Solved

"Too Many Memory References"

Posted on 2006-11-28
1
1,282 Views
Last Modified: 2012-05-05
Why does asm report:
   seqtoccr.as2:235: Error: too many memory references for `int'
   seqtoccr.as2:236: Error: too many memory references for `int'
   seqtoccr.as2:237: Error: too many memory references for `int'
   seqtoccr.as2:238: Error: too many memory references for `int'
   seqtoccr.as2:239: Error: too many memory references for `int'
   seqtoccr.as2:240: Error: too many memory references for `int'
   seqtoccr.as2:241: Error: too many memory references for `int'
   seqtoccr.as2:242: Error: too many memory references for `int'

for these lines of code:

               int      0x00000001,0x00000002,0x00000004,0x00000008
               int      0x00000010,0x00000020,0x00000040,0x00000080
               int      0x00000100,0x00000200,0x00000400,0x00000800
               int      0x00001000,0x00002000,0x00004000,0x00008000
               int      0x00010000,0x00020000,0x00040000,0x00080000
               int      0x00100000,0x00200000,0x00400000,0x00800000
               int      0x01000000,0x02000000,0x04000000,0x08000000
               int      0x10000000,0x20000000,0x40000000,0x80000000

     Syntax looks OK per the GNU Assembler manual.  What's coming into play to cause these errors?

Thanks
0
Comment
Question by:apx_31088
1 Comment
 
LVL 11

Accepted Solution

by:
dimitry earned 250 total points
Comment Utility
Doesn't it suppose to be:
.int      0x00000001,0x00000002,0x00000004,0x00000008
.int      0x00000010,0x00000020,0x00000040,0x00000080
.int      0x00000100,0x00000200,0x00000400,0x00000800
.int      0x00001000,0x00002000,0x00004000,0x00008000
.int      0x00010000,0x00020000,0x00040000,0x00080000
.int      0x00100000,0x00200000,0x00400000,0x00800000
.int      0x01000000,0x02000000,0x04000000,0x08000000
.int      0x10000000,0x20000000,0x40000000,0x80000000
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
changing serial number on bios of phoenix bios 11 1,318
Get register length/size? 5 592
DOS Dongle bypassing 10 1,521
Software clock vs system clock confusion 12 453
This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now