Renesas H8/3297 Series Spezifikationen

Stöbern Sie online oder laden Sie Spezifikationen nach Nein Renesas H8/3297 Series herunter. Renesas H8/3297 Series Specifications Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Renesas H8/300

Bound-T time and stack analyserApplication NoteRenesas H8/300Issue 1TR-AN-H8300-001 2010-02-25Tidorum Ltd.Tidrum

Seite 2 - FI-00200 Helsinki

1.5 Typographic conventionsWe use the following fonts and styles to show the role of pieces of the text:Register The name of a H8/300 register embedde

Seite 3

2 USING BOUND-T FOR H8/3002.1 Input formatsExecutable fileThe target program executable file must be supplied in the standard GCC COFF format, or in t

Seite 4 - Contents

Some H8/300 devices require or allow further device-specific options which are listed in a separate table in section 2.3.Table 1: Command optionsOpt

Seite 5

OptionMeaning and default value-sym=fileFunctionLoads more symbol definitions from the named file, adding to the symbol tables read from the main exec

Seite 6 - Document change log

(X) for which the target program is intended. For example, the option -device=3292 chooses the H8/3292 device. Equivalent forms are -device=lego, or -

Seite 7 - 1 INTRODUCTION

2.4 S-Record file formatA target program in S-record formatBound-T for the H8/300 can read target programs in an S-record format, a common textual fil

Seite 8 - 1.3 References

2.5 H8/300-specific symbol-file formatThe generic -symbols optionBound-T has a generic option -symbols for naming additional symbol-definition

Seite 9

Bound-T chooses the calling protocol as follows, depending on the format of the target program executable file being analysed:• If t

Seite 10 - 1.5 Typographic conventions

3 WRITING ASSERTIONS3.1 OverviewIf you use Bound-T to analyse non-trivial programs you nearly always have to write assertions to control and guide the

Seite 11 - 2 USING BOUND-T FOR H8/300

To find out the linkage names in the target program, you can either dump the executable file (run Bound-T with just the executable file name as argume

Seite 12 - Bcc) instructions

Tidorum Ltdwww.tidorum.fiTiirasaarentie 32FI-00200 HelsinkiFinlandThis document was written at Tidorum Ltd. by Niklas Holsti.The document is currently

Seite 13

• Using the absolute address:subprogram address "14D4"• Using a positive hexadecimal offset relative to the entry point of Rerun:subprogram

Seite 14

variable address "pw2" 55;-- The parameter word that was pushed immediately before-- the JSR has the value 553.4 StacksCurrently Bound-T for

Seite 15 - 2.4 S-Record file format

4 THE H8/300 PROCESSOR AND TIMING ANALYSISThis chapter starts by describing the H8/300 processor. The focus is on how the H8/300 architecture and i

Seite 16 - 2.6 HRT analysis

Program Counter and Condition Code RegisterThe 16-bit Program Counter (PC) register points to the next instruction. Instructions are 16 or 32 bits in

Seite 17 - 2.8 Meaning of results

Memory areasThe H8/300 has three kinds of memory area:• On-Chip Memory. Most of this is usually ROM with a smaller part of RAM. An access takes 2 exec

Seite 18 - 3 WRITING ASSERTIONS

One instruction, SLEEP, can lead to an underestimated execution time because the duration of the "sleep mode" is not included in the WCET bo

Seite 19 - 3.3 Naming items by address

5 SUPPORTED H8/300 FEATURES5.1 OverviewThis chapter explains in detail how Bound-T models H8/300 instructions, registers and status flags. We will fir

Seite 20 - • Using the absolute address:

Table 7: Generic limitations of Bound-T Generic Limitation Remarks for H8/300 targetUnderstands only integer operations in loop-counter computations.N

Seite 21 - 3.6 Assertable properties

H8/300 instruction RemarksCMP.B #i, RnL followed by SUBX #j, RnH Modelled as the 16-bit operation CMP.W #j:i,Rn, an instruction that is not implemente

Seite 22

H8/300 instruction RemarksDAA, DAS, DIVXU Result is opaque.ROTL,ROTR, ROTXL, ROTXR, SHAL, SHAR, SHLL, SHLRResult is opaque.BAND, BIAND, BILD, BIST, BL

Seite 23

PrefaceThe information in this document is believed to be complete and accurate when the document is issued. However, Tidorum Ltd. reserves the right

Seite 24 - -device=X to tell

Combining 8-bit operations into 16-bit operationsWhen a processor only supports short arithmetic, such as 8 or 16 bits on the H

Seite 25

Stack dataOn the H8/300, a subprogram usually stores its local variables in the stack and accesses them using Register Indirect mode based on the Stac

Seite 26 - 5 SUPPORTED H8/300 FEATURES

This model is incomplete and rather ad-hoc. For example, in the real processor the instruction sequenceMOV.B #255, R3LADD.B R3L, R4Hhas exactly the sa

Seite 27 - 5.2 Support Synopsis

Instruction Z condition C conditionNEG RdRd = 0 Rd > 0NOTopaque−ORresult = 0−ORC #k, CCRZ or (bit 2 of k) C or (bit 2 of k)POP, PUSH result = 0−ROT

Seite 28 - -bcc. See section 5.5

Table 11: Condition codes in BccMnemonic BccMeaning Interpretation depending on the -bcc option-bcc=signed -bcc=unsignedBRA (BT) Always (True) True (b

Seite 29

Jump address tables and switch/case statementsWhen a switch/case statement has a dense (numerically consecutive) set of case labels the compiler often

Seite 30 - MOV R3,@R5

For example, for the chips in the H8/3297 series, the chip type defines the amount of internal memory: from 16 to 60 kilo-octets or ROM and from 0.5 t

Seite 31

Memory wait statesAccess to on-chip memory (ROM, RAM or register field) does not involve wait states, but off-chip memory access can force the process

Seite 32 - Z and C while the single

6 PROCEDURE CALLING PROTOCOLS6.1 Calls and returns in the H8/300In this chapter, we discuss how H8/300 programs use subprograms (procedures and functi

Seite 33

In the remaining sections of this chapter, we explain each supported calling protocol and how Bound-T interprets it. Note that a calling protocol usu

Seite 34 - 5.6 Dynamic jumps and calls

Contents1 INTRODUCTION 11.1 Purpose and scope...11.2 Overview

Seite 35 - 5.7 Memory configurations

Bound-T tracks the changes in SP and translates SP-relative addresses with varying offsets to addresses relative to the SP on entry (after the BSR or

Seite 36

7 WARNING AND ERROR MESSAGES7.1 Warning messagesThe following lists the Bound-T warning messages that are specific to the H8/300 or that have a speci

Seite 37

Warning Message Meaning and RemedyCOFF ".file" entry with no file-name.ReasonsThe COFF symbol table contains a primary entry of ".file&

Seite 38 - 6 PROCEDURE CALLING PROTOCOLS

Warning Message Meaning and RemedyMeaning of P not understood and thus ignoredReasons The assertion P on the value of the property bcc_signed allows m

Seite 39 - 6.2 The GNU calling protocol

Warning Message Meaning and RemedyActionIf you want to use symbolic names and/or source-code references, supply a COFF file with a symbol table. The u

Seite 40 - 6.3 The IAR calling protocol

Table 14: Error messagesError Message Meaning and RemedyAccess to reserved memory address A is assumed to reach external memoryProblem The target prog

Seite 41 - 7 WARNING AND ERROR MESSAGES

Error Message Meaning and RemedyAt most one S-record file allowed; it was "file1 ". The file "file2 " is rejected.ProblemThe comma

Seite 42 - PC bit). It may mean

Error Message Meaning and RemedySolutionIf this problem has some serious effects, obtain a correct COFF file in a form that Bound-T supports, or trans

Seite 43

Error Message Meaning and RemedyReasons1. The executable file may be invalid. It may be damaged or contain a program for another member of the Renesas

Seite 44 - 7.2 Error messages

Error Message Meaning and RemedyReasonsThe line is too long. Note that blanks and other white-space characters are included in the length.SolutionShor

Seite 45

TablesTable 1: Command options...

Seite 46

Error Message Meaning and RemedyS-record too long; at most N characters allowed.ProblemThe S-record file (the target program file, or a file named in

Seite 47

Error Message Meaning and RemedySolutionSee the error message "Invalid instruction".Unexpected end of COFF fileProblemThe COFF executable fi

Seite 48 - JMP @Rn that does not

Error Message Meaning and RemedyUnknown value for -mode: value Problem The value given for the command-line option -mode=value is not recognised.Reaso

Seite 49

Document change logIssue Section Changes1 All First issue.vi

Seite 50

1 INTRODUCTION1.1 Purpose and scopeBound-T is a tool for computing bounds on the worst-case execution time and stack usage of real-time programs; see

Seite 51

Stack usage analysisIn a similar way, Bound-T can analyse the machine code to find out where the stack pointer is changed and how much it is changed.

Seite 52 - Tidorum Ltd

Originally published by Hitachi Ltd.3rd edition, September 1997.[6] GCC, the GNU Compiler Collection.http://gcc.gnu.org/.[7] H8/300 IAR C Compiler Ref

Kommentare zu diesen Handbüchern

Keine Kommentare