How ORG statement processed in two-pass assembly scheme, Computer Engineering

Assignment Help:

Can the operand expression in an ORG statement contains forward references? If so, outline how the statement can be processed in a two-pass assembly scheme.

ORG that is origin is an assembler directive that

  • Indirectly assign values to symbols
  • Reset the location counter to the given value-ORG value
  • Value can be: other symbol, constant or expression
  • No forward-reference

Assemblers scan the source program, producing machine instructions. Occasionally, the assembler reaches a reference to a variable that has not yet been explained. It is referred to as a forward reference problem. This is resolved in a two-pass assembler as given here:

In the first pass, the assembler simple firstly reads the source file, counting-up the number of locations as each instruction will take, and makes a symbol table in memory which lists all the defined variables cross-referenced to their connected memory address. In the second pass, the assembler substitute's opcodes for the mnemonics and names of variable are replaced by the memory locations acquired from the symbol table.

Consider the illustrated program

1216_ORG statement.png

On the first pass, the ORG statement puts the location counter to $800. Therefore the label N has the value $800, the label COLUMN has the value $802, the label M has the value $801 and the label ODD has the value $834. Hence the instruction CLR M will get three bytes, the instruction LDAB N will get three bytes and same forth. Likewise, we see that the first byte of instruction we observe that the first byte of instruction

LOOP:   LDDA 1, X+

IT will be at location $872. Therefore the symbolic address LOOP contain the value $872 and so on. In this continuing way, we come to

BPL     JUMP

Such program searches the array COLUMN seem for odd, negative, one-byte numbers, that then are stored in array ODD. The length of COLUMN is N and the length of ODD is M, that the program computes. We do not know the second byte of such instruction since we do not know the value of the address JUMP still. (It is termed as a forward reference, by using a label whose value is not still known.) Conversely, we can leave this second byte undetermined and proceed till we see that the machine code for DBNE is put in location $87f, therefore giving JUMP the value $87f.

If we continue our first pass downward then we allocate three bytes for DBNE B,LOQP.

We do not get this instruction's offset still, even if we already know the value of LOOP.

Scanning by the program again, that is the second pass, we can fill in each bytes, including those not found the first time through, for the instructions as BPL JUMP, BEQ JUMP and DBNE B,LOOP. Now, all object code can be produced.


Related Discussions:- How ORG statement processed in two-pass assembly scheme

Distinguish between e-mode and depletion mode mosfet, Distinguish between e...

Distinguish between enhancement mode and depletion mode metal oxide semiconductor field effect transistors giving their characteristics. Ans. Enhancement mode and depleti

Define decision support system, Q. Define Decision Support System? An...

Q. Define Decision Support System? Ans. The decision support system is an information system application which help decision making. DSS tends to be used in planning or analy

Interconnection network in-array processing, Interconnection Network (IN): ...

Interconnection Network (IN):  IN performs data exchange between the PEs, manipulation functions and data routing. This IN is under the control of CU.

What is the use of the statement leave to list-processing, What is the use ...

What is the use of the statement Leave to List-processing? Leave to List-processing statement is used to make a list from a module pool.  Leave to list processing statement per

Binary search tree in the descending order, In order to get the information...

In order to get the information kept in a Binary Search Tree in the descending order, one should traverse it in which of the following order?    Right, Root, Left

What is bea weblogic?, Ans) BEA Web Logic is a J2EE application server and ...

Ans) BEA Web Logic is a J2EE application server and also an HTTP web server by BEA Systems of San Jose, California, for UNIX, Linux, Microsoft Windows, and other platforms. Web Log

Logical user-centered interactive design methodology, Question: Logical...

Question: Logical User-Centered Interactive Design Methodology is a methodology that identifies six clear stages to help in software development while keeping the user in mind.

Analysis of merge sort, i) The width of the sorting + merging circuit is eq...

i) The width of the sorting + merging circuit is equivalent to maximum number of devices needed in a phase is O(n/2). As in the above diagram maximum number of devices for a given

What are the 2 other types of views, What are the 2 other types of Views, w...

What are the 2 other types of Views, which are not allowed in Release 3.0? The two views are:- Structure Views. Entity Views.

Explain the reference count - free memory areas, Explain the Reference Coun...

Explain the Reference Count The system relates a reference count along with each memory area to point out the number of its active users. This number is incremented while a us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd