} (0x16) @var{n}: @var{a} @result{} @var{a}, sign-extended from @var{n} bits
345Pop an unsigned value from the stack; treating it as an @var{n}-bit
346twos-complement value, extend it to full length. This means that all
347bits to the left of bit @var{n-1} (where the least significant bit is bit
3480) are set to the value of bit @var{n-1}. Note that @var{n} may be
349larger than or equal to the width of the stack elements of the bytecode
350engine; in this case, the bytecode should have no effect.
351
352The number of source bits to preserve, @var{n}, is encoded as a single
353byte unsigned integer following the @code{ext} bytecode.
354
355@item @code{zero_ext} (0x2a) @var{n}: @var{a} @result{} @var{a}, zero-extended from @var{n} bits
356Pop an unsigned value from the stack; zero all but the bottom @var{n}
357bits. This means that all bits to the left of bit @var{n-1} (where the
358least significant bit is bit 0) are set to the value of bit @var{n-1}.
359
360The number of source bits to preserve, @var{n}, is encoded as a single
361byte unsigned integer following the @code{zero_ext} bytecode.
362
363@item @code{ref8} (0x17): @var{addr} @result{} @var{a}
364@itemx @code{ref16} (0x18): @var{addr} @result{} @var{a}
365@itemx @code{ref32} (0x19): @var{addr} @result{} @var{a}
366@itemx @code{ref64} (0x1a): @var{addr} @result{} @var{a}
367Pop an address @var{addr} from the stack. For bytecode
368@code{ref}@var{n}, fetch an @var{n}-bit value from @var{addr}, using the
369natural target endianness. Push the fetched value as an unsigned
370integer.
371
372Note that @var{addr} may not be aligned in any particular way; the
373@code{ref@var{n}} bytecodes should operate correctly for any address.
374
375If attempting to access memory at @var{addr} would cause a processor
376exception of some sort, terminate with an error.
377
378@item @code{ref_float} (0x1b): @var{addr} @result{} @var{d}
379@itemx @code{ref_double} (0x1c): @var{addr} @result{} @var{d}
380@itemx @code{ref_long_double} (0x1d): @var{addr} @result{} @var{d}
381@itemx @code{l_to_d} (0x1e): @var{a} @result{} @var{d}
382@itemx @code{d_to_l} (0x1f): @var{d} @result{} @var{a}
383Not implemented yet.
384
385@item @code{dup} (0x28): @var{a} => @var{a} @var{a}
386Push another copy of the stack's top element.
387
388@item @code{swap} (0x2b): @var{a} @var{b} => @var{b} @var{a}
389Exchange the top two items on the stack.
390
391@item @code{pop} (0x29): @var{a} =>
392Discard the top value on the stack.
393
c7f96d2b
TT
394@item @code{pick} (0x32) @var{n}: @var{a} @dots{} @var{b} => @var{a} @dots{} @var{b} @var{a}
395Duplicate an item from the stack and push it on the top of the stack.
396@var{n}, a single byte, indicates the stack item to copy. If @var{n}
397is zero, this is the same as @code{dup}; if @var{n} is one, it copies
398the item under the top item, etc. If @var{n} exceeds the number of
399items on the stack, terminate with an error.
400
401@item @code{rot} (0x33): @var{a} @var{b} @var{c} => @var{c} @var{b} @var{a}
402Rotate the top three items on the stack.
403
c906108c
SS
404@item @code{if_goto} (0x20) @var{offset}: @var{a} @result{}
405Pop an integer off the stack; if it is non-zero, branch to the given
406offset in the bytecode string. Otherwise, continue to the next
407instruction in the bytecode stream. In other words, if @var{a} is
408non-zero, set the @code{pc} register to @code{start} + @var{offset}.
409Thus, an offset of zero denotes the beginning of the expression.
410
411The @var{offset} is stored as a sixteen-bit unsigned value, stored
412immediately following the @code{if_goto} bytecode. It is always stored
f821f325 413most significant byte first, regardless of the target's normal
c906108c
SS
414endianness. The offset is not guaranteed to fall at any particular
415alignment within the bytecode stream; thus, on machines where fetching a
41616-bit on an unaligned address raises an exception, you should fetch the
417offset one byte at a time.
418
419@item @code{goto} (0x21) @var{offset}: @result{}
420Branch unconditionally to @var{offset}; in other words, set the
421@code{pc} register to @code{start} + @var{offset}.
422
423The offset is stored in the same way as for the @code{if_goto} bytecode.
424
425@item @code{const8} (0x22) @var{n}: @result{} @var{n}
426@itemx @code{const16} (0x23) @var{n}: @result{} @var{n}
427@itemx @code{const32} (0x24) @var{n}: @result{} @var{n}
428@itemx @code{const64} (0x25) @var{n}: @result{} @var{n}
429Push the integer constant @var{n} on the stack, without sign extension.
430To produce a small negative value, push a small twos-complement value,
431and then sign-extend it using the @code{ext} bytecode.
432
433The constant @var{n} is stored in the appropriate number of bytes
434following the @code{const}@var{b} bytecode. The constant @var{n} is
435always stored most significant byte first, regardless of the target's
436normal endianness. The constant is not guaranteed to fall at any
437particular alignment within the bytecode stream; thus, on machines where
438fetching a 16-bit on an unaligned address raises an exception, you
439should fetch @var{n} one byte at a time.
440
441@item @code{reg} (0x26) @var{n}: @result{} @var{a}
442Push the value of register number @var{n}, without sign extension. The
443registers are numbered following GDB's conventions.
444
445The register number @var{n} is encoded as a 16-bit unsigned integer
446immediately following the @code{reg} bytecode. It is always stored most
f821f325 447significant byte first, regardless of the target's normal endianness.
c906108c
SS
448The register number is not guaranteed to fall at any particular
449alignment within the bytecode stream; thus, on machines where fetching a
45016-bit on an unaligned address raises an exception, you should fetch the
451register number one byte at a time.
452
f61e138d
SS
453@item @code{getv} (0x2c) @var{n}: @result{} @var{v}
454Push the value of trace state variable number @var{n}, without sign
455extension.
456
457The variable number @var{n} is encoded as a 16-bit unsigned integer
458immediately following the @code{getv} bytecode. It is always stored most
459significant byte first, regardless of the target's normal endianness.
460The variable number is not guaranteed to fall at any particular
461alignment within the bytecode stream; thus, on machines where fetching a
46216-bit on an unaligned address raises an exception, you should fetch the
463register number one byte at a time.
464
465@item @code{setv} (0x2d) @var{n}: @result{} @var{v}
466Set trace state variable number @var{n} to the value found on the top
467of the stack. The stack is unchanged, so that the value is readily
468available if the assignment is part of a larger expression. The
469handling of @var{n} is as described for @code{getv}.
470
c906108c
SS
471@item @code{trace} (0x0c): @var{addr} @var{size} @result{}
472Record the contents of the @var{size} bytes at @var{addr} in a trace
473buffer, for later retrieval by GDB.
474
475@item @code{trace_quick} (0x0d) @var{size}: @var{addr} @result{} @var{addr}
476Record the contents of the @var{size} bytes at @var{addr} in a trace
477buffer, for later retrieval by GDB. @var{size} is a single byte
478unsigned integer following the @code{trace} opcode.
479
480This bytecode is equivalent to the sequence @code{dup const8 @var{size}
481trace}, but we provide it anyway to save space in bytecode strings.
482
483@item @code{trace16} (0x30) @var{size}: @var{addr} @result{} @var{addr}
484Identical to trace_quick, except that @var{size} is a 16-bit big-endian
485unsigned integer, not a single byte. This should probably have been
486named @code{trace_quick16}, for consistency.
487
f61e138d
SS
488@item @code{tracev} (0x2e) @var{n}: @result{} @var{a}
489Record the value of trace state variable number @var{n} in the trace
490buffer. The handling of @var{n} is as described for @code{getv}.
491
c906108c
SS
492@item @code{end} (0x27): @result{}
493Stop executing bytecode; the result should be the top element of the
494stack. If the purpose of the expression was to compute an lvalue or a
495range of memory, then the next-to-top of the stack is the lvalue's
496address, and the top of the stack is the lvalue's size, in bytes.
497
498@end table
499
500
501@node Using Agent Expressions
502@section Using Agent Expressions
503
782b2b07
SS
504Agent expressions can be used in several different ways by @value{GDBN},
505and the debugger can generate different bytecode sequences as appropriate.
506
507One possibility is to do expression evaluation on the target rather
508than the host, such as for the conditional of a conditional
509tracepoint. In such a case, @value{GDBN} compiles the source
510expression into a bytecode sequence that simply gets values from
511registers or memory, does arithmetic, and returns a result.
512
513Another way to use agent expressions is for tracepoint data
514collection. @value{GDBN} generates a different bytecode sequence for
515collection; in addition to bytecodes that do the calculation,
516@value{GDBN} adds @code{trace} bytecodes to save the pieces of
517memory that were used.
c906108c
SS
518
519@itemize @bullet
520
521@item
522The user selects trace points in the program's code at which GDB should
523collect data.
524
525@item
526The user specifies expressions to evaluate at each trace point. These
527expressions may denote objects in memory, in which case those objects'
528contents are recorded as the program runs, or computed values, in which
529case the values themselves are recorded.
530
531@item
532GDB transmits the tracepoints and their associated expressions to the
533GDB agent, running on the debugging target.
534
535@item
a5832c8f 536The agent arranges to be notified when a trace point is hit.
c906108c
SS
537
538@item
539When execution on the target reaches a trace point, the agent evaluates
540the expressions associated with that trace point, and records the
541resulting values and memory ranges.
542
543@item
544Later, when the user selects a given trace event and inspects the
545objects and expression values recorded, GDB talks to the agent to
546retrieve recorded data as necessary to meet the user's requests. If the
547user asks to see an object whose contents have not been recorded, GDB
548reports an error.
549
550@end itemize
551
552
553@node Varying Target Capabilities
554@section Varying Target Capabilities
555
556Some targets don't support floating-point, and some would rather not
557have to deal with @code{long long} operations. Also, different targets
558will have different stack sizes, and different bytecode buffer lengths.
559
560Thus, GDB needs a way to ask the target about itself. We haven't worked
561out the details yet, but in general, GDB should be able to send the
562target a packet asking it to describe itself. The reply should be a
563packet whose length is explicit, so we can add new information to the
564packet in future revisions of the agent, without confusing old versions
565of GDB, and it should contain a version number. It should contain at
566least the following information:
567
568@itemize @bullet
569
570@item
571whether floating point is supported
572
573@item
574whether @code{long long} is supported
575
576@item
577maximum acceptable size of bytecode stack
578
579@item
580maximum acceptable length of bytecode expressions
581
582@item
583which registers are actually available for collection
584
585@item
586whether the target supports disabled tracepoints
587
588@end itemize
589
c906108c
SS
590@node Rationale
591@section Rationale
592
593Some of the design decisions apparent above are arguable.
594
595@table @b
596
597@item What about stack overflow/underflow?
598GDB should be able to query the target to discover its stack size.
599Given that information, GDB can determine at translation time whether a
600given expression will overflow the stack. But this spec isn't about
601what kinds of error-checking GDB ought to do.
602
603@item Why are you doing everything in LONGEST?
604
605Speed isn't important, but agent code size is; using LONGEST brings in a
606bunch of support code to do things like division, etc. So this is a
607serious concern.
608
609First, note that you don't need different bytecodes for different
610operand sizes. You can generate code without @emph{knowing} how big the
611stack elements actually are on the target. If the target only supports
61232-bit ints, and you don't send any 64-bit bytecodes, everything just
613works. The observation here is that the MIPS and the Alpha have only
614fixed-size registers, and you can still get C's semantics even though
615most instructions only operate on full-sized words. You just need to
616make sure everything is properly sign-extended at the right times. So
617there is no need for 32- and 64-bit variants of the bytecodes. Just
618implement everything using the largest size you support.
619
620GDB should certainly check to see what sizes the target supports, so the
621user can get an error earlier, rather than later. But this information
622is not necessary for correctness.
623
624
625@item Why don't you have @code{>} or @code{<=} operators?
626I want to keep the interpreter small, and we don't need them. We can
627combine the @code{less_} opcodes with @code{log_not}, and swap the order
628of the operands, yielding all four asymmetrical comparison operators.
629For example, @code{(x <= y)} is @code{! (x > y)}, which is @code{! (y <
630x)}.
631
632@item Why do you have @code{log_not}?
633@itemx Why do you have @code{ext}?
634@itemx Why do you have @code{zero_ext}?
635These are all easily synthesized from other instructions, but I expect
636them to be used frequently, and they're simple, so I include them to
637keep bytecode strings short.
638
639@code{log_not} is equivalent to @code{const8 0 equal}; it's used in half
640the relational operators.
641
642@code{ext @var{n}} is equivalent to @code{const8 @var{s-n} lsh const8
643@var{s-n} rsh_signed}, where @var{s} is the size of the stack elements;
644it follows @code{ref@var{m}} and @var{reg} bytecodes when the value
645should be signed. See the next bulleted item.
646
647@code{zero_ext @var{n}} is equivalent to @code{const@var{m} @var{mask}
648log_and}; it's used whenever we push the value of a register, because we
649can't assume the upper bits of the register aren't garbage.
650
651@item Why not have sign-extending variants of the @code{ref} operators?
652Because that would double the number of @code{ref} operators, and we
653need the @code{ext} bytecode anyway for accessing bitfields.
654
655@item Why not have constant-address variants of the @code{ref} operators?
656Because that would double the number of @code{ref} operators again, and
657@code{const32 @var{address} ref32} is only one byte longer.
658
659@item Why do the @code{ref@var{n}} operators have to support unaligned fetches?
660GDB will generate bytecode that fetches multi-byte values at unaligned
661addresses whenever the executable's debugging information tells it to.
662Furthermore, GDB does not know the value the pointer will have when GDB
663generates the bytecode, so it cannot determine whether a particular
664fetch will be aligned or not.
665
666In particular, structure bitfields may be several bytes long, but follow
667no alignment rules; members of packed structures are not necessarily
668aligned either.
669
670In general, there are many cases where unaligned references occur in
671correct C code, either at the programmer's explicit request, or at the
672compiler's discretion. Thus, it is simpler to make the GDB agent
673bytecodes work correctly in all circumstances than to make GDB guess in
674each case whether the compiler did the usual thing.
675
676@item Why are there no side-effecting operators?
677Because our current client doesn't want them? That's a cheap answer. I
678think the real answer is that I'm afraid of implementing function
679calls. We should re-visit this issue after the present contract is
680delivered.
681
682@item Why aren't the @code{goto} ops PC-relative?
683The interpreter has the base address around anyway for PC bounds
684checking, and it seemed simpler.
685
686@item Why is there only one offset size for the @code{goto} ops?
687Offsets are currently sixteen bits. I'm not happy with this situation
688either:
689
690Suppose we have multiple branch ops with different offset sizes. As I
691generate code left-to-right, all my jumps are forward jumps (there are
692no loops in expressions), so I never know the target when I emit the
693jump opcode. Thus, I have to either always assume the largest offset
694size, or do jump relaxation on the code after I generate it, which seems
695like a big waste of time.
696
697I can imagine a reasonable expression being longer than 256 bytes. I
698can't imagine one being longer than 64k. Thus, we need 16-bit offsets.
699This kind of reasoning is so bogus, but relaxation is pathetic.
700
701The other approach would be to generate code right-to-left. Then I'd
702always know my offset size. That might be fun.
703
704@item Where is the function call bytecode?
705
706When we add side-effects, we should add this.
707
708@item Why does the @code{reg} bytecode take a 16-bit register number?
709
5e35df8e 710Intel's IA-64 architecture has 128 general-purpose registers,
c906108c
SS
711and 128 floating-point registers, and I'm sure it has some random
712control registers.
713
714@item Why do we need @code{trace} and @code{trace_quick}?
715Because GDB needs to record all the memory contents and registers an
716expression touches. If the user wants to evaluate an expression
717@code{x->y->z}, the agent must record the values of @code{x} and
718@code{x->y} as well as the value of @code{x->y->z}.
719
720@item Don't the @code{trace} bytecodes make the interpreter less general?
721They do mean that the interpreter contains special-purpose code, but
722that doesn't mean the interpreter can only be used for that purpose. If
723an expression doesn't use the @code{trace} bytecodes, they don't get in
724its way.
725
726@item Why doesn't @code{trace_quick} consume its arguments the way everything else does?
727In general, you do want your operators to consume their arguments; it's
728consistent, and generally reduces the amount of stack rearrangement
729necessary. However, @code{trace_quick} is a kludge to save space; it
730only exists so we needn't write @code{dup const8 @var{SIZE} trace}
731before every memory reference. Therefore, it's okay for it not to
732consume its arguments; it's meant for a specific context in which we
733know exactly what it should do with the stack. If we're going to have a
734kludge, it should be an effective kludge.
735
736@item Why does @code{trace16} exist?
737That opcode was added by the customer that contracted Cygnus for the
738data tracing work. I personally think it is unnecessary; objects that
739large will be quite rare, so it is okay to use @code{dup const16
740@var{size} trace} in those cases.
741
742Whatever we decide to do with @code{trace16}, we should at least leave
743opcode 0x30 reserved, to remain compatible with the customer who added
744it.
745
746@end table
This page took 0.805581 seconds and 4 git commands to generate.