
186
Evaluating and Programming the 29K RISC Family
Consider the following examples. If the FZ bit is cleared and trace enable (TE) is
set at the same time, the next instruction should cause a trace trap, but the PC buffer
registers frozen by the trap will not have had time to catch up with the current execu-
tion address. Within the trap code the processor will have appeared to have stopped at
some random address, held in PC1. If interrupts and traps are enabled at the same
time the FZ bit is cleared, then the next instruction could suffer an external interrupt
or an illegal instruction trap. Once again, the PC buffer register will not reflect the
true execution address. An interrupt return would cause execution to commence at a
random address. The above problems can be avoided by clearing FZ two cycles be-
fore enabling the processor to once again enter freeze mode.
3.5
TRACE–BACK TAGS
When the compiler generates the code for a procedure, it places a one or two
word tag before the first instruction of the procedure. The tag information is used by
debuggers to determine the sequence of procedure calls and the value of program
variables at a given point in program execution. The trace–back tag describes the
memory frame size and the number of local registers used by the associated proce-
dure. A one word tag is used unless the memory stack usage is greater than 2k words,
in which case a two–word tag is used. Figure 3-5 shows the format of the tag data.
Most of the tag data fields are self explanatory. The
M
bit–field is set if the the
procedure uses the memory stack. In such case,
msize
is the memory stack frame size
in double words. The
argcount
is the number of in–coming arguments in registers
plus two. The
T
bit–field, when set, indicates the routine is transparent (see section
3.7).
When procedures are built in assembly language rather than, say C, the pro-
grammer is responsible for building the appropriate tag data word[s] ahead of the first
instruction. For an example see section 2.3.5. Figure 3-6 shows an example register
stack history for three levels of procedure calls. In the example, the
current
procedure
is a small leaf procedure. Small leaves differ from large leaf procedures in that they
do not lower the register stack and allocate new local registers to the procedure.
Looking at the parent of the current procedure it can be seen the stack was low-
ered by six words (
rsize
) during the parent procedure prologue. The top of the activa-
tion record is identified by the procedure
lr1
register value. In principal the start of the
grandparent procedure activation record can be found by subtracting the
argcount
value from the address identified by the parent
lr1
. In this way the
rsize
for the parent
procedure can be determined; adding
rsize
to the parent’s
gr1
value enables the
grandparent
gr1
value to be obtained. Repeating the mechanism with the grandparent
lr1
value allows all previous activation records to be identified until the first proce-
dure call is found. The first procedure is identified by a tag value of zero, and is nor-
mally the
start
procedure in file
crt0.s
.