Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for...

32
Chapter 10 And, Finally...

Transcript of Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for...

Page 1: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

Chapter 10And, Finally...

Page 2: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-2

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

A Final Collection of ISA-related TopicsStacks

• Important low-level data structure

ASCII-Decimal Conversion• Converting between human-friendly and

computer-friendly representations

Interrupt-Driven I/O• Efficient, device-controlled interactions

Page 3: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-3

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

StacksA LIFO (last-in first-out) storage structure.

• The first thing you put in is the last thing you take out.• The last thing you put in is the first thing you take out.

This means of access is what defines a stack,not the specific implementation.

Two main operations:PUSH: add an item to the stack

POP: remove an item from the stack

Page 4: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-4

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

A Physical StackCoin rest in the arm of an automobile

First quarter out is the last quarter in.

1995 1996199819821995

199819821995

Initial State AfterOne Push

After Three More Pushes

AfterOne Pop

Page 5: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-5

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

A Hardware ImplementationData items move between registers

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

YesEmpty:

TOP #18

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

NoEmpty:

TOP #12

#5

#31

#18

/ / / / / /

NoEmpty:

TOP #31

#18

/ / / / / /

/ / / / / /

/ / / / / /

NoEmpty:

TOP

Initial State AfterOne Push

After Three More Pushes

AfterTwo Pops

Page 6: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-6

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

A Software ImplementationData items don't move in memory, just our idea about there the TOP of the stack is.

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

TOP

#18

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

TOP #18

#31

#5

#12

/ / / / / /

TOP

#18

#31

#5

#12

/ / / / / /

TOP

Initial State AfterOne Push

After Three More Pushes

AfterTwo Pops

x3FFF x4000 x4003 x4001R6 R6 R6 R6

By convention, R6 holds the Top of Stack (TOS) pointer.

Page 7: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-7

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Basic Push and Pop CodePush

ADD R6, R6, #1 ; increment stack ptr STR R0, R6, #0 ; store data (R0)

Pop

LDR R0, R6, #0 ; load data from TOS ADD R6, R6, #-1 ; decrement stack ptr

Page 8: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-8

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Pop with Underflow DetectionIf we try to pop too many items off the stack,an underflow condition occurs.

• Check for underflow by checking TOS before removing data.• Return status code in R5 (0 for success, 1 for underflow)

POP LD R1, EMPTY ; EMPTY = -x3FFF ADD R2, R6, R1 ; Compare stack pointer BRz FAIL ; with x3FFF LDR R0, R6, #0 ADD R6, R6, #-1 AND R5, R5, #0 ; SUCCESS: R5 = 0 RETFAIL AND R5, R5, #0 ; FAIL: R5 = 1 ADD R5, R5, #1 RETEMPTY .FILL xC001

Page 9: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-9

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Push with Overflow DetectionIf we try to push too many items onto the stack,an overflow condition occurs.

• Check for underflow by checking TOS before adding data.• Return status code in R5 (0 for success, 1 for overflow)

PUSH LD R1, MAX ; MAX = -x4004 ADD R2, R6, R1 ; Compare stack pointer BRz FAIL ; with x3FFF ADD R6, R6, #1 STR R0, R6, #0 AND R5, R5, #0 ; SUCCESS: R5 = 0 RETFAIL AND R5, R5, #0 ; FAIL: R5 = 1 ADD R5, R5, #1 RETMAX .FILL xBFFC

Page 10: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-10

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Arithmetic Using a StackInstead of registers, some ISA's use a stack forsource and destination operations: a zero-address machine.

• Example:ADD instruction pops two numbers from the stack,adds them, and pushes the result to the stack.

Evaluating (A+B)·(C+D) using a stack:

(1) push A(2) push B(3) ADD(4) push C(5) push D(6) ADD(7) MULTIPLY(8) pop result

Page 11: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-11

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Data Type ConversionKeyboard input routines read ASCII characters,not binary values.

Similarly, output routines write ASCII.

Consider this program: TRAP x23 ; input from keybd ADD R1, R0, #0 ; move to R1 TRAP x23 ; input from keybd ADD R0, R1, R0 ; add two inputs TRAP x21 ; display result TRAP x25 ; HALT

User inputs 2 and 3 -- what happens?

Result displayed: e

Why? ASCII '2' (x32) + ASCII '3' (x33) = ASCII 'e' (x65)

Page 12: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-12

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

ASCII to BinaryUseful to deal with mult-digit decimal numbers

Assume we've read three ASCII digits (e.g., "259")into a memory buffer.

How do we convert this to a numberwe can use?

• Convert first character to digit (subtract x30)and multiply by 100.

• Convert second character to digit andmultiply by 10.

• Convert third character to digit.• Add the three digits together.

x32

x35

x39

'2'

'5'

'9'

Page 13: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-13

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Multiplication via a Lookup TableHow can we multiply a number by 100?

• One approach: Add number to itself 100 times.

• Another approach:Add 100 to itself <number> times. (Better if number < 100.)

Since we have a small range of numbers (0-9),use number as an index into a lookup table.

Entry 0: 0 x 100 = 0Entry 1: 1 x 100 = 100Entry 2: 2 x 100 = 200Entry 3: 3 x 100 = 300etc.

Page 14: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-14

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Code for Lookup Table; multiply R0 by 100, using lookup table; LEA R1, Lookup100 ; R1 = table base ADD R1, R1, R0 ; add index (R0) LDR R0, R1, #0 ; load from M[R1] ...Lookup100 .FILL 0 ; entry 0 .FILL 100 ; entry 1 .FILL 200 ; entry 2 .FILL 300 ; entry 3 .FILL 400 ; entry 4 .FILL 500 ; entry 5 .FILL 600 ; entry 6 .FILL 700 ; entry 7 .FILL 800 ; entry 8 .FILL 900 ; entry 9

Page 15: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-15

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Complete Conversion Routine (1 of 3); Three-digit buffer at ASCIIBUF.; R1 tells how many digits to convert.; Put resulting decimal number in R0.ASCIItoBinary ADD R0, R0, #0 ; clear result ADD R1, R1, #0 ; test # digits BRz DoneAtoB ; done if no digits; LD R3, NegZero ; R3 = -x30 LEA R2, ASCIIBUF ADD R2, R2, R1 ADD R2, R2, #-1 ; points to ones digit; LDR R4, R2, #0 ; load digit ADD R4, R4, R3 ; convert to number ADD R0, R0, R4 ; add ones contrib

Page 16: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-16

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Conversion Routine (2 of 3) ADD R1, R1, #-1 ; one less digit BRz DoneAtoB ; done if zero ADD R2, R2, #-1 ; points to tens digit; LDR R4, R2, #0 ; load digit ADD R4, R4, R3 ; convert to number LEA R5, Lookup10 ; multiply by 10 ADD R5, R5, R4 LDR R4, R5, #0 ADD R0, R0, R4 ; adds tens contrib; ADD R1, R1, #-1 ; one less digit BRz DoneAtoB ; done if zero ADD R2, R2, #-1 ; points to hundreds ; digit

Page 17: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-17

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Conversion Routine (3 of 3) LDR R4, R2, #0 ; load digit ADD R4, R4, R3 ; convert to number LEA R5, Lookup100 ; multiply by 100 ADD R5, R5, R4 LDR R4, R5, #0 ADD R0, R0, R4 ; adds 100's contrib;DoneAtoB RETNegZero .FILL xFFD0 ; -x30ASCIIBUF .BLKW 4Lookup10 .FILL 0 .FILL 10 .FILL 20...Lookup100 .FILL 0 .FILL 100...

Page 18: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-18

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Binary to ASCII ConversionConverting a 2's complement binary value toa three-digit decimal number

• Resulting characters can be output using OUT

Instead of multiplying, we need to divide by 100to get hundreds digit.

• Why wouldn't we use a lookup table for this problem?• Subtract 100 repeatedly from number to divide.

First, check whether number is negative.• Write sign character (+ or -) to buffer and make positive.

Page 19: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-19

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Binary to ASCII Conversion Code (part 1 of 3); R0 is between -999 and +999.; Put sign character in ASCIIBUF, followed by three; ASCII digit characters.

BinaryToASCII LEA R1, ASCIIBUF ; pt to result string ADD R0, R0, #0 ; test sign of value BRn NegSign LD R2, ASCIIplus ; store '+' STR R2, R1, #0 BR Begin100NegSign LD R2, ASCIIneg ; store '-' STR R2, R1, #0 NOT R0, R0 ; convert value to pos ADD R0, R0, #1

Page 20: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-20

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Conversion (2 of 3)Begin100 LD R2, ASCIIoffset LD R3, Neg100Loop100 ADD R0, R0, R3 BRn End100 ADD R2, R2, #1 ; add one to digit BR Loop100End100 STR R2, R1, #1 ; store ASCII 100's digit LD R3, Pos100 ADD R0, R0, R3 ; restore last subtract; LD R2, ASCIIoffset LD R3, Neg10Loop100 ADD R0, R0, R3 BRn End10 ADD R2, R2, #1 ; add one to digit BR Loop10

Page 21: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-21

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Conversion Code (3 of 3)End10 STR R2, R1, #2 ; store ASCII 10's digit ADD R0, R0, #10 ; restore last subtract; LD R2, ASCIIoffset ADD R2, R2, R0 ; convert one's digit STR R2, R1, #3 ; store one's digit RET

;ASCIIplus .FILL x2B ; plus signASCIIneg .FILL x2D ; neg signASCIIoffset .FILL x30 ; zeroNeg100 .FILL xFF9C ; -100Pos100 .FILL 100Neg10 .FILL xFFF6 ; -10

Page 22: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-22

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Interrupt-Driven I/OTiming of I/O controlled by device

• tells the processor when something interesting happensExample: when character is entered on keyboardExample: when monitor is ready for next character

• processor interrupts its normal instruction processingand executes a service routine (like a TRAP)

figure out what device is causing the interruptexecute routine to deal with eventresume execution

• no need for processor to poll device, waiting for eventscan perform other useful work

Interrupt is an unscripted subroutine call,

triggered by an external event.

Page 23: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-23

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

When to Use InterruptsWhen timing of external event is uncertain

• Example: incoming packet from network

When device operation takes a long time• Example: start a disk transfer,

disk interrupts when transfer is finished• processor can do something else in the meantime

When event is rare but critical• Example: building on fire -- save and shut down!

Page 24: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-24

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

How is Interrupt Signaled?External interrupt signal: INT• device sets INT=1 when it wants to cause an interrupt

Interrupt vector• 8-bit signal for device to identify itself

(may be different for other processors)• also used as entry into system control block,

which gives starting address of Interrupt Service Routine (ISR)like TRAP

What if more than one device wants to interrupt?• external logic controls which one gets to drive signals

ControllerCPUINT

vector

Device

Page 25: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-25

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

How does Processor Handle It?Look at INT signal just before entering FETCH phase.

• If INT=1, don’t fetch next instruction.• Instead:

save state (PC and condition codes) on stackuse vector to fetch ISR starting address; put in PC

After service routine,RTI instruction restores condition codes and old PC

• need a different return instruction,because RET gets PC from R7, no condition codes

Processor only checks between STORE and FETCH phases -- why?

Page 26: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-26

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

More ControlAt the device• control register has “Interrupt Enable” bit• must be set for interrupt to be generated

At the processor• sometimes have “Interrupt Mask” register (LC-2 does not)• when set, processor ignores INT signal• why?

Example: don’t want to interrupt while in ISR

KBSRready

interrupt enable

interrupt signalto processor

Page 27: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-27

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example (1)

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

/ / / / / /

x3006PC

R6

Program A

ADDx3006

Executing ADD at location x3006 when Device B interrupts.

Page 28: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-28

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example (2)

/ / / / / /

x3007

CC for ADD

/ / / / / /

/ / / / / /

x6200PC

R6

Program A

ADDx3006

Push PC and condition codes onto stack, then transfer toDevice B service routine (at x6200).

x6200

ISR forDevice B

x6210 RTI

Page 29: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-29

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example (3)

/ / / / / /

x3007

CC for ADD

/ / / / / /

/ / / / / /

x6203PC

R6

Program A

ADDx3006

Executing AND at x6202 when Device C interrupts.

x6200

ISR forDevice B

ANDx6202

x6210 RTI

Page 30: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-30

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example (4)

/ / / / / /

x3007

CC for ADD

x6203

CC for AND

x6300PC

R6

Program A

ADDx3006

x6200

ISR forDevice B

ANDx6202

ISR forDevice C

Push PC and condition codes onto stack, then transfer toDevice C service routine (at x6300).

x6300

x6315 RTI

x6210 RTI

Page 31: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-31

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example (5)

/ / / / / /

x3007

CC for ADD

x6203

CC for AND

x6203PC

R6

Program A

ADDx3006

x6200

ISR forDevice B

ANDx6202

ISR forDevice C

Execute RTI at x6315; pop CC and PC from stack.

x6300

x6315 RTI

x6210 RTI

Page 32: Chapter 10 And, Finally.... Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10-2 A Final Collection of ISA-related.

10-32

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example (6)

/ / / / / /

x3007

CC for ADD

x6203

CC for AND

x3007PC

R6

Program A

ADDx3006

x6200

ISR forDevice B

ANDx6202

ISR forDevice C

Execute RTI at x6210; pop CC and PC from stack.Continue Program A as if nothing happened.

x6300

x6315 RTI

x6210 RTI