Homework 6 Intro to Assembly Solution

$35.00 $29.05

You'll get a: . zip file solution, download link after Payment

Description

1.1 Purpose

Now that you’ve been introduced to assembly, think back to some high level languages you know such as Python or Java. When writing code in Python or Java, you typically use functions or methods. Functions and methods are called subroutines in assembly language.

In assembly language, how do we handle jumping around to di erent parts of memory to execute code from functions or methods? How do we remember where in memory the current function was called from (where to return to)? How do we pass arguments to the subroutine, and then pass the return value back to the caller?

The goal of this assignment is to introduce you to the Stack and the Calling Convention in LC-3 Assembly. This will be accomplished by writing your own subroutines, calling subroutines, and even creating subroutines that call themselves (recursion). By the end of this assignment, you should have a strong understanding of the LC-3 Calling Convention and the Stack Frame, and how subroutines are implemented in assembly language.

1.2 Task

You will implement each of the four subroutines (functions) listed below in LC-3 assembly language. Please see the detailed instructions for each subroutine on the following pages. We have provided pseudocode for each of the subroutines, and suggest that you follow these algorithms when writing your assembly code. Your subroutines must adhere to the LC-3 calling convention.

  1. mult.asm

  1. gcd.asm

  1. ll.asm

  1. map.asm

More information on the LC-3 Calling Convention can be found on Canvas in the Lab Guides and in Lecture Slides L12 and L13. More detailed information on each LC-3 instruction can be found in the Patt/Patel book Appendix A (also on Canvas under LC3 Resources). Please check the rest of this document for some advice on debugging your assembly code, as well some general tips for successfully writing assembly code.

1.3 Criteria

Your assignment will be graded based on your ability to correctly translate the given pseudocode for sub-routines (functions) into LC-3 assembly code, following the LC-3 calling convention. Please use the LC-3 instruction set when writing these programs. Check the deliverables section for deadlines and other related information.

You must obtain the correct values for each function. In addition, registers R0-R5 and R7 must be restored from the perspective of the caller, so they contain the same values after the caller’s JSR subroutine call. Your subroutine must return to the correct point in the caller’s code, and the caller must nd the return value on the stack where it is expected to be. If you follow the LC-3 calling convention correctly, each of these things will happen automatically.

While we will give partial credit where we can, your code must assemble with no warnings or errors. (Complx will tell you if there are any.) If your code does not assemble, we will not be able to grade that le and you will not receive any points. Each function is in a separate le, so you will not lose all points if one function does not assemble. Good luck and have fun!

3

  • Detailed Instructions

2.1 Part 1

2.2 Recursive Multiplication

For the rst part of this homework, we will be writing a function that computes the multiplication of two numbers, a and b, recursively. Note that only one of a or b will be negative.

2.2.1 Pseudocode

You may remember your implementation for iterative multiplication; this wont be much di erent. We will be taking in two parameters a and b, and returning a b. Only one of a or b will be negative in any given call. The pseudocode is as follows:

mult(int a, int b) {

if (a == 0 || b == 0) {

return 0;

}

  • Since one number might be negative, we will only decrement the larger number.

  • This ensures that one parameter will eventually become zero.

if (a > b) {

var result = b + mult(a – 1, b);

return result;

} else {

var result = a + mult(a, b – 1);

return result;

}

}

2.3 Part 2

2.4 Recursive GCD

For this part of the assignment, you will be recursively determining the greatest common divisor of two inte-gers passed in as arguments. The greatest common divisor d of two integers a and b is de ned as the greatest integer that divides both a and b. If you would like additional reading on how Euclid’s Greatest Common Divisor Algorithm works, please read https://crypto.stanford.edu/pbc/notes/numbertheory/euclid.html for a basic rundown.

2.4.1 Pseudocode

Following is the pseudocode for determining the GCD of two integers a and b.

gcd(int a, int b) {

if (a == b) {

return a;

} else if (a < b) { return gcd(b, a);

4

} else {

return gcd(a – b, b);

}

}

2.5 Part 3

2.6 Replace values in Linked List

For this part of the assignment, you will be writing a recursive function that for each node i of a linked list L will check if the node’s data di == r for some integer r. If di == r, you will set di = 0. If di 6= r, you will set di = di r. Then, you will return the current node. The parameters for the function will be the address of the head of the linked list L, and the integer r.

2.7 Linked List Data Structure

The below gure depicts how each node in our linked list is laid out. Each node will have two attributes:

the next node, and a value for that node.

Head Node

Memory

Memory

Memory

Memory

x4000

x4001

x4008

x4009

x4000

x4008

5

x0000

12

Address of

Address of

Data

Address

Data

next Node

next node

of next

node(null)

lu57324e42k tmp 93aa84de626d02ac lu57324e42k tmp 93aa84de626d02ac

2.7.1 Pseudocode

The pseudocode for this function is as follows. Note: null has a value of 0. Since memory address zero is used to hold part of the trap vector, we can use zero as a value distinguished from all of the memory addresses in our linked list.

replaceValueLL(Node head, int r) {

if (head == null) {

return head

}

if (head.data == r) {

head.data = 0

} else {

head.data = head.data * r

}

replaceValueLL(head.next)

return head;

}

5

2.8 Part 4

2.9 Map

For this part of the assignment, you will be implementing a map function. The parameters of the function are as follows: the address of an array A, the length of array A, and the address of function named func. For each value A[i] in array A, you will perform the following operation:

a[i] = func(a[i])

Then, you will return the address of the modi ed array A.You may have seen a similar function to this in java. If you’d like to refresh your memory, please visit https://codingbat.com/doc/java-functional-mapping.html for a brief overview.

Note: unlike previous questions, you can’t use JSR to jump to the provided function. JSR takes in the PC-relative location of a subroutine as one of its operands, but some of the provided functions are located too far away for JSR to reach. What function similar to JSR can be used instead?

2.9.1 Pseudocode

Following is the pseudocode for map.

map(Array A, int len, function func) {

for(i = 0; i < len; i++) {

A[i] = func(A[i]);

}

return A;

}

  • Checker

To run the autograder locally, follow the steps below depending upon your operating system:

Mac/Linux Users:

    1. Navigate to the directory your homework is in. In your terminal, not in your browser

    1. Run the command sudo chmod +x grade.sh

    1. Now run ./grade.sh

Windows Users:

    1. On docker quickstart, navigate to the directory your homework is in

    1. Run ./grade.sh

Note: The checker may not re ect your actual grade on this assignment. We reserve the right to update the checker as we see t when grading.

6

  • Deliverables

Turn in the les

  1. mult.asm

  1. gcd.asm

  1. ll.asm

  1. map.asm

on Gradescope by Tuesday, March 3rd at 11:55pm.

There will be a 6 hour late period until March 4th at 5:55am. You will receive a 25% deduction during this late period. Anything after that will result in an automatic 0.

Note: Please do not wait until the last minute to run/test your homework, history has proved that last minute turn-ins will result in long queue times for grading on Gradescope. You have been warned.

7

  • Appendix

5.1 Appendix A: LC-3 Instruction Set Architecture

lu57324e42k tmp 96c5150524f1471b

8

5.2 Appendix B: Running Autograder and Debugging LC-3 Assembly

When you turn in your les on gradescope for the rst time, you might not receive a perfect score. Does this mean you change one line and spam gradescope until you get a 100? No! You can use a handy tool known as tester strings.

  1. First o , we can get these tester strings in two places: the local grader or o of gradescope. To run the local grader:

Mac/Linux Users:

      1. Navigate to the directory your homework is in. In your terminal, not in your browser

      1. Run the command sudo chmod +x grade.sh

      1. Now run ./grade.sh

Windows Users:

      1. On docker quickstart, navigate to the directory your homework is in

      1. Run ./grade.sh

When you run the script, you should see an output like this:

lu57324e42k tmp e45b9da4425ec1a3

Copy the string, starting with the leading ’B’ and ending with the nal backslash. Do not include the quotation marks.

Side Note: If you do not have docker installed, you can still use the tester strings to debug your assembly code. In your gradescope error output, you will see a tester string. When copying, make sure you copy from the rst letter to the nal backslace and again, don’t copy the quotations.

lu57324e42k tmp b426df2f5807f41a

2. Secondly, navigate to the clipboard in your docker image and paste in the string.

9

lu57324e42k tmp 59c83fe32a099627

3. Next, go to the Test Tab and click Setup Replay String

lu57324e42k tmp 50679a09ea4b2f42

4. Now, paste your tester string in the box!

lu57324e42k tmp 65f259b4673a5bcb

  1. Now, complx is set up with the test that you failed! The nicest part of complx is the ability to step through each instruction and see how they change register values. To do so, click the step button. To change the number representation of the registers, double click inside the register box.

lu57324e42k tmp 771b85563ead4aa0

  1. If you are interested in looking how your code changes di erent portions of memory, click the view tab and indicate ’New View’

10

lu57324e42k tmp 33d64da67805f37a

  1. Now in your new view, go to the area of memory where your data is stored by CTRL+G and insert the address

lu57324e42k tmp 5f1d4504255446b2

  1. One nal tip: to automatically shrink your view down to only those parts of memory that you care about (instructions and data), you can use View Tab ! Hide Addresses ! Show Only Code/Data. Just be careful: if you misclick and select Show Non Zero, it may make the window freeze (it’s a known Complx bug).

lu57324e42k tmp 1b16c37187ae855c

11

5.3 Appendix C: LC-3 Assembly Programming Requirements and Tips

  1. Your code must assemble with NO WARNINGS OR ERRORS. To assemble your program, open the le with Complx. It will complain if there are any issues. If your code does not assemble you WILL get a zero for that le.

  1. Comment your code! This is especially important in assembly, because it’s much harder to interpret what is happening later, and you’ll be glad you left yourself notes on what certain instructions are contributing to the code. Comment things like what registers are being used for and what less intuitive lines of code are actually doing. To comment code in LC-3 assembly just type a semicolon (;), and the rest of that line will be a comment.

  1. Avoid stating the obvious in your comments, it doesn’t help in understanding what the code is doing.

Good Comment

ADD R3, R3, -1 ; counter–

BRp LOOP ; if counter == 0 don’t loop again

Bad Comment

ADD R3, R3, -1 ; Decrement R3

BRp LOOP ; Branch to LOOP if positive

  1. DO NOT assume that ANYTHING in the LC-3 is already zero. Treat the machine as if your program was loaded into a machine with random values stored in the memory and register le.

  1. Following from 3. You can randomize the memory and load your program by doing File – Randomize and Load.

  1. Use the LC-3 calling convention. This means that all local variables, frame pointer, etc. . . must be pushed onto the stack. Our autograder will be checking for correct stack setup.

  1. Start the stack at xF000. The stack pointer always points to the last used stack location. This means you will allocate space rst, then store onto the stack pointer.

  1. Do NOT execute any data as if it were an instruction (meaning you should put . lls after HALT or RET).

  1. Do not add any comments beginning with @plugin or change any comments of this kind.

  1. Test your assembly. Don’t just assume it works and turn it in.

12

5.4 Appendix D: Rules and Regulations

5.4.1 General Rules

  1. Starting with the assembly homeworks, any code you write should be meaningfully commented for your bene t. You should comment your code in terms of the algorithm you are implementing; we all know what each line of code does.

  1. Although you may ask TAs for clari cation, you are ultimately responsible for what you submit. This means that (in the case of demos) you should come prepared to explain to the TA how any piece of code you submitted works, even if you copied it from the book or read about it on the internet.

  1. Please read the assignment in its entirety before asking questions.

  1. Please start assignments early, and ask for help early. Do not email us the night the assignment is due with questions.

  1. If you nd any problems with the assignment it would be greatly appreciated if you reported them to the author (which can be found at the top of the assignment). Announcements will be posted if the assignment changes.

5.4.2 Submission Conventions

  1. All les you submit for assignments in this course should have your name at the top of the le as a comment for any source code le, and somewhere in the le, near the top, for other les unless otherwise noted.

  1. When preparing your submission you may either submit the les individually to Canvas/Gradescope or you may submit an archive (zip or tar.gz only please) of the les. You can create an archive by right clicking on les and selecting the appropriate compress option on your system. Both ways (uploading raw les or an archive) are exactly equivalent, so choose whichever is most convenient for you.

  1. Do not submit compiled les, that is .class les for Java code and .o les for C code. Only submit the les we ask for in the assignment.

  1. Do not submit links to les. The autograder does not understand it, and we will not manually grade assignments submitted this way as it is easy to change the les after the submission period ends.

5.4.3 Submission Guidelines

  1. You are responsible for turning in assignments on time. This includes allowing for unforeseen circum-stances. If you have an emergency let us know IN ADVANCE of the due time supplying documenta-tion (i.e. note from the dean, doctor’s note, etc). Extensions will only be granted to those who contact us in advance of the deadline and no extensions will be made after the due date.

  1. You are also responsible for ensuring that what you turned in is what you meant to turn in. After submitting you should be sure to download your submission into a brand new folder and test if it works. No excuses if you submit the wrong les, what you turn in is what we grade. In addition, your assignment must be turned in via Canvas/Gradescope. Under no circumstances whatsoever we will accept any email submission of an assignment. Note: if you were granted an extension you will still turn in the assignment over Canvas/Gradescope.

  1. There is a 6-hour grace period added to all assignments. You may submit your assignment without penalty up until 11:55PM, or with 25% penalty up until 5:55AM. So what you should take from this is not to start assignments on the last day and plan to submit right at 11:54AM. You alone are responsible for submitting your homework before the grace period begins or ends; neither Canvas/Gradescope, nor

13

your aky internet are to blame if you are unable to submit because you banked on your computer working up until 11:54PM. The penalty for submitting during the grace period (25%) or after (no credit) is non-negotiable.

5.4.4 Syllabus Excerpt on Academic Misconduct

Academic misconduct is taken very seriously in this class. Quizzes, timed labs and the nal examination are individual work.

Homework assignments are collaborative, In addition many if not all homework assignments will be evaluated via demo or code review. During this evaluation, you will be expected to be able to explain every aspect of your submission. Homework assignments will also be examined using computer programs to nd evidence of unauthorized collaboration.

What is unauthorized collaboration? Each individual programming assignment should be coded by you. You may work with others, but each student should be turning in their own version of the assignment. Submissions that are essentially identical will receive a zero and will be sent to the Dean of Students’ O ce of Academic Integrity. Submissions that are copies that have been super cially modi ed to conceal that they are copies are also considered unauthorized collaboration.

You are expressly forbidden to supply a copy of your homework to another student via elec-tronic means. This includes simply e-mailing it to them so they can look at it. If you supply an electronic copy of your homework to another student and they are charged with copying, you will also be charged. This includes storing your code on any site which would allow other parties to obtain your code such as but not limited to public repositories (Github), pastebin, etc. If you would like to use version control, use github.gatech.edu

5.4.5 Is collaboration allowed?

Collaboration is allowed on a high level, meaning that you may discuss design points and concepts relevant to the homework with your peers, share algorithms and pseudo-code, as well as help each other debug code. What you shouldn’t be doing, however, is pair programming where you collaborate with each other on a single instance of the code. Furthermore, sending an electronic copy of your homework to another student for them to look at and gure out what is wrong with their code is not an acceptable way to help them, because it is frequently the case that the recipient will simply modify the code and submit it as their own.

14

lu57324e42k tmp 1e1a114d19b38143

Figure 1: Collaboration rules, explained colorfully

15