SlideShare a Scribd company logo
1 of 23
Download to read offline
The Stack
 Frame

An Ivaylo Marinkov presentation
        ivaylo@tsarstva.bg
Call Stack
A stack data structure storing
information of a computer program's
active subroutines.
Whilst important for the software's
proper functioning, its details are
usually hidden and usage is automated
in high-level programming languages.
Call Stack Purpose


Keeping record of the point to which
each active subroutine should return
control when finished.
Active Subroutine
A routine that has been called but
has not finished execution yet.
Afterwords, control should be
returned to the point where the call
has been made.
Routines may be nested to any level
and recursion is possibe – hence the
stack structure.
For example, the DrawSquare
subroutine calls the DrawLine
subroutine from four different
places. DrawLine must know where
to return once completed.
This is accomplished by pushing the
address following the call
instruction – the return address –
onto the stack with each call.
Call Stack Inner Workings
 The caller pushes the return address onto
 the stack (winding).
 The called subroutine, when it finishes,
 pops the return address off the stack and
 transfers control to it (unwinding).
 If a called subroutine calls on yet another
 subroutine, it will push another address
 onto the stack, and so on, with the
 information stacking up and unstacking as
 the program dictates.
Should pushing consume all the
space allocated for the call stack, an
error called stack overflow will
occur.
There is usually a single call stack
associated with each process thread.
However, the program may create
additional call stacks for tasks such as
signal-hadling or cooperative
multitasking.
Additional Call Stack Functions
Local data storage – keeping local-scope
variable values.
Parameter passing – storage for values
passed by calling code.
Evalution stack – in some cases
operands for logical and
arithmetic operations may be
stored in the call stack.
Current instance pointer –
for this pointer in
object-oriented languages.
Structure
       A call stack is
       composed of
       stack frames,
       machine and
       application banary
       interface-
       dependant data
       structures
       containing
       subroutine state
       information.
The Stack Frame

Generally speaking, a
procedure's stack frame contains
all the information necessary to
save and restore the state of the
procedure.
Strictly speaking, it is only necessary
for the calling program and the
called procedure to agree on the
structure of the stack frame for each
procedure call.
However, the specification of a
calling convention facilitates the use
of procedure libraries by defining
the structure of the stack frame
uniformly for all procedure calls.
The frame pointer is
                                 stored in register $30,
                                 also known as $fp. A
                                 stack frame consists of
                                 the memory on the
                                 stack between the
                                 frame pointer and the
                                 stack pointer.

                                 Three steps are
                                 necessary to call a
Calling convention used in the
MIPS architecture stack frame    procedure.
1. Pass the arguments. The first
four arguments are passed in
registers $a0-$a3. The remaining
arguments are pushed onto the
stack.

2. Save the caller-saved registers.
This includes registers $t0-$t9, if
they contain live values at the call
site.

                                       The endless MIPS
3. Execute a jal instruction.          cycle
1. Pass the arguments. The first
four arguments are passed in
registers $a0-$a3. The remaining
arguments are pushed onto the
stack.

2. Save the caller-saved registers.
This includes registers $t0-$t9, if
they contain live values at the call
site.

                                       The endless MIPS
3. Execute a jal instruction.          cycle
Within the called routine, the following steps
are necessary:
1. Establish the stack frame by subtracting
the frame size from the stack pointer.
2. Save the callee-saved registers in the
frame. Register $fp is always saved. Register
$ra and registers $a0-$a3 need to be saved if
they are in use and the routine itself makes
calls. Any of the registers $s0- $s7 that are
used by the callee need to be saved.
3. Establish the frame pointer by adding the
stack frame size to the address in $sp.
To return from a call, a function places the
returned value into $v0 and executes the
following steps:
1. Restore any callee-saved registers that
were saved upon entry.
2. Pop the stack frame by subtracting the
frame size from $sp.
3. Return by jumping to the address in
register $ra.
Debugging
The purpose of a debugger such
as GDB (gnu.org/software/gdb) is
to allow you to see what is going
on “inside” another program
while it executes--or what
another program was doing at
the moment it crashed.
In Practice
        An illustration to
        viewing the call
        stack using GDB.

        1. Compile your
        program with the
        -g option, like
        cc -g -o p1 p1.c
2. Navigate to your program's directory
and run GDB: gdb your_program




If all went fine, you will land on a
command prompt.
3. Then install some breakpoints using the
break command:
break function_name




4. Now run. The program will proceed
until the first breakpoint.
You can select a frame using the frame n
command and view frame information
using the info frame n command.




Some of the details this command
displays are the addresses of the frame,
the next frame down (called by this
frame) and the next frame up (caller of
this frame).
View the call stack using the backtrace
command. A backtrace is a summary of
how your program got where it is. It
shows one line per frame, for many
frames, starting with the one currently
in execution (frame zero), followed by its
caller (frame one), and on up the stack.
Resources
https://en.wikipedia.org/wiki/Call_stack
http://www.cs.uaf.edu/~cs301/notes/Chapter9/node11.html
http://chortle.ccsu.edu/assemblytutorial/Chapter-26/ass26_4.html
http://www.chemie.fu-berlin.de/chemnet/use/info/gdb/
http://www.freebsd.org/doc/en/books/developers-handbook/debugging.html
https://www.gnu.org/software/gdb/
Background images from various sources.


   This presentation was created using only free and open
    source software including the Ubuntu Linux operating
     system, LibreOffice, Mozilla Firefox, Geany, GDB and
                        KolourPaint.

More Related Content

What's hot

Bca 2nd sem u-3 inheritance
Bca 2nd sem u-3 inheritanceBca 2nd sem u-3 inheritance
Bca 2nd sem u-3 inheritanceRai University
 
MicroProgrammed Explained .
MicroProgrammed Explained .MicroProgrammed Explained .
MicroProgrammed Explained .Muhammad Umar
 
Input Output Organization
Input Output OrganizationInput Output Organization
Input Output OrganizationKamal Acharya
 
Lecture 2
Lecture 2Lecture 2
Lecture 2GIKI
 
Asynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxAsynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxArunaDevi63
 
Instruction Execution Cycle
Instruction Execution CycleInstruction Execution Cycle
Instruction Execution Cycleutsav_shah
 
Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual Abdul Hannan
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmssangrampatil81
 
Microinstruction sequencing new
Microinstruction sequencing newMicroinstruction sequencing new
Microinstruction sequencing newMahesh Kumar Attri
 
Election in Wireless Environment
Election in Wireless EnvironmentElection in Wireless Environment
Election in Wireless EnvironmentLahiru Danushka
 
Object Oriented Programming with Java
Object Oriented Programming with JavaObject Oriented Programming with Java
Object Oriented Programming with JavaJussi Pohjolainen
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System CallsVandana Salve
 
Operating System Case Study and I/O System
Operating System Case Study and I/O SystemOperating System Case Study and I/O System
Operating System Case Study and I/O Systemprakash ganesan
 

What's hot (20)

Bca 2nd sem u-3 inheritance
Bca 2nd sem u-3 inheritanceBca 2nd sem u-3 inheritance
Bca 2nd sem u-3 inheritance
 
System calls
System callsSystem calls
System calls
 
Microoperations
MicrooperationsMicrooperations
Microoperations
 
Java- Nested Classes
Java- Nested ClassesJava- Nested Classes
Java- Nested Classes
 
MicroProgrammed Explained .
MicroProgrammed Explained .MicroProgrammed Explained .
MicroProgrammed Explained .
 
Input Output Organization
Input Output OrganizationInput Output Organization
Input Output Organization
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Asynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxAsynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptx
 
Instruction Execution Cycle
Instruction Execution CycleInstruction Execution Cycle
Instruction Execution Cycle
 
Unit iv(simple code generator)
Unit iv(simple code generator)Unit iv(simple code generator)
Unit iv(simple code generator)
 
Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual Object Oriented Programming Lab Manual
Object Oriented Programming Lab Manual
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
Spim Mips Simulator
Spim Mips SimulatorSpim Mips Simulator
Spim Mips Simulator
 
Microinstruction sequencing new
Microinstruction sequencing newMicroinstruction sequencing new
Microinstruction sequencing new
 
8086
80868086
8086
 
Election in Wireless Environment
Election in Wireless EnvironmentElection in Wireless Environment
Election in Wireless Environment
 
Instruction codes
Instruction codesInstruction codes
Instruction codes
 
Object Oriented Programming with Java
Object Oriented Programming with JavaObject Oriented Programming with Java
Object Oriented Programming with Java
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System Calls
 
Operating System Case Study and I/O System
Operating System Case Study and I/O SystemOperating System Case Study and I/O System
Operating System Case Study and I/O System
 

Similar to The Stack Frame

Chapter Seven(1)
Chapter Seven(1)Chapter Seven(1)
Chapter Seven(1)bolovv
 
Intermediate code optimization Unit-4.pdf
Intermediate code optimization Unit-4.pdfIntermediate code optimization Unit-4.pdf
Intermediate code optimization Unit-4.pdfHimanshu883663
 
Buffer overflow tutorial
Buffer overflow tutorialBuffer overflow tutorial
Buffer overflow tutorialhughpearse
 
C++ Memory Management
C++ Memory ManagementC++ Memory Management
C++ Memory ManagementRahul Jamwal
 
002 hbase clientapi
002 hbase clientapi002 hbase clientapi
002 hbase clientapiScott Miao
 
Introduction to c
Introduction to cIntroduction to c
Introduction to camol_chavan
 
C programming language tutorial
C programming language tutorial C programming language tutorial
C programming language tutorial javaTpoint s
 
CD CLASS NOTES- UNIT-4.docx
CD CLASS NOTES- UNIT-4.docxCD CLASS NOTES- UNIT-4.docx
CD CLASS NOTES- UNIT-4.docxKANDE ARCHANA
 
systemverilog-interview-questions.docx
systemverilog-interview-questions.docxsystemverilog-interview-questions.docx
systemverilog-interview-questions.docxssuser1c8ca21
 
Chap6 procedures & macros
Chap6 procedures & macrosChap6 procedures & macros
Chap6 procedures & macrosHarshitParkar6677
 
C Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpointC Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpointJavaTpoint.Com
 
Mitigating overflows using defense in-depth. What can your compiler do for you?
Mitigating overflows using defense in-depth. What can your compiler do for you?Mitigating overflows using defense in-depth. What can your compiler do for you?
Mitigating overflows using defense in-depth. What can your compiler do for you?Javier Tallón
 

Similar to The Stack Frame (20)

Chapter Seven(1)
Chapter Seven(1)Chapter Seven(1)
Chapter Seven(1)
 
Intermediate code optimization Unit-4.pdf
Intermediate code optimization Unit-4.pdfIntermediate code optimization Unit-4.pdf
Intermediate code optimization Unit-4.pdf
 
Buffer overflow tutorial
Buffer overflow tutorialBuffer overflow tutorial
Buffer overflow tutorial
 
C++ Memory Management
C++ Memory ManagementC++ Memory Management
C++ Memory Management
 
Chapter 5 notes
Chapter 5 notesChapter 5 notes
Chapter 5 notes
 
Buffer overflow attack
Buffer overflow attackBuffer overflow attack
Buffer overflow attack
 
Co&al lecture-07
Co&al lecture-07Co&al lecture-07
Co&al lecture-07
 
002 hbase clientapi
002 hbase clientapi002 hbase clientapi
002 hbase clientapi
 
Chapter 6 notes
Chapter 6 notesChapter 6 notes
Chapter 6 notes
 
Introduction to c
Introduction to cIntroduction to c
Introduction to c
 
Chapter 5 notes new
Chapter 5 notes newChapter 5 notes new
Chapter 5 notes new
 
C programming language tutorial
C programming language tutorial C programming language tutorial
C programming language tutorial
 
CD CLASS NOTES- UNIT-4.docx
CD CLASS NOTES- UNIT-4.docxCD CLASS NOTES- UNIT-4.docx
CD CLASS NOTES- UNIT-4.docx
 
Run time storage
Run time storageRun time storage
Run time storage
 
systemverilog-interview-questions.docx
systemverilog-interview-questions.docxsystemverilog-interview-questions.docx
systemverilog-interview-questions.docx
 
Chap6 procedures & macros
Chap6 procedures & macrosChap6 procedures & macros
Chap6 procedures & macros
 
C Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpointC Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpoint
 
Compiler 2011-8-re1
Compiler 2011-8-re1Compiler 2011-8-re1
Compiler 2011-8-re1
 
Compiler 2011-8-re1
Compiler 2011-8-re1Compiler 2011-8-re1
Compiler 2011-8-re1
 
Mitigating overflows using defense in-depth. What can your compiler do for you?
Mitigating overflows using defense in-depth. What can your compiler do for you?Mitigating overflows using defense in-depth. What can your compiler do for you?
Mitigating overflows using defense in-depth. What can your compiler do for you?
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

The Stack Frame

  • 1. The Stack Frame An Ivaylo Marinkov presentation ivaylo@tsarstva.bg
  • 2. Call Stack A stack data structure storing information of a computer program's active subroutines. Whilst important for the software's proper functioning, its details are usually hidden and usage is automated in high-level programming languages.
  • 3. Call Stack Purpose Keeping record of the point to which each active subroutine should return control when finished.
  • 4. Active Subroutine A routine that has been called but has not finished execution yet. Afterwords, control should be returned to the point where the call has been made. Routines may be nested to any level and recursion is possibe – hence the stack structure.
  • 5. For example, the DrawSquare subroutine calls the DrawLine subroutine from four different places. DrawLine must know where to return once completed. This is accomplished by pushing the address following the call instruction – the return address – onto the stack with each call.
  • 6. Call Stack Inner Workings The caller pushes the return address onto the stack (winding). The called subroutine, when it finishes, pops the return address off the stack and transfers control to it (unwinding). If a called subroutine calls on yet another subroutine, it will push another address onto the stack, and so on, with the information stacking up and unstacking as the program dictates.
  • 7. Should pushing consume all the space allocated for the call stack, an error called stack overflow will occur. There is usually a single call stack associated with each process thread. However, the program may create additional call stacks for tasks such as signal-hadling or cooperative multitasking.
  • 8. Additional Call Stack Functions Local data storage – keeping local-scope variable values. Parameter passing – storage for values passed by calling code. Evalution stack – in some cases operands for logical and arithmetic operations may be stored in the call stack. Current instance pointer – for this pointer in object-oriented languages.
  • 9. Structure A call stack is composed of stack frames, machine and application banary interface- dependant data structures containing subroutine state information.
  • 10. The Stack Frame Generally speaking, a procedure's stack frame contains all the information necessary to save and restore the state of the procedure.
  • 11. Strictly speaking, it is only necessary for the calling program and the called procedure to agree on the structure of the stack frame for each procedure call. However, the specification of a calling convention facilitates the use of procedure libraries by defining the structure of the stack frame uniformly for all procedure calls.
  • 12. The frame pointer is stored in register $30, also known as $fp. A stack frame consists of the memory on the stack between the frame pointer and the stack pointer. Three steps are necessary to call a Calling convention used in the MIPS architecture stack frame procedure.
  • 13. 1. Pass the arguments. The first four arguments are passed in registers $a0-$a3. The remaining arguments are pushed onto the stack. 2. Save the caller-saved registers. This includes registers $t0-$t9, if they contain live values at the call site. The endless MIPS 3. Execute a jal instruction. cycle
  • 14. 1. Pass the arguments. The first four arguments are passed in registers $a0-$a3. The remaining arguments are pushed onto the stack. 2. Save the caller-saved registers. This includes registers $t0-$t9, if they contain live values at the call site. The endless MIPS 3. Execute a jal instruction. cycle
  • 15. Within the called routine, the following steps are necessary: 1. Establish the stack frame by subtracting the frame size from the stack pointer. 2. Save the callee-saved registers in the frame. Register $fp is always saved. Register $ra and registers $a0-$a3 need to be saved if they are in use and the routine itself makes calls. Any of the registers $s0- $s7 that are used by the callee need to be saved. 3. Establish the frame pointer by adding the stack frame size to the address in $sp.
  • 16. To return from a call, a function places the returned value into $v0 and executes the following steps: 1. Restore any callee-saved registers that were saved upon entry. 2. Pop the stack frame by subtracting the frame size from $sp. 3. Return by jumping to the address in register $ra.
  • 17. Debugging The purpose of a debugger such as GDB (gnu.org/software/gdb) is to allow you to see what is going on “inside” another program while it executes--or what another program was doing at the moment it crashed.
  • 18. In Practice An illustration to viewing the call stack using GDB. 1. Compile your program with the -g option, like cc -g -o p1 p1.c
  • 19. 2. Navigate to your program's directory and run GDB: gdb your_program If all went fine, you will land on a command prompt.
  • 20. 3. Then install some breakpoints using the break command: break function_name 4. Now run. The program will proceed until the first breakpoint.
  • 21. You can select a frame using the frame n command and view frame information using the info frame n command. Some of the details this command displays are the addresses of the frame, the next frame down (called by this frame) and the next frame up (caller of this frame).
  • 22. View the call stack using the backtrace command. A backtrace is a summary of how your program got where it is. It shows one line per frame, for many frames, starting with the one currently in execution (frame zero), followed by its caller (frame one), and on up the stack.