CSCI-GA.2250-001/002
Programming Assignment #1 (Lab 1): Linker
Professor Hubertus Franke
Class CSCI-GA.2250-001/002: Operating Systems – Spring 2021
- Page 1 of 7 -
In this lab you will be implementing a two-pass linker. In general, a linker takes individually compiled code/object modules
and creates a single executable by resolving external symbol references (e.g. variables and functions) and module relative
addressing by assigning global addresses after placing the modules’ object code at global addresses.
Rather than dealing with complex x86 tool chains, we assume a target machine with the following properties: (a) word
addressable, (b) addressable memory of 512 words, and (c) each valid word is represented by an integer (<10000).
[ I know that is a really strange machine, but I once saw an UFO too].
The input to the linker is a file containing a sequence of tokens (symbols and integers and instruction type characters). Don’t
assume tokens that make up a section to be on one line, don’t make assumptions about how much space separates tokens or
that lines are non-empty for that matter or that each input conforms syntactically. Symbols always begin with alpha
characters followed by optional alphanumerical characters, i.e.a-Z*. Valid symbols can be up to 16 characters.
Integers are decimal based. Instruction type characters are (I, A, R, E). Token delimiters are ‘ ‘, ‘\t’ or ‘\n’.
The input file to the linker is structured as a series of “object module” definitions.
Each “object module” definition contains three parts (in fixed order): definition list, use list, and program text.
?
definition list consists of a count defcount followed by defcount pairs (S, R) where S is the symbol being defined
and R is the relative word address (offset) to which the symbol refers in the module (0-based counting).
?
use list consists of a count usecount followed by usecount symbols that are referred to in this module. These could
include symbols defined in the definition list of any module (prior or subsequent or not at all).
?
program text consists of a count codecount followed by codecount pairs (type, instr), where type is a single
character indicating the addressing mode as Relative, External. Immediate or Absolute and instr is the instruction
(integer) Note that codecount defines the length of the module.
An instruction is composed of an integer that is comprised of an opcode (op/1000) and an operand (op mod 1000). The
opcode always remains unchanged by the linker. For the instruction value read an integer and ensure opcode < 10, see
errorcodes below. The operand is modified/retained based on the instruction type in the program text as follows:
(R) operand is a relative address in the module which is relocated by replacing the relative address with the absolute address
of that relative address after the module’s global address has been determined (absolute_addr = module_base+relative_addr).
(E) operand is an external address which is represented as an index into the uselist. For example, a reference in the program
text with operand K represents the Kth symbol in the use list, using 0-based counting, e.g., if the use list is ‘‘2 f g’’, then an
instruction ‘‘E 7000’’ refers to f, and an instruction ‘‘E 5001’’ refers to g. You must identify to which global address the
symbol is assigned and then replace the operand with that global address.
(I) an immediate operand is unchanged.
(A) operand is an absolute address which will never be changed in pass2; however it can’t be “>=” the machine size (512);
The linker must process the input twice (that is why it is called two-pass) (to preempt the favored question: “Can I do it in
one pass?” → NO, because storing tokens makes your program more complex). Pass One parses the input and verifies the
correct syntax and determines the base address for each module and the absolute address for each defined symbol, storing the
latter in a symbol table. The first module has base address zero; the base address for module X+1 is equal to the base address
of module X plus the length of module X (defined as the number of instructions in a module). The absolute address for
symbol S defined in module M is the base address of M plus the relative address of S within M. After pass one print the
symbol table (including errors related to it (see rule2 later)). Do not store parsed tokens, the only data you should and need to
store between passes is the symboltable.
Pass Two again parses the input and uses the base addresses and the symbol table entries created in pass one to generate the
actual output by relocating relative addresses and resolving external references. You should reuse pass-1 parser code just with
different actions. You must clearly mark your two passes in the code through comments and/or proper function naming.
Other requirements: error detection, limits, and space used.
To receive full credit, you must check the input for various errors (test inputs will have lots of errors). All errors/warnings
should follow the message catalog provided below. We will do a textual difference against a reference implementation to
grade your program. Any reported difference will indicate a non-compliance with the instructions provided and is reported as
an error and results in deductions.
Programming Assignment #1 (Lab 1): Linker
Professor Hubertus Franke
Class CSCI-GA.2250-001/002: Operating Systems – Spring 2021 - Page 2 of 7 -
You should continue processing after encountering an error/warning (other than a syntax error) and you should be able to
detect multiple errors in the same run. - You should stop processing if a syntax error is detected in the input, print a syntax error message with the line
number and the character offset in the input file where observed. A syntax error is defined as a missing token (e.g. 4
used symbols are defined but only 3 are given) or an unexpected token. Stop processing and exit. - If a symbol is defined multiple times, print an error message and use the value given in the first definition. The error
message is to appear as part of printing the symbol table (following symbol=value printout on the same line). - If a symbol is used in an E-instruction but not defined anywhere, print an error message and use the value absolute
zero. - If a symbol is defined but not used, print a warning message and continue.
- If an address appearing in a definition exceeds the size of the module, print a warning message and treat the address
given as 0 (relative to the module). - If an external address is too large to reference an entry in the use list, print an error message and treat the address as
immediate. - If a symbol appears in a use list but is not actually used in the module (i.e., not referred to in an E-type address),
print a warning message and continue. - If an absolute address exceeds the size of the machine, print an error message and use the absolute value zero.
- If a relative address exceeds the size of the module, print an error message and use the module relative value zero
(that means you still need to remap “0” that to the correct absolute address). - If an illegal immediate value (I) is encountered (i.e. >= 10000), print an error and convert the value to 9999.
- If an illegal opcode is encountered (i.e. op >= 10), print an error and convert the
to 9999.
The following exact limits are in place.
a) Accepted symbols should be upto 16 characters long (not including terminations e.g. ‘\0’), any longer symbol names
are erroneous.
b) a uselist or deflist should support 16 definitions, but not more and an error should be raised.
c) number of instructions are unlimited (hence the two pass system), but in reality they are limited to the machine size.
d) Symbol table should support at least 256 symbols (reference program supports exactly 256 symbols).
There are several sample inputs and outputs provided as part of the sample input files / output files (see NYU Classes).
The first (input-1) is shown below and the second (input-2) is a re-formatted version of the first. They both produce the same
output as the input is token-based and hence present the same content to the linker. Many of the input sets contain errors
that you are to detect as described above. Note that when you have questions regarding errors, please first make sure the
structure of the input is not messing with your mind. We will run your lab on these (and other) input sets. - xy 2
- z xy
- R 1004 I 5678 E 2000 R 8002 E 7001
0 - z
- R 8001 E 1000 E 1000 E 3000 R 1002 A 1010
0 - z
- R 5001 E 4000
- z 2
- xy z
- A 8000 E 1001 E 2000
Your output is expected to strictly follow this format (with exception of empty lines):
Symbol Table
xy=2
z=15
Memory Map
000: 1004
001: 5678
002: 2015
Programming Assignment #1 (Lab 1): Linker
Professor Hubertus Franke
Class CSCI-GA.2250-001/002: Operating Systems – Spring 2021 - Page 3 of 7 -
003: 8002
004: 7002
005: 8006
006: 1015
007: 1015
008: 3015
009: 1007
010: 1010
011: 5012
012: 4015
013: 8000
014: 1015
015: 2002
The following output is heavily annotated for clarity and class discussion. You are not creating this output nor do we have
means to check it. However, it should help you understand the operation and mapping of symbols etc.
Symbol Table
xy=2
z=15
Memory Map
+0
0: R 1004 1004+0 = 1004
1: I 5678 5678
2: xy: E 2000 ->z 2015
3: R 8002 8002+0 = 8002
4: E 7001 ->xy 7002
+5
0: R 8001 8001+5 = 8006
1: E 1000 ->z 1015
2: E 1000 ->z 1015
3: E 3000 ->z 3015
4: R 1002 1002+5 = 1007
5: A 1010 1010
+11
0: R 5001 5001+11= 5012
1: E 4000 ->z 4015
+13
0: A 8000 8000
1: E 1001 ->z 1015 - z: E 2000 ->xy 2002
Note that even an empty program should have the “Symbol Table” and “Memory Map” line.
For a test case to pass you must catch ALL warning/errors and generate the correct output for a given input file.
Example:
Symbol Table
X21=3
X31=4
Memory Map
000: 1003
001: 1003
002: 1003
003: 2000 Error: Absolute address exceeds machine size; zero used
004: 3000 Error: Relative address exceeds module size; zero used
Warning: Module 3: X31 was defined but never used
Programming Assignment #1 (Lab 1): Linker
Professor Hubertus Franke
Class CSCI-GA.2250-001/002: Operating Systems – Spring 2021 - Page 4 of 7 -
Parse errors should abort processing.
Error messages must be following the instruction as shown above.
Warnings message locations are defined further down.
Module counting starts at 1.
I provide in C the code to print parse errors, which also gives you an indication what is considered a parse error.
void __parseerror(int errcode) {
static char* errstr[] = {
"NUM_EXPECTED",
// Number expect
"SYM_EXPECTED",
// Symbol Expected
"ADDR_EXPECTED",
// Addressing Expected which is A/E/I/R
"SYM_TOO_LONG",
// Symbol Name is too long
"TOO_MANY_DEF_IN_MODULE",
// > 16
"TOO_MANY_USE_IN_MODULE", // > 16
"TOO_MANY_INSTR”, // total num_instr exceeds memory size (512)
};
printf("Parse Error line %d offset %d: %s\n", linenum, lineoffset, errstr[errcode]);
}
(Note: line numbers start with 1 and offsets in the line start with 1, offsets should indicate the first character offset of the
token that is wrong, not the last). Tabs (‘\t’) count as one character.
Error messages have the following text and should appear right at the end of the line you are printing out
"Error: Absolute address exceeds machine size; zero used" (see rule 8)
"Error: Relative address exceeds module size; zero used" (see rule 9)
"Error: External address exceeds length of uselist; treated as immediate" (see rule 6)
"Error: %s is not defined; zero used" (insert the symbol name for %s) (see rule 3)
"Error: This variable is multiple times defined; first value used" (see rule 2)
"Error: Illegal immediate value; treated as 9999"
(see rule 10)
"Error: Illegal opcode; treated as 9999"
(see rule 11)
Warning messages have the following text and are on a separate line.
"Warning: Module %d: %s too big %d (max=%d) assume zero relative\n" (see rule 5)
"Warning: Module %d: %s appeared in the uselist but was not actually used\n" (see rule 7)
"Warning: Module %d: %s was defined but never used\n” (see rule 4)
Locations for these warnings are:
Rule 5: to be printed after each module in pass1
Rule 7: to be printed after each module in pass2 (so actually interspersed in the memory map (see out-9)
Rule 4: to be printed after pass 2 (i.e. all modules have been processed) ( see out-3).
Parse Error Location:
Parse errors are to be located at the first character of the wrong token, or if end-of-file is reached at the end of file location.
There is one special case when the eof ends with `\n’. My expectation is that the line number reported actually exists in the
file and that an editor (e.g. vi) can jump to it. In this particular case the linenumber to be reported is the last line read and the
last position of that line, not the next line and offset 1 (see input-12 for an example). The error is at the very last position of
the line. Reason is when one does a linecount on the file (“wc –l input-12”) it shows 3 not 4.
Hint: for each parser error and warning error mentioned above you should have code checking for that.
Programming Assignment #1 (Lab 1): Linker
Professor Hubertus Franke
Class CSCI-GA.2250-001/002: Operating Systems – Spring 2021 Page 5 of 7 -
Program Specification
Only C/C++ are allowed for this lab. The program should take a single command line argument for input file. The output of
the program should go to standard output.
The program should run on the linserv1.cims.nyu.edu machine of NYU, which is where it will be graded, so please make
sure your program runs there. We realize you code on your own machine and transferring to linserv1 machine exposes
occasionally some linker errors. In that case use static linking (such as not finding the appropriate libraries at runtime),
though hopefully that is now resolved with the “module” approach discussed at the end.
Testing your program before submission
As part of the lab1samples.tz in NYU Classes you will see a runit.sh and a gradeit.sh script (the same we will use for grading
albeit with more inputs). Understand the script and what it does. If you can’t pass this script, things will be flagged during the
grading process as well. Don’t assume that just because you pass for these inputs, it will pass for all inputs. Carefully go
through the rules above and ensure covered each rule with some code (if/then/else) and it is at the right location.
Execute as follows:
Create yourself a directorywhere your outputs will be created. cd labsamples
./runit.sh# make your output
directory different
The above will create all the outputs for the available inputs (1-20)
./gradeit.sh .# note 2nd argument is a DOT for the local directory where reference output are.
The above will compare the reference outputs (out-[1-20]) with the ones created with your program and tell you how many
you got right and which ones are wrong. There will be a file called/LOG that contains which cases you got
wrong and where the differences are. If you want to analyze further run “diff –b –B –E” by hand on a particular output
pair.
The reference program used during grading is located on /home/frankeh/Public/linker on cims systems. So feel free to try it in
order to answer any questions you might have on what is expected for a particular input.
What to submit
Submit a zip archive containing (i) source code (ii) makefile to compile your code (iii) ReadMe (If running the program is
not straightforward, otherwise not required). Please make sure the zip doesn’t have any input and/or output files nor contains
other zip or tar files or backup files.
Grading
The lab is graded using a “diff –b –B -E” against the reference output created by the test program (aka reference program)
using a grading harness described above ( runit.sh + gradeit.sh )
Inputs will be the ones provided in NYU Classes as well as other ones and will be checked for all of the error conditions.
It is imperative that you match the output as generated by the ref program to allow for the automated testing for yourself as
well. Use the harness instead of manual checking when you have the basics running, it tells you where things are wrong.
We score this lab as 100pts. You will receive 40 pts for a submission that attempts to solve the problem. The rest you get
60/N points for each successful test that passes the “diff”. In order to institute a certain software engineering discipline, i.e.
following a specification and avoiding unintended releases of code and data in real life, we account for the following
additional deductions:
Programming Assignment #1 (Lab 1): Linker
Professor Hubertus Franke
Class CSCI-GA.2250-001/002: Operating Systems – Spring 2021- Page 6 of 7 -
Reason
Deduction
How to avoid
Makefile not working on CIMS or
missing.
1pts
Make sure your source compiles with your Makefile
Storing Tokens instead of reparsing the
file. All you should store is the
Symboltable between passes.
2pts
Follow instructions on parsing. After that copy the shell of the parser
for the 2nd pass. Close the file, reopen the file and parse again, just
change the actions taken between 1st (error checking, module &
symbol table creation) and 2nd pass (instruction transformation).
Late submission
2pts/day
Upto 7 days. After which reach no more deduction out to me or TA
but work on next lab (don’t fall behind).
Inputs/Outputs or *.o files in the
submission
1pt
Go through your intended submission and clean it up.
Output not going to the screen but to a
file
1pt
We utilize the output toduring the runit.sh and gradeit.sh
so just use printf or cout.
Useful Stuff
How to approach this lab:
Step 1: Write a tokenizer
Write a tokenizer that simply parses the input, prints the token and the position in the file found, at the end prints the final
position in the file (as you will need that for error reporting). Verify it correctly recognizes tokens, lines and line offsets and
also print the final error location as the last line read with last character in the line (not the next empty line).
Historically, getting this first step right and then layeringover it is the main headache in this assignment.
The functions you need to study for this are getline() or fgets() (reads a full line into a buffer) or C++ equivalent
and strtok(), which tokenizes input lines. Please use Linux’s build-in help : “man strtok” and understand how a new
line is seeded and continued in subsequent calls. My tokenizer executable is available on cims under
/home/frankeh/Public/tokenizer (see what it produces on an input).
Step 2: Write basic token functions
Once you have the getToken() function written and verified that your token locations are properly reported, layer the
readInt(), readSymbol(), readIAER() functions on top of it by checking that the token has the correct
sequence of characters and length (e.g. integers are all numbers) and test via a simple program. Macros like isdigit(),
isalpha(), isalnum()can proof useful.
Step 3: Write the parser
Here are some hints on writing a parser. In general one could write this parser using lex/yacc, however this is so simple that I
suggest writing a simple recursive decent parser, in particular since you have to parse the input twice. In lex and yacc you
would need to handle the error locations to conform to the specification. It would have a structure similar to the following (all
pseudoCode). This structure is simply copied twice and the actions taken in each path are different.
Once you have the first pass written, reset the input file, copy the pass1() to pass2() and rewrite. Note, in pass2 certain error
checking doesn’t have be done anymore. Instead you are now rewriting the instructions.
Pass1() {
while (!eof) {
createModule();
int defcount = readInt();
for (int i=0;iSymbol sym = readSym();
int val = readInt();
createSymbol(sym,val); ? this would change in pass2
}
Programming Assignment #1 (Lab 1): Linker
Professor Hubertus Franke
Class CSCI-GA.2250-001/002: Operating Systems – Spring 2021 - Page 7 of 7 -
int usecount = readInt();
for (int i=0;iSymbol sym = readSym();
// we don’t do anything here ? this would change in pass2
}
int instcount = readInt();
for (int i=0;ichar addressmode = ReadIEAR();
int operand = ReadInt();
: // various checks
? this would change in pass2
: // - “ -
}
}
}
Of course you will have to deal with the errors etc. The first pass does syntax and early error checking and creates the
symbol table, the second pass performs additional error checking and instruction transformation. In order to go over the file a
second time reset the file pointer or close and reopen the file. You should not store tokens or deflist or uselist or instructions
during the first pass in order to pass to pass2. Only the symbol table needs to be stored between passes.
Writing a Makefile
A makefile should be named either “makefile” or “Makefile”. make will look for either of these files during building.
Here is a good introduction: http://www.cs.colby.edu/maxwe... with more sophisticated ones.
The simplest Makefile you can think of contains how it builds the executable and how it cleans up (here it assumes one
source file only and builds the linker executable):
linker: linker.c
g++ -g linker.cpp -o linker
clean:
rm -f linker *~
Here is a more sophisticated one that assumes multiple inputfiles: file1.c .. file3.c and allows to specify the compiler version
CFLAGS=-g # -g = debug, -O2 for optimized code CPPFLAGS for g++
CC=gcc-your-favorite-version
linker: file1.c file2.c file3.c
$(CC) $(CFLAGS) –o linker file1.c file2.c file3.c
There are certainly more sophisticated once to write.
Switching compiler versions on linserv1:
gcc –v or g++ -v # will tell you the currently active gcc version
module avail gcc # This will show you the list of all available modules
module load gcc-6.3.0 # loads indicated gcc version (must be in avail list)
module unload gcc-6.3.0 # reverts back to previous one (a “stack” is