TOPS-20 DDT Manual | Electronic distribution with Autopatch Tape 16 | August 1987 This manual describes the use of TOPS-20 DDT, the Dynamic Debugging Tool for MACRO-20 programs. | This manual updates the _______ ___ ______ | TOPS-20 DDT Manual printed for | TOPS-20 6.1. This version of | the manual is not printed and | is not available from DIGITAL | in printed form. It is | distributed on the Autopatch | tape #16 for TOPS-20 in .MEM | file format only. You can | print this file on any | printer; page length has been | set at 58 lines. Change bars | indicate changes and bullets | indicate data deletions since | the previous version of this | manual. OPERATING SYSTEM: TOPS-20 V6.1 | SOFTWARE: DDT V44C(670) digital equipment corporation marlboro, massachusetts First Printing, May 1985 | Autopatch Revision, August 1987 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may only be used or copied in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by DIGITAL or its affiliated companies. | Copyright (C) 1985, 1987, Digital Equipment Corporation. All Rights Reserved. The following are trademarks of Digital Equipment Corporation: DEC DECnet IAS DECUS DECsystem-10 MASSBUS Digital Logo DECSYSTEM-20 PDT PDP DECwriter RSTS UNIBUS DIBOL RSX VAX EduSystem VMS VT CONTENTS PREFACE CHAPTER 1 INTRODUCTION TO DDT 1.1 SYMBOLIC DEBUGGING . . . . . . . . . . . . . . . . 1-1 1.2 TOPS-20 VARIANTS OF DDT . . . . . . . . . . . . . 1-1 CHAPTER 2 GETTING STARTED WITH DDT 2.1 INTRODUCTION . . . . . . . . . . . . . . . . . . . 2-1 2.2 LOADING DDT . . . . . . . . . . . . . . . . . . . 2-1 2.3 BASIC FUNCTIONS . . . . . . . . . . . . . . . . . 2-2 2.3.1 Error Conditions . . . . . . . . . . . . . . . . 2-3 2.3.2 Basic Concepts . . . . . . . . . . . . . . . . . 2-4 2.3.3 Starting and Stopping the Program . . . . . . . 2-5 2.3.4 Examining and Modifying Memory . . . . . . . . . 2-6 2.3.5 Executing Program Instructions . . . . . . . . . 2-9 2.4 A SAMPLE DEBUGGING SESSION USING DDT . . . . . . 2-10 2.5 PROGRAMMING WITH DDT IN MIND . . . . . . . . . . 2-21 CHAPTER 3 DDT COMMAND FORMAT 3.1 COMMAND SYNTAX . . . . . . . . . . . . . . . . . . 3-1 3.2 INPUT TO DDT . . . . . . . . . . . . . . . . . . . 3-2 3.2.1 Values in DDT Expressions . . . . . . . . . . . 3-2 3.2.2 Operators in DDT Expressions . . . . . . . . . . 3-7 CHAPTER 4 DISPLAYING AND MODIFYING MEMORY 4.1 DISPLAY MODES . . . . . . . . . . . . . . . . . . 4-1 4.1.1 Default Display Modes . . . . . . . . . . . . . 4-1 4.1.2 Selecting Display Modes . . . . . . . . . . . . 4-2 4.2 DISPLAYING EXPRESSIONS . . . . . . . . . . . . . . 4-6 4.3 DISPLAYING BYTE POINTERS . . . . . . . . . . . . . 4-6 4.4 DISPLAYING AND DEPOSITING IN MEMORY . . . . . . . 4-7 4.4.1 Commands that Use the Current Location . . . . 4-10 4.4.2 Commands that Use the Location Sequence Stack 4-11 4.4.3 Commands that Use an Address within the Command 4-12 4.5 DISPLAYING ASCIZ STRINGS . . . . . . . . . . . . 4-19 4.6 ZEROING MEMORY . . . . . . . . . . . . . . . . . 4-19 4.7 AUTOMATIC WRITE-ENABLE . . . . . . . . . . . . . 4-20 4.8 AUTOMATIC PAGE CREATION . . . . . . . . . . . . 4-21 4.9 DISPLAYING PAGE ACCESSIBILITY INFORMATION . . . 4-22 4.10 WATCHING A MEMORY LOCATION . . . . . . . . . . . 4-23 4.11 TTY CONTROL MASK . . . . . . . . . . . . . . . . 4-23 iii CHAPTER 5 CONTROLLING PROGRAM EXECUTION 5.1 BEGINNING EXECUTION . . . . . . . . . . . . . . . 5-1 5.2 USING BREAKPOINTS . . . . . . . . . . . . . . . . 5-1 5.2.1 Setting Breakpoints . . . . . . . . . . . . . . 5-3 5.2.2 Proceeding from Breakpoints . . . . . . . . . . 5-6 5.2.3 Conditional Breakpoints . . . . . . . . . . . . 5-9 5.2.4 The "Unsolicited" Breakpoint . . . . . . . . . 5-10 5.3 EXECUTING EXPLICIT INSTRUCTIONS . . . . . . . . 5-11 5.4 SINGLE-STEPPING INSTRUCTIONS . . . . . . . . . . 5-11 5.5 EXECUTING SUBROUTINES AND RANGES OF INSTRUCTIONS 5-13 5.5.1 Single-Stepping "Dangerous" Instructions . . . 5-15 5.6 USER-PROGRAM CONTEXT . . . . . . . . . . . . . 5-16 CHAPTER 6 SEARCHING FOR DATA PATTERNS IN DDT CHAPTER 7 MANIPULATING SYMBOLS IN DDT 7.1 OPENING AND CLOSING SYMBOL TABLES . . . . . . . . 7-1 7.2 DEFINING SYMBOLS . . . . . . . . . . . . . . . . . 7-2 7.3 SUPPRESSING SYMBOL TYPEOUT . . . . . . . . . . . . 7-3 7.4 KILLING SYMBOLS . . . . . . . . . . . . . . . . . 7-3 7.5 CREATING UNDEFINED SYMBOLS . . . . . . . . . . . . 7-4 7.6 FINDING WHERE A SYMBOL IS DEFINED . . . . . . . . 7-4 7.7 SEARCHING FOR SYMBOLS . . . . . . . . . . . . . . 7-5 7.8 LISTING UNDEFINED SYMBOLS . . . . . . . . . . . . 7-5 7.9 LISTING SYMBOLS . . . . . . . . . . . . . . . . . 7-5 7.10 LOCATING SYMBOL TABLES WITH PROGRAM DATA VECTORS . 7-6 CHAPTER 8 INSERTING PATCHES WITH DDT CHAPTER 9 FILDDT 9.1 INTRODUCTION . . . . . . . . . . . . . . . . . . . 9-1 9.2 USING FILDDT . . . . . . . . . . . . . . . . . . . 9-1 9.2.1 FILDDT Commands . . . . . . . . . . . . . . . . 9-3 9.2.2 Symbols . . . . . . . . . . . . . . . . . . . . 9-4 9.2.3 Commands to Establish Formats and Parameters . . 9-4 9.2.4 Commands to Access the Target and Enter DDT . . 9-5 9.2.5 Exiting FILDDT . . . . . . . . . . . . . . . . . 9-8 CHAPTER 10 PRIVILEGED MODES OF DDT 10.1 MDDT . . . . . . . . . . . . . . . . . . . . . . 10-2 10.2 KDDT . . . . . . . . . . . . . . . . . . . . . . 10-3 10.3 EDDT . . . . . . . . . . . . . . . . . . . . . . 10-4 iv CHAPTER 11 PHYSICAL AND VIRTUAL ADDRESSING COMMANDS CHAPTER 12 EXTENDED ADDRESSING 12.1 LOADING DDT INTO AN EXTENDED SECTION . . . . . . 12-1 12.2 EXAMINING AND CHANGING MEMORY . . . . . . . . . 12-2 12.3 BREAKPOINTS . . . . . . . . . . . . . . . . . . 12-2 12.3.1 The Breakpoint Block . . . . . . . . . . . . . 12-2 12.3.2 Enabling and Disabling Inter-section Breakpoints . . . . . . . . . . . . . . . . . 12-3 12.4 DISPLAYING SYMBOLS IN NONZERO SECTIONS . . . . . 12-4 12.5 DEFAULT SECTION NUMBERS . . . . . . . . . . . . 12-5 12.5.1 Permanent Default Section . . . . . . . . . . 12-6 12.5.2 Floating Default Section . . . . . . . . . . . 12-6 12.6 EXECUTING SINGLE INSTRUCTIONS . . . . . . . . . 12-8 12.7 ENTERING PATCHES IN EXTENDED SECTIONS . . . . . 12-8 APPENDIX A ERROR MESSAGES GLOSSARY INDEX FIGURES 2-1 Sample Program X.MAC . . . . . . . . . . . . . . 2-11 2-2 Annotated Debugging Session . . . . . . . . . . 2-12 2-3 Terminal Display of Debugging Session . . . . . 2-20 4-1 DDT Session Showing Columnar Output . . . . . . 4-25 8-1 Annotated Patching Session . . . . . . . . . . . . 8-4 8-2 Terminal Display of Patching After an Instruction 8-5 8-3 Terminal Display of Patching Before an Instruction 8-6 TABLES 3-1 Commands that Return Values . . . . . . . . . . . 3-3 3-2 Effects of Operators When Evaluating Expressions . 3-8 4-1 Evaluation of Symbolic Display Mode . . . . . . . 4-1 4-2 DDT Display Modes . . . . . . . . . . . . . . . . 4-4 4-3 Commands to Display Expressions . . . . . . . . . 4-6 4-4 DDT Commands to Display Memory . . . . . . . . . . 4-9 4-5 TTY Control Mask . . . . . . . . . . . . . . . . 4-24 5-1 Breakpoint Locations of Interest . . . . . . . . . 5-2 5-2 User-Program Context Values . . . . . . . . . . 5-16 vi PREFACE MANUAL OBJECTIVES AND AUDIENCE This manual explains and illustrates the features of TOPS-20 DDT, the debugger for MACRO-20 programs. Although TOPS-20 DDT can be used to debug the compiled code of programs written in higher-level languages, this manual illustrates the use of TOPS-20 DDT to debug programs written in MACRO-20 only. This manual is both an introduction to the basic functions of TOPS-20 DDT and a reference guide to all TOPS-20 DDT commands and functions. This manual assumes that the reader is familiar with using TOPS-20, has done some programming in MACRO-20, and is familiar with the format of MACRO-20 instructions. STRUCTURE OF THIS DOCUMENT This manual has 12 chapters, one appendix, and one glossary. o Chapter 1 introduces the concept of symbolic debugging and describes the variants of TOPS-20 DDT. o Chapter 2 describes loading TOPS-20 DDT with your program, discusses basic TOPS-20 DDT commands, and illustrates a sample debugging session. o Chapter 3 explains the syntax of a DDT command. Chapter 3 also describes expressions to enter data and explains how TOPS-20 DDT evaluates expressions. o Chapter 4 discusses how to examine and modify a program using TOPS-20 DDT. o Chapter 5 describes the use of TOPS-20 DDT to control program execution: how to start, stop, and monitor the running of a program. vii o Chapter 6 explains how to perform searches of a program's address space using TOPS-20 DDT. o Chapter 7 discusses the manipulation of program symbols using TOPS-20 DDT. o Chapter 8 describes how to use the TOPS-20 DDT patching function to insert and test a new series of instructions in your program without reassembling the program. o Chapter 9 describes the use of FILDDT. o Chapter 10 describes the use of the privileged DDTs: KDDT and MDDT. o Chapter 11 describes special-use commands that control physical and virtual addressing. These commands are useful primarily when running EDDT and FILDDT. o Chapter 12 describes the use of DDT in non-zero sections (NZS). o Appendix A explains DDT and FILDDT error messages. o The glossary defines important TOPS-20 DDT terms. OTHER DOCUMENTS Other documents to which the reader should have access are: _____ _________ _________ ______ o MACRO Assembler Reference Manual _______ ____ _________ ______ o TOPS-20 LINK Reference Manual _______ ________ _________ ______ o TOPS-20 Commands Reference Manual _________________________ _________ _________ ______ o DECsystem-10/DECSYSTEM-20 Processor Reference Manual _______________ _______ ______ _________ ______ o TOPS-10/TOPS-20 RSX-20F System Reference Manual viii CONVENTIONS The following conventions are used in this manual in the description of DDT commands and concepts. {} Curly brackets (braces) indicate that the enclosed item is optional. . (period) The address contained in DDT's location counter; also _______ ________ called the current location. addr A symbolic location within a program, a symbolic or absolute address in memory, an AC, or ".", the current location. c A single ASCII or SIXBIT character. expr Any expression that is legal in DDT. filnam One or more components of a file specification. instr Any instruction in the PDP-10 machine instruction set. location sequence stack A circular stack of memory locations that is used to store the addresses of certain previously referenced locations. n A numeric argument. page A page in memory. A page equals 512 words of memory. symbol A symbol name of up to 6 RADIX50 characters. text Any string of ASCII or SIXBIT characters. word Any 36-bit value occupying one word of memory. <ESC> Represents pressing the ESCAPE or ALTMODE key once. <ESC><ESC> Represents pressing the ESCAPE or ALTMODE key twice. <CTRL/X> Represents pressing a key (represented by X) at the same time as you press the key labeled CTRL. <BKSP> represents pressing the BACKSPACE key or <CTRL/H>. <LF> Represents pressing the LINE FEED key. <RET> Represents pressing the RETURN key. <TAB> Represents pressing the TAB key or <CTRL/I>. ix Numbers are in octal radix unless otherwise specified. Examples of interaction between the user and DDT show user input in lowercase and DDT output in uppercase. The symbols <BKSP>, <CTRL/x>, <ESC>, <LF>, <RET>, and <TAB> always represent user input. NOTE The descriptions of many DDT commands list the actions and effects of those commands. The actions and effects may not occur in precisely the order specified, but this has no effect on the user. x 1-1 CHAPTER 1 CHAPTER 1 INTRODUCTION TO DDT INTRODUCTION TO DDT DDT is a utility program you can use to help you debug your MACRO-20 programs. This manual describes how to use the DDT utility. 1.1 SYMBOLIC DEBUGGING 1.1 SYMBOLIC DEBUGGING It is sometimes difficult to understand precisely the operation of a program by reading the source code. DDT is a tool for interactively examining the operation of a MACRO-20 program while it is running. DDT is useful for finding programming errors (bugs) in programs that do not run correctly. You can also use DDT to analyze the flow of control in a program that is to be revised or rewritten. With DDT, you can interrupt the execution of your program at locations (breakpoints) you choose, and then examine and modify the program's address space as required. You can execute instructions one-by-one to check whether the effect of each instruction is what is intended. You can then set other breakpoints in your program before continuing execution. When you refer to program locations and values, DDT allows you to use the symbols that are defined in the program rather than absolute values and addresses. This makes it much easier to refer to the source listing and to find specific locations in memory. After modifying the program's instructions or data, you can exit DDT and save (with the monitor-level SAVE command) the changed version of the program for further testing. 1.2 TOPS-20 VARIANTS OF DDT 1.2 TOPS-20 VARIANTS OF DDT There are several variants of DDT, each useful under specific circumstances or for specific tasks. 1-1 INTRODUCTION TO DDT INTRODUCTION TO DDT The variants of TOPS-20 DDT are: o EDDT o FILDDT o KDDT o MDDT o RDDT o SDDT o UDDT o XDDT EDDT is used to debug programs that run in executive mode (such as BOOT), and is described in Chapter 10. FILDDT is used to examine and patch disk files and structures. You can also use FILDDT to examine the running monitor. FILDDT is described in Chapter 9. KDDT is used to debug and patch monitor .EXE files and the running monitor, and is described in Chapter 10. MDDT is used to debug and patch the running monitor, and is described in Chapter 10. RDDT is a relocatable variant of DDT that can be used to debug programs in user mode. If your program is in memory (and has been loaded with RDDT as below), you invoke RDDT by entering (at TOPS-20 command level): START You load RDDT with your program by running LINK as follows: @LINK *MYPROG,SYS:RDDT.REL/GO where MYPROG is the name of your program. Loading RDDT.REL with your program does not prevent you from using other LINK features. You must load RDDT.REL last, or its start address is lost. RDDT.REL is useful in situations where you do not wish to have DDT loaded at its default location. This example shows only the minimal steps required to load the ____ _________ ______ relocatable DDT with your program. See the LINK Reference Manual for further information about using LINK. 1-2 INTRODUCTION TO DDT INTRODUCTION TO DDT SDDT is a "stub" that places XDDT in its own section, with system symbols defined as in MONSYM and MACSYM. SDDT is the DDT variant invoked when, at TOPS-20 command level, you enter: SDDT SDDT exists so that entering SDDT invokes DDT version 44 in the same manner as previous versions. UDDT is a "stub" that resides in your user program's section if the program has a TOPS-10-style entry vector and the program entry vector is in section zero. This is done for compatibility with programs that use locations 770000, 770001 and 770002. If you load a program in section zero and the program has a TOPS-10-style entry vector, when you use the DDT command, the EXEC loads the UDDT stub into your program's section at address 770000. UDDT then loads XDDT into the highest-numbered free (nonexistent) section (if XDDT is not already loaded), and starts XDDT. XDDT is the DDT variant normally used to debug user programs. If you load your program in a nonzero section or the program does not have a TOPS-10-style entry vector, the DDT command causes the EXEC to load XDDT directly into the highest-numbered free section. XDDT is also invoked by the SDDT and UDDT stubs. If you type in XDDT while at TOPS-20 command level, the EXEC loads XDDT into section zero, with system symbols defined. 1-3 1-4 CHAPTER 2 CHAPTER 2 GETTING STARTED WITH DDT GETTING STARTED WITH DDT 2.1 INTRODUCTION 2.1 INTRODUCTION This chapter is an introduction to using DDT. It describes how to load DDT with your program and shows how to perform basic DDT functions. It then illustrates a sample session debugging a simple MACRO-20 program, using basic DDT functions. You can use DDT to debug programs, using only the commands described in this chapter. Once you are familiar with using these commands, you may wish to learn how to use the commands and functions that are described in the rest of the manual, to perform more sophisticated debugging. The commands used in this chapter are described only in sufficient detail for the debugging task being performed; all commands are thoroughly described in Chapters 3 through 11 of this document. _____ The best way to learn is by doing. You will learn the commands and techniques discussed in this manual if you use them as you read about them. If you have a MACRO-20 program that you wish to debug, use it to practice the commands discussed here. If not, type in the program X.MAC listed in Figure 2-1. 2.2 LOADING DDT 2.2 LOADING DDT | It is much easier to debug a program when you can use the symbols that | are defined in the program. For you to be able to use program | symbols, DDT must have access to your program's symbol table. One way | to provide this access is to use the TOPS-20 DEBUG command to load DDT | with your program and retain your program symbols. Load an existing | MACRO-20 program with the TOPS-20 DEBUG command as follows: | | DEBUG filnam | 2-1 GETTING STARTED WITH DDT GETTING STARTED WITH DDT ______ | where filnam is the name of your MACRO-20 program. The following | appears on your terminal (if your .REL file is older than your .MAC | file, MACRO-20 reassembles your program, otherwise the second line | does not appear): | | @DEBUG PROG | MACRO: filnam | LINK: Loading | [LNKDEB DDT execution] | DDT | ______ | where filnam is the name of your MACRO-20 program (with default | extension .MAC). The last line (DDT) indicates that DDT is loaded, | and is ready to accept your commands. 2.3 BASIC FUNCTIONS 2.3 BASIC FUNCTIONS You must be able to perform certain basic functions to interactively debug a program. Basic DDT functions are: o starting the program o stopping the program at specified locations o examining and modifying memory o executing program instructions one-at-a-time o continuing execution of the program | | o deleting input o exiting DDT You must give DDT commands to tell DDT what functions to perform. DDT does not wait for a line terminator (such as a carriage return) to indicate the end of your command. Instead, DDT reads your commands character-by-character as you enter them. When you enter a DDT command, you almost never have to press the RETURN key. This manual explicitly indicates the occasions when a command requires you to press the RETURN key. NOTE You must press the ESCAPE key as part of entering many DDT commands. This manual uses the symbol <ESC> to indicate where you press the ESCAPE key. When you press the ESCAPE key, DDT displays a dollar sign ($) on the screen. DDT never displays <ESC> when you press the ESCAPE key. 2-2 GETTING STARTED WITH DDT GETTING STARTED WITH DDT NOTE This manual uses the symbols <BKSP>, <ESC>, <LF>, <RET>, and <TAB> to indicate where you press the BACKSPACE, ESCAPE, LINE FEED, RETURN, and TAB keys, respectively. This manual also uses the symbol <CTRL/X> to indicate where you simultaneously press the CONTROL key and the key indicated by X. These symbols ALWAYS indicate where you press the specific keys noted here. You need NEVER enter the characters ______ _____ ____ _____ _____ ________ <BKSP>, <ESC>, <LF>, <RET>, <TAB>, or <CTRL/X>, to enter a DDT command. Your commands appear on the screen as you type them. Use the DELETE key to delete partially entered commands character-by-character. If you try to delete more characters than you have entered, DDT displays: XXX You can delete an entire command line with <CTRL/U>. When you do, DDT displays: XXX To exit DDT, enter: <CTRL/Z> The other basic DDT functions are described in the rest of this chapter. 2.3.1 Error Conditions 2.3.1 Error Conditions If DDT cannot execute a command, it displays a message to let you know. The message may be only a single character (such as M or U, for _ _ Multiply-defined symbol or Undefined symbol), a question mark (?), or a complete message string. For most errors, DDT also sets a pointer to the error string, so that if DDT did not display it, you can enter a command to display the error string. The error string is available for display until another error occurs, when DDT changes the pointer. To display the error string that describes the last DDT error, enter: <ESC>? (press the ESCAPE key, followed by a question mark). o 2-3 GETTING STARTED WITH DDT GETTING STARTED WITH DDT 2.3.2 Basic Concepts 2.3.2 Basic Concepts _______ ________ A very useful DDT concept is that of the current location. The current location is a memory location that you have referenced, either implicitly or explicitly, with your last command, and that is the default point of reference of your next command. The current location can be thought of as the location "where you are". The symbol "." (period) refers to the address of the current location, and can be used as an argument in DDT commands. ________ _______ The location counter is a DDT pointer that contains the address of the current location. The location counter performs a function similar to that of a bookmark. You can enter a command to display the contents of a specific location but not change the address of the current location, in order to maintain a specific point of reference for your next command. Most DDT commands change the address of the current location, and therefore also change the location counter. The commands that do not change the current location are so indicated. ____ ________ The open location is a memory word that can be modified by your next command. DDT "opens" the location as a result of a command you give to examine or modify memory. There is never more than one location open at any given time. The open location is usually also the current location. __ ____ ___ ________ _______ __ ___ _______ ________ To find the symbolic address of the current location, enter: ._ (a period followed by an underscore) This causes DDT to display the following: ADDR1+n where ADDR1 is a label defined in your program, and n is the offset of the current location from that label (if the current location is __ ADDR1, DDT does not display +n). _______ ________ Another useful DDT concept is that of the current quantity. This is a value that is the contents of the last word that DDT displayed, or the value that you last deposited in memory. The current quantity is the most recent of those values. Many DDT commands use arguments that default to the current quantity. ________ ________ _____ The location sequence stack is a DDT storage area used to store the addresses of previous current locations. Certain DDT commands store the address of the current location on the location sequence stack. Other DDT commands change the address of the current location to an address that has already been stored on the location sequence stack. The location sequence stack functions in a fashion similar to inserting place-markers in a source code listing, to be able to "get back" to prior references. 2-4 GETTING STARTED WITH DDT GETTING STARTED WITH DDT 2.3.3 Starting and Stopping the Program 2.3.3 Starting and Stopping the Program When your program is loaded and DDT is ready to accept your commands ___ (as indicated by DDT appearing on the terminal display), you can begin execution of your program at its start address by entering: <ESC>G ___________ Unless you set one or more breakpoints before you start the program, your program runs either to completion or until it commits a fatal error. A breakpoint is a location in a program's executable code that __ has been modified so that if the program attempts to execute the ______ instruction at that location, control passes to DDT before the instruction is executed. The command to set a breakpoint is: addr<ESC>B ____ where addr is the address at which to stop execution. If the user-program PC reaches addr, DDT interrupts execution of the program before the program executes the instruction at the specified address. When DDT interrupts program execution at a breakpoint, it changes the current location to the breakpoint and opens the current location (the breakpoint). While program execution is stopped at a breakpoint, you can display and change the contents of instruction and data words, remove breakpoints, set new breakpoints, and execute instructions one at a time (single-step). As you examine memory, you may find an instruction that is incorrect, and modify it. You can also examine and modify data words in memory. After modifying incorrect instructions and data in memory, you can immediately execute the instructions to check the effects of the modifications, without having to reassemble the source code. Once you have made your changes, you can continue program execution at the place where execution was interrupted, restart the program at the beginning, or start execution at any other location you choose. The program will run to completion, until it reaches a breakpoint, or until it gets a fatal error. 2-5 GETTING STARTED WITH DDT GETTING STARTED WITH DDT 2.3.4 Examining and Modifying Memory 2.3.4 Examining and Modifying Memory One command to examine memory is: addr/ ____ where addr is the address of the memory word you wish to examine (display), and can be numeric or symbolic. DDT displays the contents of the word located at addr. If the opcode field (bits 0-8) of the memory word matches a recognized instruction or user-defined OPDEF, DDT displays the contents of addr as an instruction (or OPDEF). If DDT finds (in the symbol table) any of the values to be displayed, DDT displays those symbols rather than the numeric values. For example, either of the following display lines might appear on your terminal (depending on the address and contents of the word): ADDR1/ MOVE 2,SYM1 ADDR1+5/ SYM1,,SYM2 where ADDR1, SYM1, and SYM2 have been defined in the program. If you enter a symbol that DDT does not find in the symbol table, DDT _ sounds the terminal buzzer or bell, and displays U on the screen. If you enter a symbol that is defined as a local symbol in more than one _ module, DDT sounds the terminal buzzer or bell and displays M. You can eliminate the multiply-defined symbol problem by "opening" the symbol table of the module in which the correct symbol is defined. See Chapter 7 (Manipulating Symbols in DDT) for more information. When searching for a symbol to display, DDT uses global symbols in preference to local symbols. However, DDT searches the "open" symbol table first, and treats local symbols found in the open symbol table as global symbols. If DDT finds only a local symbol that is not in the open symbol table, DDT displays the symbol with a pound-sign (#) appended to the symbol. For example, DDT might display: ADDR#/ MOVE 2,SYM1# See Chapter 7 (Manipulating Symbols in DDT) for more information on symbols and symbol tables. _____ ____ The command addr/ changes the current location to addr and opens the ____ word at addr. ____ _____ If you omit addr from an examine-memory command, such as addr/, DDT uses the current quantity to determine the address of the location to display. For example, after DDT displays the contents of ADDR1+5 as above, if you enter "/", DDT displays the contents of the word located at SYM2. The display line then appears: ADDR1+5/ SYM1,,SYM2 / value 2-6 GETTING STARTED WITH DDT GETTING STARTED WITH DDT _____ where value is the contents of the word located at SYM2. By default, _____ DDT displays value symbolically if it can. ____ The command / by itself (without addr) does not change the current location. Both forms of the / command open the location displayed, enabling you to modify the location with your next command. Another very useful command for examining memory is <TAB>. This | command starts a new display line before displaying the contents of ____ | addr, making the display easier to read. For example, if you enter <TAB> after DDT displays the address and contents of ADDR1+5 (as above) on your terminal, the terminal display appears: ADDR1+5/ SYM1,,SYM2 <TAB> SYM2/ value _____ where value is the contents of the word located at SYM2. <TAB> does not appear on the screen, but is shown above to indicate where you | press the <TAB> key. <TAB> changes the current location to SYM2 and | opens the word at SYM2. In this example, the current quantity becomes _____ | value. <TAB> also stores the address of the current location (ADDR1+5) on the location sequence stack before changing the current location to the location just displayed (SYM2). DDT uses the location sequence stack to "remember" previous values of the location counter. To "get back" to the previous current location, enter: <ESC><RET> In the above example, after you press <TAB> at ADDR1+5, DDT displays the contents of SYM2 and changes the current location to SYM2. When you enter <ESC><RET>, DDT changes the current location to ADDR1+5, opens the location at ADDR1+5, and again displays the contents of ADDR1+5. o _________ ____ If you use the command addr<TAB>, DDT deposits addr in the open ____ location and closes the location before opening the location at addr and displaying its contents. <TAB> by itself does not deposit anything, but does save the current location on the location sequence stack, making <TAB> more useful than / (slash by itself). You can display and open the word after the current location by entering: <LF> 2-7 GETTING STARTED WITH DDT GETTING STARTED WITH DDT DDT changes the current location to the next word in memory, starts a new line, and displays the address of the (new) current location (as a symbol or a symbol plus an offset, if it can find a corresponding symbol in the symbol table), displays the contents of the current location, and opens the current location. For example, to display the next word in memory after ADDR1+5, enter: <LF> DDT changes the current location to ADDR1+6, starts a new line, and displays the address and contents of ADDR1+6. The screen display then appears as follows: ADDR1+5/ SYM1,,SYM2 <LF> ADDR1+6/ -1,,SYM3 ____ Note that DDT does not display the characters <LF>. <LF> does not affect the location sequence stack. Entering another <LF> causes DDT to display and open the next word. ________ To display and open the word previous to the current location, enter: <BKSP> DDT changes the current location to the previous word, starts a new line, displays the address and contents of the (new) current location, and opens the current location. <BKSP> does not affect the location sequence stack. For example, if you enter <BKSP> to open and display the location before ADDR1+5, the screen appears as follows: ADDR1+5/ SYM1,,SYM2 <BKSP> ADDR1+4/ -3,,SYM2 ______ Note that <BKSP> does not appear on the screen. To change the contents of the open location, enter: value<RET> _____ where value can be an instruction, a symbol, or a numeric expression. ______ For example, if you enter the command LABL2/, DDT displays the contents of the memory word at LABL2, and "opens" that word. If the word at LABL2 contains: MOVE 1,SYM1 and you wish to change SYM1 to SYM2, enter: MOVE 1,SYM2<RET> 2-8 GETTING STARTED WITH DDT GETTING STARTED WITH DDT DDT stores the new instruction in the location at LABL2 and "closes" the location. DDT does NOT display <RET>. The terminal display appears as follows (your input is in lowercase): labl2/ MOVE 1,SYM1 move 1,sym2<RET> The current location is still LABL2, but there is no open location. To check whether the instruction is now correct, you can enter: ./ to display the contents of the current location. The screen display now appears (your input is in lowercase): labl2/ MOVE 1,SYM1 move 1,sym2<RET> ./ MOVE 1,SYM2 After entering a command to display and open a location, if you enter: value<LF> DDT stores the new value, changes the current location to the next location in memory, starts a new display line and opens and displays the new current location. The example above would then appear as follows (your input is in lowercase): labl2/ MOVE 1,SYM1 move 1,sym2<LF> LABL2+1/ CONTENTS ________ where CONTENTS is the value stored at LABL2+1. o 2.3.5 Executing Program Instructions 2.3.5 Executing Program Instructions When you have interrupted program execution at a breakpoint, you can execute the next instruction (the one at the breakpoint), by entering: <ESC>X DDT executes the instruction, displays the results of executing the instruction, and displays the address and contents of the next instruction to be executed. This command changes the current location to the next instruction to be executed. For example, assume that the next instruction to be executed is located at LABEL1, which contains: MOVE 1,VARIBL 2-9 GETTING STARTED WITH DDT GETTING STARTED WITH DDT If the word at VARIBL contains SYM1, when you enter <ESC>X, DDT starts a new line and displays: 1/ SYM1 VARIBL/ SYM1 LABEL1+1/ instr _____ where instr is the contents of LABEL1+1, and is the next instruction to be executed. You can continue to execute instructions one-at-a-time by entering successive <ESC>X commands. This is known _______________ as single-stepping. _______ _ __________ To execute a subroutine, enter: <ESC><ESC>X | DDT executes the subroutine and returns control to you if the | subroutine returns to a location +1, +2, or +3 from the instruction | that calls the subroutine. DDT changes the current location to the | address of the next instruction to be executed. o ________ _________ __ ___ _______ To continue execution of the program until the next breakpoint or until program completion, enter: <ESC>P DDT starts the program running again, beginning with the next instruction to be executed. If you did not single-step any instructions, the program begins by executing the instruction at the breakpoint. If you have executed any instructions by single-stepping, the program continues where you stopped. The effect is as if the program were running without DDT in control. o 2.4 A SAMPLE DEBUGGING SESSION USING DDT 2.4 A SAMPLE DEBUGGING SESSION USING DDT This section describes a debugging session using DDT. The program being debugged is X.MAC, shown in Figure 2-1. The program and the sample session are for illustration only. There are many styles of programming and debugging, and these examples are descriptive rather than prescriptive in intent. You will understand this section and learn the commands described more easily if you type in the program listed in Figure 2-1 and use the commands as they are described. 2-10 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-1: Sample Program X.MAC Figure 2-1: Sample Program X.MAC SEARCH MONSYM TITLE X R0=0 ;AC0 IDX=6 ;INDEX REGISTER P=17 ;STACK COUNTER START:: MOVE P,PWORD ;Set up stack counter MOVEI IDX,TABLE1 ;Address of table with X & Y PUSHJ P,ADDEM ;Do the addition MOVEI IDX,TABLE1 ;Address of table MOVE R0,ANSWER(IDX) ;Answer to R0 JFCL 0 HALTF% ;All done! ADDEM: MOVE R0,X(IDX) ;Load X ADD R0,Y(IDX) ;X + Y MOVE R0,ANSWER(IDX) ;Store answer POPJ P, ;Return TABLE1: BLOCK 3 ;3 words X==0 ;Offset for X Y==1 ;Offset for Y ANSWER==2 ;Offset for answer STKSIZ==10 ;Stack size PWORD: IOWD STKSIZ,STACK ;Stack pointer STACK: BLOCK STKSIZ ;Stack END START Figure 2-2 is an annotated session debugging X.MAC, the program in Figure 2-1. In the annotated session, the DDT terminal display is on the left, user input is in the center in lowercase, and explanatory comments about the session are on the right. This is not always the way it appears on the terminal. Figure 2-3 shows the session as it actually appears on the terminal. The program is designed to pass the address of a table to a subroutine. The table contains three elements. The subroutine is to add the first two elements of the table and store the result in the third element before returning to the main program. There are no input or output routines in the program. The table is initialized using DDT, and the result is checked while in DDT. NOTE DDT does not display <LF>, <RET>, or <TAB>. These are shown in the sample session to indicate user input. 2-11 GETTING STARTED WITH DDT GETTING STARTED WITH DDT NOTE DDT does not display the AC field of an instruction if it is zero. This means that if your program contains the instruction MOVE R0,LABL1, where R0=0, DDT displays the instruction as MOVE LABL1. Figure 2-2: Annotated Debugging Session Figure 2-2: Annotated Debugging Session SCREEN DISPLAY USER INPUT EXPLANATION @ TOPS-20 prompt. debug x<RET> Begin the session by entering "debug x<RET>", where x is the name of your MACRO program. MACRO: X MACRO reassembles your program LINK: Loading (if needed), and LINK loads [LNKDEB DDT execution] your program with DDT. DDT DDT displays the "DDT" prompt. start/ Begin examining code at label "START". MOVE P,PWORD# DDT displays the instruction at START. <LF> Press <LF> to display the next instruction. .JBDA+1/ MOVEI IDX,TABLE1# The first symbol in this program happens to coincide with .JBDA, a JOBDAT symbol. When DDT scans the symbol table, it finds .JBDA before it finds START, and displays .JBDA instead. DDT still accepts START as an input symbol. Also note the pound-sign (#) appended to TABLE1 and PWORD. PWORD and TABLE1 are local symbols that are not in the open symbol table. 2-12 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-2: Annotated Debugging Session (Cont.) Figure 2-2: Annotated Debugging Session (Cont.) SCREEN DISPLAY USER INPUT EXPLANATION .jbda<ESC>k Enter .jbda<ESC>k to suppress DDT typeout of symbol .JBDA. DDT will display START rather than .JBDA from now on. x<ESC>: Enter the module name (X) followed by <ESC> and a colon to open the symbol table associated with X. DDT will not append any more pound-signs. <TAB> Press <TAB> to start a new display line, evaluate the current quantity as if it were an instruction, and display the contents of the location addressed by the Y field of the instruction. (Entering / (slash) displays the same word as <TAB>, but does not start a new line.) <TAB> also saves your place (like a bookmark) on the location sequence stack, so you can get back here easily. TABLE1/ 0 When you enter the <TAB> command, DDT displays the address and the contents of the location. The first element of the table contains zero. The <TAB> command also opens the location. 2<LF> Enter "2" followed by <LF> to deposit the value "2" in the first element, and to open and display the second element. TABLE1+1/ 0 The second element contains zero. 2-13 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-2: Annotated Debugging Session (Cont.) Figure 2-2: Annotated Debugging Session (Cont.) SCREEN DISPLAY USER INPUT EXPLANATION 3<LF> Enter "3" followed by <LF> to deposit the value "3" in the second element and open and display the third element. The addition to be performed by the program is 2+3. TABLE1+2/ 0 The third element (the answer) contains zero. <ESC><RET> Press <ESC>, then press <RET> to return to the address you saved on the location sequence stack. START+1/ MOVEI IDX,TABLE1 DDT displays the address and contents of the last location you displayed before you entered <TAB>. <LF> Press <LF> to look at the next location. START+2/ PUSHJ P,ADDEM This is the call to the subroutine that does the computation. .<ESC>b Enter ".", press <ESC>, and enter "b" to set a breakpoint at the current location. <ESC>g Enter <ESC>g to start program execution. $1B>>START+2/ PUSHJ P,ADDEM DDT displays the breakpoint number, the address of the breakpoint, and the instruction at the breakpoint. This instruction has not yet been executed. <ESC><ESC>x Press <ESC> twice, then enter "x" to let DDT execute the subroutine. 2-14 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-2: Annotated Debugging Session (Cont.) Figure 2-2: Annotated Debugging Session (Cont.) SCREEN DISPLAY USER INPUT EXPLANATION START+3/ MOVEI IDX,TABLE1 DDT returns from the subroutine at the next instruction, and displays the address and contents of the instruction. If there is a "skip return", DDT displays "<SKIP>" if the program skipped one instruction. If the program skips 2 or 3 instructions, DDT displays "<SKIP n>", where n is the number of instructions skipped. <ESC>x Press <ESC> and enter "x" to execute the instruction. IDX/ TABLE1 TABLE1 DDT displays the address and contents of IDX (the result of executing the instruction), and also displays "TABLE1" (the result of evaluating the Y field of the instruction). START+4/ MOVE 2(IDX) DDT then starts a new line and displays the address and contents of the next instruction. Note that DDT does not display the zero in the AC field of the instruction. <ESC><TAB> Press <ESC>, then <TAB> to display the contents of the location addressed by the instruction, using any indexing and indirection. (If you omit <ESC>, DDT uses only the Y field, without indexing and indirection.) TABLE1+2/ 0 The location addressed by the instruction is TABLE1+2, and its contents is zero. This is the table element that contains the answer, which should be 5. 2-15 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-2: Annotated Debugging Session (Cont.) Figure 2-2: Annotated Debugging Session (Cont.) SCREEN DISPLAY USER INPUT EXPLANATION <BKSP> Press <BKSP> to see the previous element in the table. TABLE1+1/ 3 This element contains 3. That is correct. <BKSP> Press <BKSP> again to check the previous element. TABLE1/ 2 This element contains 2. That is also correct. One way to find the error is to single-step through the program. start<ESC>b Enter "start", press <ESC>, and enter "b" to set a breakpoint at the beginning of the program. <ESC>g Press <ESC> and enter "g" to start the program again. $2B>>START/ MOVE P,PWORD DDT displays the breakpoint number, and the address and contents of the instruction at the breakpoint. <ESC>x Press <ESC>, then enter "x" to execute the instruction. This instruction moves a memory word to a register. P/ -10,,PWORD PWORD/ -10,,PWORD DDT displays the address and new contents of the register, and the address and contents of the memory word. START+1/ MOVEI IDX,TABLE1 DDT then displays the address and contents of the next instruction. 2-16 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-2: Annotated Debugging Session (Cont.) Figure 2-2: Annotated Debugging Session (Cont.) SCREEN DISPLAY USER INPUT EXPLANATION <ESC>x Press <ESC>, then enter "x" to execute this instruction, which moves an immediate value to a register. IDX/ TABLE1 TABLE1 DDT displays the address and new contents of the register, and the immediate value. START+2/ PUSHJ P,ADDEM DDT then displays the address and contents of the next instruction. <ESC>x Press <ESC>, then enter "x" to execute the instruction. P/ -7,,STACK DDT displays the address and new contents of the stack pointer used by the PUSHJ. <JUMP> DDT displays "<JUMP>" if the change in PC is less than one or greater than 4. ADDEM/ MOVE 0(IDX) DDT displays the address and contents of the next instruction to be executed. <ESC>x Press <ESC> and enter "x" to execute the instruction. 0/ 2 TABLE1/ 2 The instruction moved the contents of the word at TABLE1 (which is 2) to AC0. Looks OK so far. ADDEM+1/ ADD 1(IDX) DDT displays the next instruction. <ESC>x Press <ESC> and enter "x" to execute the instruction. 0/ 5 TABLE1+1/ 3 The instruction added the contents of the word at TABLE1+1 (which is 3) to AC0, which now contains 5. OK. 2-17 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-2: Annotated Debugging Session (Cont.) Figure 2-2: Annotated Debugging Session (Cont.) SCREEN DISPLAY USER INPUT EXPLANATION ADDEM+2/ MOVE 2(IDX) DDT displays the next instruction. <ESC>x Press <ESC> and enter "x" to execute the instruction. 0/ 0 TABLE1+2/ 0 The instruction moved the contents of the word at TABLE1+2 to AC0. The MOVE instruction at ADDEM+2 should be MOVEM. ADDEM+3/ POPJ P,0 DDT displays the next instruction (as a result of the <ESC>x). <BKSP> Press <BKSP> to display and open the location with the incorrect instruction. ADDEM+2/ MOVE 2(IDX) DDT displays the previous instruction. This is the incorrect instruction. movem r0,answer(idx)<RET> Enter the new instruction and press <RET>. ./ Check the current location to see what you deposited. MOVEM 2(IDX) Looks OK. .<ESC>b Set a breakpoint at ".", the current location. <ESC>g Restart the program at the beginning. $2B>>START/ MOVE P,PWORD DDT displays the breakpoint information. <ESC>p Press <ESC> and enter "p" to proceed from breakpoint 2 to the next breakpoint. 2-18 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-2: Annotated Debugging Session (Cont.) Figure 2-2: Annotated Debugging Session (Cont.) SCREEN DISPLAY USER INPUT EXPLANATION $1B>>START+2/ PUSHJ P,ADDEM DDT displays the breakpoint information. <ESC>p Proceed from breakpoint 1. $3B>>ADDEM+2/ MOVEM 2(IDX) DDT displays the breakpoint information. This is the instruction you changed. <ESC>x Single-step the instruction to watch what it does. 0/ 5 TABLE1+2/ 5 The instruction moves the contents of AC0 to the word at TABLE1+2. OK!! ADDEM+3/ POPJ P,0 DDT also displays the address and contents of the next instruction. start+4<ESC>b Set a breakpoint at START+4 to check the results. <ESC>p Proceed from breakpoint 3. $4B>>START+4/ MOVE 2(IDX) DDT displays the breakpoint information. <ESC>x Single-step the instruction. 0/ 5 TABLE1+2/ 5 The instruction moves the contents of the word at TABLE1+2 to AC0. The new value of AC0 is 5. OK! START+5/ JFCL 0 DDT displays the address and contents of the next instruction. <CTRL/Z> Quit. @ Back at TOPS-20 command level. 2-19 GETTING STARTED WITH DDT GETTING STARTED WITH DDT Figure 2-3 shows the session as it actually appears on the terminal screen. Again, user input is in lowercase. Comments on the right indicate where you enter characters that do not echo. Figure 2-3: Terminal Display of Debugging Session Figure 2-3: Terminal Display of Debugging Session @debug x MACRO: X LINK: Loading [LNKDEB DDT execution] DDT start/ MOVE P,PWORD# Enter <LF>. .JBDA+1/ MOVEI IDX,TABLE1# .jbda$k x$: Enter <TAB>. TABLE1/ 0 2 Enter <LF>. TABLE1+1/ 0 3 Enter <LF>. TABLE1+2/ 0 $ Enter <ESC><RET>. START+1/ MOVEI IDX,TABLE1 Enter <LF>. START+2/ PUSHJ P,ADDEM .$b $g $1B>>START+2/ PUSHJ P,ADDEM $$x START+3/ MOVEI IDX,TABLE1 $x IDX/ TABLE1 TABLE1 START+4/ MOVE 2(IDX) $ Enter <ESC><TAB>. TABLE1+2/ 0 Enter <BKSP>. TABLE1+1/ 3 Enter <BKSP>. TABLE1/ 2 start$b $g $2B>>START/ MOVE P,PWORD $x P/ -10,,PWORD PWORD/ -10,,PWORD START+1/ MOVEI IDX,TABLE1 $x IDX/ TABLE1 TABLE1 START+2/ PUSHJ P,ADDEM $x P/ -7,,STACK <JUMP> ADDEM/ MOVE 0(IDX) $x 0/ 2 TABLE1/ 2 ADDEM+1/ ADD 1(IDX) $x 0/ 5 TABLE1+1/ 3 ADDEM+2/ MOVE 2(IDX) $x 0/ 0 TABLE1+2/ 0 ADDEM+3/ POPJ P,0 Enter <BKSP>. ADDEM+2/ MOVE 2(IDX) movem r0,answer(idx) Enter <RET>. ./ MOVEM 2(IDX) .$b $g $2B>>START/ MOVE P,PWORD $p $1B>>START+2/ PUSHJ P,ADDEM $p $3B>>ADDEM+2/ MOVEM 2(IDX) $x 0/ 5 TABLE1+2/ 5 ADDEM+3/ POPJ P,0 start+4$b $p $4B>>START+4/ MOVE 2(IDX) $x 0/ 5 TABLE1+2/ 5 START+5/ JFCL 0 ^Z @ 2-20 GETTING STARTED WITH DDT GETTING STARTED WITH DDT 2.5 PROGRAMMING WITH DDT IN MIND 2.5 PROGRAMMING WITH DDT IN MIND There are a few MACRO-20 programming techniques that make debugging with DDT easier. These techniques primarily concern the use of labels and symbols. Labels that meaningfully describe (perhaps mnemonically) the function of the code are more helpful when examining code and setting breakpoints than labels that are alphanumerically coded (such as A0001). When using symbols as offsets into tables, you can prevent DDT from displaying the offset symbol in place of the symbol's numeric value if you define the symbol in this way: symbol==expression ______ Symbol is still entered in the symbol table, and you can use symbol as ______ input to DDT, but DDT does not display symbol on output. For example, if you have defined: OFFSET==3 DDT displays the contents of a word that contains the value of 3 as: addr/ 3 rather than: addr/ OFFSET _____ _________ where addr is the address of the word. See the MACRO Assembler _________ ______ Reference Manual for more information about defining symbols. 2-21 2-22 CHAPTER 3 CHAPTER 3 DDT COMMAND FORMAT DDT COMMAND FORMAT 3.1 COMMAND SYNTAX 3.1 COMMAND SYNTAX The complete syntax of a DDT command is: {arg1<}{arg2>}{arg3}{<ESC>{<ESC>}{arg4}}c{arg5} _ where arg1, arg2, arg3, arg4, and arg5 are arguments to the command c. Arg1, arg2, and arg3 can be any legal DDT expression. Arg1 must be followed by a left angle bracket (<), and arg2 must be followed by a right angle bracket (>). Arg4 can only be a number. Arg5 is a text argument of the form: /text/ or c<ESC> where text is a string of characters, the slashes (/) are delimiters that can be any character not contained in text, and c is a single character. DDT commands never use all five arguments. Each argument is optional or required according to the syntax of the specific command. Most DDT commands are not more complicated than: arg3<ESC>c or arg3<ESC>arg4c You can enter alphabetic commands and text arguments in uppercase or lowercase. An argument to a command can be the result of executing another command. For example, you can enter a command to evaluate a text string, and then enter another command to deposit in memory the result of evaluating the text string. The entire command line would be: "/abcd/<RET> ______ where /abcd/ is the argument to the command " (quotation mark). The function of the quotation mark command is to evaluate the string (abcd) within the delimiters (/) as a left-justified ASCII string. 3-1 DDT COMMAND FORMAT DDT COMMAND FORMAT ____ The left-justified ASCII string abcd is then the argument to the command <RET> (entered by pressing the RETURN key). The function of the <RET> command is to deposit an argument (in this case, the string ____ abcd) into the open location. The " command is described in this chapter, and the <RET> command is described in Chapter 4 (Displaying and Modifying Memory). Most commands produce results that are immediately visible, such as commands that display the contents of memory locations. However, commands such as those that invoke search functions or those that evaluate text expressions (as above) may not produce immediately visible results. If you enter a question mark (?) while DDT is performing a function invoked by one of these commands, DDT displays a message that tells you what DDT is currently doing. For example, such a message might be: Searching: addr/ value ____ where addr is the address that DDT is to next test as part of a _____ ____ search, and value is the contents of the memory location at addr. Still other commands return values that DDT does not display, but can use as arguments to other commands. 3.2 INPUT TO DDT 3.2 INPUT TO DDT ___________ You enter arguments to DDT as expressions. An expression can be a single value, or a combination of two or more values with one or more _________ operators. 3.2.1 Values in DDT Expressions 3.2.1 Values in DDT Expressions Values in DDT expressions can be: o octal or decimal integers o floating point numbers o symbols o values that are returned by commands o text _____ _______ _____ To enter an octal integer value, simply enter the integer in octal digits. For example: 70707065 3-2 DDT COMMAND FORMAT DDT COMMAND FORMAT _______ _______ _____ To enter a decimal integer value, enter the integer in decimal digits and follow the value with a decimal point. For example: 9876. ________ _____ ______ To enter a floating point number, use regular or scientific notation. For example, you can enter the value .034 as one of the following: .034 3.4E-2 Note that 1. is a decimal integer, while 1.0 is a floating point number. ______ To enter a symbol as a value in an expression, type in the symbol name _________ ______ as defined in your program. To enter an undefined symbol that you can define later, enter: symbol# ______ where symbol is the symbol that you will later define. See Chapter 7 (Manipulating Symbols in DDT) for more information about using undefined symbols. _______ ____ _______ _ _____ You can enter a command that returns a value as a value in an expression. DDT commands that return values and the values they return are listed in Table 3-1. Table 3-1: Commands that Return Values Table 3-1: Commands that Return Values COMMAND VALUE RETURNED VALUE ALSO COMMAND VALUE RETURNED VALUE ALSO KNOWN AS KNOWN AS . The address of the current location. . <ESC>. The address of the next user program $. instruction to be executed. <ESC><ESC>. The previous value of "<ESC>.". $$. <ESC>nB The address of the DDT location that $nB contains the address of breakpoint n. <ESC>nI The address of the DDT location that contains the saved machine state flags (user-program context). <ESC>nM The address of DDT "mask" n. <ESC>Q The current quantity. $Q 3-3 DDT COMMAND FORMAT DDT COMMAND FORMAT Table 3-1: Commands that Return Values (Cont.) Table 3-1: Commands that Return Values (Cont.) COMMAND VALUE RETURNED VALUE ALSO COMMAND VALUE RETURNED VALUE ALSO KNOWN AS KNOWN AS <ESC><ESC>Q The current quantity, with halves $$Q swapped. <ESC>nU The address of the DDT location that contains the argument (or default) that was given in the virtual addressing command: expr<ESC>nU. The commands <ESC>nB, <ESC>nI, <ESC>nM, and <ESC>nU, return values that are the addresses of locations internal to DDT, which contain information that you can use and modify. For brevity, these commands are said to address those internal DDT locations. For example, the command <ESC>nB returns (but does not display) the address of the DDT location that contains the address of breakpoint n, and the command addr/ (address followed by slash) displays the contents of the location at addr. To display the address of breakpoint n, enter: <ESC>nB/ where you enter the command <ESC>nB as the expression for DDT to ____ evaluate as addr. ____ | You can enter text to be interpreted in the following ways: | | o left-justified ASCII strings | | o left-justified SIXBIT strings | | o single right-justified ASCII characters | | o single right-justified SIXBIT characters | | o RADIX50 words | You can enter text expressions in uppercase or lowercase. DDT translates strings to uppercase for SIXBIT or RADIX50 text as required. ____ ____ ______ The term long text string refers to an expression in a DDT command that is a string of text characters that requires more than one 36-bit expression for full evaluation. You can enter long text strings in SIXBIT and ASCII as DDT expressions. If you use a long text string as an expression, DDT assumes that you will enter a command that deposits the expression in memory. 3-4 DDT COMMAND FORMAT DDT COMMAND FORMAT DDT evaluates the string one 36-bit expression at a time. After evaluating the first 36-bit expression, DDT deposits the expression in the open location, closes the open location, and opens the next location. DDT then evaluates the next 36-bit expression contained in the string, and deposits that expression in the (new) open location. This process _ continues until you enter c, the command. If you enter a command that does deposit to memory, DDT deposits the final 36-bit expression in the open location, and updates the location counter according to the rules of that particular command. The current quantity is the last 36-bit expression that DDT evaluated. If you do not enter a command that deposits to memory, DDT uses, as the argument to the command, the 36-bit expression that was last evaluated. All other 36-bit expressions that were evaluated as part of the string have been deposited, and the current and open locations were updated accordingly. The current quantity is then the last 36-bit expression that DDT evaluated. If there is no open location when you begin typing the long text string, DDT evaluates only the first 36-bit expression, ignores the rest of the string, and uses the first 36-bit expression as the argument to the command. The current quantity is then the first 36-bit expression that DDT evaluated in the string. If you enter a command that deposits to memory, it has no effect because there was no open location. o _____ ______ The syntax to enter an ASCII string is: "/text/ ____ where text is the string, and the slashes (/) represent any printing ____ character that is not contained within text. DDT evaluates the string as a series of 36-bit expressions, each in 7-bit ASCII format (left-justified), with all unused bits reset. For example, if you enter: "+abc/def+ _____ DDT evaluates one 36-bit expression as the 7-bit ASCII string abc/d in bits 0-34, and bit 35 reset. If there is no open location, DDT uses that expression as the argument to the command, and that expression becomes the current quantity. _____ If there is an open location, DDT deposits abc/d in the open location, closes it, and opens the next location in memory. DDT then evaluates a __ second 36-bit expression as the 7-bit ASCII string ef in bits 0-13, and bits 14-35 reset. The last 36-bit expression evaluated becomes the current quantity. 3-5 DDT COMMAND FORMAT DDT COMMAND FORMAT NOTE You cannot use this format to enter an ASCII string that begins with the ESCAPE character, because <ESC> terminates the command that enters a single right-justified ASCII character (in this case, your intended delimiter). ______ ______ The syntax to enter a SIXBIT string is: <ESC>"/text/ where text is the string, and the slashes (/) represent any printing ____ character that is not contained within text. DDT evaluates the string as a series of 36-bit expressions, each in SIXBIT format (left-justified), with any unused bits in the last 36-bit expression reset. DDT translates lowercase characters to uppercase; all other non-SIXBIT characters cause DDT to sound your terminal buzzer or bell and display a question mark. For example, if you enter: <ESC>"/qwertyu/ ______ DDT evaluates one 36-bit expression as the SIXBIT string QWERTY in bits 0-35. If there is no open location, DDT uses that expression as the argument to the command, and that expression becomes the current quantity. ______ If there is an open location, DDT deposits QWERTY in the open location, closes it, and opens the next location in memory. DDT then evaluates a _ second 36-bit expression as the SIXBIT character U in bits 0-5, with bits 6-35 reset. The last 36-bit expression evaluated becomes the current quantity. _____ _________ The syntax to enter a right-justified ASCII character is: "c<ESC> where c is the character. DDT evaluates this as one 36-bit expression _ with the 7-bit ASCII character c in bits 29-35, and bits 0-28 reset. 3-6 DDT COMMAND FORMAT DDT COMMAND FORMAT ______ _________ The syntax to enter a right-justified SIXBIT character is: <ESC>"c<ESC> where c is the character. DDT evaluates one 36-bit expression with the _ SIXBIT character c in bits 30-35, and bits 0-29 reset. DDT translates lowercase characters to uppercase; all other non-SIXBIT characters cause DDT to sound your terminal buzzer or bell and display a question mark. _______ ____ The syntax to enter a RADIX50 word is: text<ESC>5" ____ where text is any string of RADIX50 characters up to six characters long. DDT evaluates one 36-bit expression with bits 0-3 reset and the ____ ____ RADIX50 string text in bits 4-35. DDT ignores any characters in text after the sixth. For example, if you enter: poiuytr<ESC>5" DDT evaluates one 36-bit expression with bits 0-3 reset and the RADIX50 ______ _ string POIUYT in bits 4-35. DDT ignores the character r. DDT ____ translates lowercase characters to uppercase. Characters in text not in the RADIX50 character set that are DDT commands use, as an argument to ____ the command, any characters already entered. Characters in text not in the RADIX50 character set that are not DDT commands cause DDT to sound your terminal buzzer or bell and display a question mark. 3.2.2 Operators in DDT Expressions 3.2.2 Operators in DDT Expressions When you enter an expression, DDT evaluates the expression to create a 36-bit quantity but does not necessarily use all 36 bits when it executes the command. For example, you can enter a complete MACRO instruction when giving an argument to a command that requires an address, but DDT uses only the address specified by the instruction (and ignores the rest of the evaluated expression) when it executes the command. Table 3-2 lists DDT's expression operators and the effects those _____ __ ___ operators produce on the evaluation. The term value so far represents the accumulated 36-bit value resulting from evaluation of the expression to that point. 3-7 DDT COMMAND FORMAT DDT COMMAND FORMAT Table 3-2: Effects of Operators When Evaluating Expressions Table 3-2: Effects of Operators When Evaluating Expressions OPERATOR EFFECT ON EVALUATION OPERATOR EFFECT ON EVALUATION + Add the 36-bit value on the left to the 36-bit value on the right, using two's complement addition. - Subtract the 36-bit value on the right from the 36-bit value on the left, using two's complement subtraction. * Multiply the 36-bit value on the left by the 36-bit value on the right, using PDP-10 full-word integer multiplication. DDT uses only the low-order 36 bits of the result. ' (apostrophe) Divide the 36-bit value on the left by the 36-bit value on the right, using PDP-10 full-word integer division. DDT ignores any remainder. NOTE Apostrophe is DDT's division operator. / (slash) is a DDT command to examine memory, and is never used in DDT to indicate division. space Add the previous expression (normally an opcode) to the value so far, and add the low-order 18 bits of the value at the right of the space to the low-order 18 bits of the value so far. DDT ignores carries resulting from the addition, and does not change the left half of the value so far. 3-8 DDT COMMAND FORMAT DDT COMMAND FORMAT Table 3-2: Effects of Operators When Evaluating Expressions (Cont.) Table 3-2: Effects of Operators When Evaluating Expressions (Cont.) OPERATOR EFFECT ON EVALUATION OPERATOR EFFECT ON EVALUATION , (comma) If you are entering an I/O instruction, shift the low-order 18 bits of the expression at the left of the comma 26 bits to the left (to the device field of the instruction), otherwise shift the low-order 18 bits of the expression at the left of the comma 23 bits to the left (to the A field of an instruction). Then logically OR the result into the value so far. NOTE DDT does not check whether the value at the left of the comma is a legitimate device or AC address, and may overwrite other parts of the instruction. () Swap the halves of the expression within the parentheses and add the resulting expression to the value so far. This makes it possible to enter an instruction that uses an index register. NOTE DDT does not check whether the value within the parentheses is a legitimate AC address, and may overwrite other parts of the instruction. @ Assume the expression is an instruction and set the indirect bit (bit 13) of the value so far. ,, (two commas) Move the low-order bits of the expression at the left of the commas to bits 0-17 and build a new 18-bit expression in the right half. 3-9 DDT COMMAND FORMAT DDT COMMAND FORMAT The nonarithmetic operators allow you to enter expressions in ___________ ______ ____ ______ instruction format as well as in data format. ___________ To enter an instruction, format the instruction as you would in a MACRO-20 program. For example: MOVE R4,@VAR1+OFFSET(R5) NOTE Follow an opcode (such as MOVE) with a space, not a <TAB>. _________ To enter halfwords, enter the values (numbers or symbols) separated by two commas (,,). The halfwords can be symbolic or absolute values. For example: -1,,SYM1 NOTE DDT is not designed to evaluate complicated arithmetic expressions. The nonarithmetic operators are implemented to enable DDT to evaluate expressions you enter as MACRO-20 instructions and halfwords. Using values and operators for other purposes may not produce the results you intend. 3-10 CHAPTER 4 CHAPTER 4 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.1 DISPLAY MODES 4.1 DISPLAY MODES A major function of DDT is displaying the contents of memory words, both data and instructions. You can choose whether to display the contents of memory words as symbols or as numeric values. You can also select the radix in which DDT displays numeric values. DDT displays symbols, labels, and most messages in uppercase. 4.1.1 Default Display Modes 4.1.1 Default Display Modes There is no sure way for DDT to distinguish between instruction and data words, or between data words of different formats. DDT displays memory words in symbolic mode by default. Symbolic mode is described in Table 4-1. DDT tests for the condition on the left, and if the condition is met, displays the word in the format described on the right. DDT performs the tests in descending order. Table 4-1: Evaluation of Symbolic Display Mode Table 4-1: Evaluation of Symbolic Display Mode CONDITION DDT DISPLAYS EXAMPLE CONDITION DDT DISPLAYS EXAMPLE Bits 0-18 are all set. A negative number -45 in the current radix. The 36-bit value is defined The symbol. SYMBL1 in the user program symbol HALT table. The opcode field is zero. Halfwords. 345,,-27 4-1 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY Table 4-1: Evaluation of Symbolic Display Mode (Cont.) Table 4-1: Evaluation of Symbolic Display Mode (Cont.) CONDITION DDT DISPLAYS EXAMPLE CONDITION DDT DISPLAYS EXAMPLE The opcode and I, X, and Y The OPDEF. CORE 6, fields, or the opcode and A fields match an OPDEF in the user program symbol table. The opcode matches a The instruction. MOVE 3,SYMBL definition in DDT's internal hardware instruction table. No match. Halfwords. 3445,,-23 By default, DDT displays numeric values in radix 8. Leading zeros are always suppressed. 4.1.2 Selecting Display Modes 4.1.2 Selecting Display Modes You can select display modes to control: o the format in which DDT tries to interpret the contents of memory locations; for example, as instructions, or as floating-point numbers. o whether addresses are displayed as symbolic or numeric values. o the radix in which numeric values are displayed. In addition, you can specify these modes on a short-term (temporary mode) or long-term (prevailing mode) basis. A prevailing display mode remains in effect until you select another prevailing mode, but may be overridden by a temporary mode until you enter a command that restores the prevailing display mode. DDT commands that restore the prevailing display mode are: o {expr}<RET> (deposit expr and close location) o <ESC>G (start program execution) o <ESC>P (proceed from a breakpoint) o <ESC>W, <ESC>E, <ESC>N (perform a search) o <ESC>Z (zero memory) 4-2 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY _____ o instr<ESC>X (execute instr) o <ESC>V (watch a location) The syntax of commands that set the prevailing mode is: <ESC><ESC>mode where mode is one of the display modes shown in Table 4-2. The syntax of commands that set a temporary mode is: <ESC>mode where mode is one of the display modes shown in Table 4-2. _______ _______ ____ The current display mode is the mode (prevailing or temporary) in which DDT will display the next word (unless you enter a command to change the display mode). DDT has two "masks" that control the action of two of the display modes. <ESC>3M is a command that addresses a DDT location that contains the ______ ____ ____ ____ output byte size mask. When the current display mode is O, each bit that is set in the mask indicates the position of a low order bit of a byte in the word being displayed. In this mode, bit 35 is always assumed to be set. For example, if the output byte size mask contains: 510410100400 (octal) the byte sizes specified are, from left to right, 1, 2, 3, 4, 5, 6, 7, and 8. When displaying a word in O mode that contains 777777,,777777, and the current radix is 8, DDT displays: 1,3,7,17,37,77,177,377 The default value of the output byte size mask is zero, specifying one 36-bit byte. You can set the output byte size mask with the command: expr<ESC>3M ____ where expr evaluates to the bit pattern required. You can also examine and change the output byte size mask with the examine and deposit commands described later in this chapter. 4-3 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY <ESC>2M is a command that addresses a DDT location that contains the _______ ________ ______ maximum symbolic offset. When DDT displays an address in R(elative) mode, it displays the address symbolically, that is, as a symbol, or as a symbol + the numeric offset of the address from that symbol. The maximum symbolic offset (minus 1) determines the maximum offset address that DDT displays symbolically, and defaults to 1000 (octal). DDT displays addresses beyond that offset in A(bsolute) mode. For example, assume that the maximum symbolic offset is 2, and that you are examining subroutine ADDEM in program X.MAC (Fig 2-1), using <LF> to display instructions in sequence. DDT displays: ADDEM/ MOVE 0(6) ADDEM+1/ ADD 1(6) addr/ MOVE 2(6) ____ where addr is the absolute address (for example, 14414) of the location. You can set the maximum symbolic offset with the command: expr<ESC>2M ____ where expr evaluates to the offset required. You can also examine and change the maximum symbolic offset with the examine and deposit commands described later in this chapter. DDT display modes and the commands that select them are described in Table 4-2. Table 4-2: DDT Display Modes Table 4-2: DDT Display Modes FORMAT MODES FORMAT MODES MODE EFFECT C Display memory word as numbers in the current radix (see Radix Modes). F Display memory word as a floating point decimal number. H Display memory word as two halfword addresses (see Address Modes) separated by two commas (,,). O Display memory word as numeric bytes of sizes that are specified by the <ESC>3M mask. n0 Display memory word as n-bit numeric bytes, (with trailing remainder byte, as required). 4-4 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY Table 4-2: DDT Display Modes (Cont.) Table 4-2: DDT Display Modes (Cont.) FORMAT MODES FORMAT MODES MODE EFFECT S Display memory word in symbolic mode (default). 1S Search DDT's internal hardware opcode table before searching the user's symbol table, otherwise follow rules for symbolic mode. nT Display memory word as ASCII text, using n-bit bytes. | n=1: Byte Pointer Format n=5: RADIX50 n=6: SIXBIT | n=7 through 36: | | Specifies the number of bits per byte. The | default is 7-bit ASCII. | | n=0: ASCIZ | | (Stop ASCIZ typeout by typing any character.) A Display addresses as absolute values in the current radix. R Display addresses as values relative to symbols (default). DDT displays the offsets in the current radix. The maximum offset is controlled by the value stored in the <ESC>2M mask, and defaults to 1000 (octal). RADIX MODES RADIX MODES MODE EFFECT nR Display numeric values in radix n (default=8), where n is a decimal number greater than 1. If n=8, DDT displays the word as octal halfwords, otherwise DDT displays the word as one number. o 4-5 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.2 DISPLAYING EXPRESSIONS 4.2 DISPLAYING EXPRESSIONS DDT has three commands you can use to display expressions in different modes. They are: ; (semicolon) = (equal sign) _ (underscore) The syntax of these commands is: {expr}c ____ ____ where expr is the expression to display (expr defaults to the current _ quantity), and c is one of the above commands. These commands are useful for redisplaying the current quantity without affecting the current display mode. Table 4-3 lists the commands to display expressions and their effects. Table 4-3: Commands to Display Expressions Table 4-3: Commands to Display Expressions COMMAND EFFECT COMMAND EFFECT ; Display the current quantity in the current display mode. expr; Display expr in the current display mode. = Display the current quantity as a number in the current radix. expr= Display expr as a number in the current radix. - Display the current quantity in 1$ mode. expr_ Display expr in 1$ mode. 4.3 DISPLAYING BYTE POINTERS 4.3 DISPLAYING BYTE POINTERS If you set the display mode to 1T, DDT displays the contents of the memory location as a byte pointer. DDT can display one-word local, one-word global, and two-word byte pointers. DDT displays the P and S fields, and the address as determined by the I, X, and Y fields of the byte pointer. In section zero, DDT displays only one-word byte pointers (local and global). 4-6 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY For example, if the contents of the location at ADDR2 is 100702,,addr, where addr is the value of symbol LABL2, the following illustrates one-word local byte pointer display: addr2/ 100702,,addr <ESC>lT; 10 7 LABL2(2) The following illustrates one-word global byte pointer display, where addr is the value of symbol LABL2: 1,,addr2/ 610002,,LABL2 <ESC>lT; 44&7 2,,LABL2 The following illustrates two-word global byte pointer display, where addr is the value of symbol LABL2 (DDT echoes <BKSP> as ^H): 1,,addr2/ 440740,,0 <LF> 1,,addr2+1/ 3,,addr <ESC>lT^H 1,,addr2/ 44 7 3,,MAIN. <2> 4.4 DISPLAYING AND DEPOSITING IN MEMORY 4.4 DISPLAYING AND DEPOSITING IN MEMORY DDT allows you to display the contents of memory locations and deposit a new value in the open location. In performing these functions, you must understand the concept of the open location, the current location, the location sequence stack, and the current quantity. ____ ________ The open location is a memory location (or AC) that is "open" for modification by the next command. There is never more than one location open at a time. DDT always closes the open location before opening another. ________ _______ The location counter contains the address of a word in memory that has been referenced (implicitly or explicitly) by the previous command, and that is the default point of reference for the next command. That _______ ________ word is known as the current location. DDT uses the address of the current location as the default address in most commands. The current location is often, but not always, the open location. Most DDT commands change the current location to a word specified by an address given (explicitly or by default) in the command. Commands that do not are so indicated. "." (period) is a command that returns (but does not display) the address of the current location. When you first enter DDT, the current location is zero. 4-7 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY ________ ________ _____ The location sequence stack is a "ring" of seventeen words, each containing the address of a prior current location, or of a match found during a search. The present value of the current location is not placed in the ring. Entries are made to and retrieved from the location sequence stack in a last-in, first-out manner. Most commands that change the location counter by values other than +1 and -1 cause DDT to place the address of the current location (before the change) on the location sequence stack. Addresses of matching locations found during searches are also placed on the location sequence stack. When DDT enters a new value in _______ ________ the next word on the stack, the new value becomes the current location _____ _____ stack entry. This is similar to PUSHing entries on a stack. When the current location stack entry is the last location on the location sequence stack, DDT enters a new value on the stack by "wrapping around" to the beginning of the stack and overwriting the value in the first location on the stack. The first location on the stack then contains the current location stack entry. Certain DDT commands change the address of the current location to the current location stack entry, and then change the current location stack entry to the previous entry. This is similar to POPing entries off a stack, and allows you to "return" to locations that have previously been the current location. When the first location on the location sequence stack contains the current location stack entry and DDT changes the address of the current location to the current location stack entry, DDT "wraps around" to the end of the stack, and the value contained in the last word of the stack becomes the current location stack entry (whether or not the stack was previously "full"). _______ ________ The current quantity is a value that is the most recent of: o the last 36-bit quantity that DDT displayed (an expression or the contents of a memory location) o the last expression that you entered as an argument to a command that deposits to memory ____ _____ _____ This value is also known as the last value typed. <ESC>Q is a command that returns (but does not display) the current quantity. DDT issues an implicit <ESC>Q to return this value for use as the default argument for some commands. You can give the current quantity as an argument to a command by entering the command <ESC>Q as the argument. The command <ESC><ESC>Q returns the current quantity with the right and left halves swapped. This manual uses the term $Q to refer to the value that is returned by the command <ESC>Q, and the term $$Q to refer to the value that is returned by the command <ESC><ESC>Q. 4-8 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY Some commands calculate the address of the location to be opened from an expression given or defaulted in the command. Other commands use the address of the current location or entries on the location sequence stack. The general syntax of these commands is: {expr}{<ESC>}c ____ where expr is any legal DDT expression, and c is the command. NOTE ______ __ ___ ___________ See Values in DDT Expressions in Chapter 3 for a discussion of long text strings as values in DDT expressions. Table 4-4 summarizes the commands and their effects. Complete descriptions of the commands follow the table. Table 4-4: DDT Commands to Display Memory Table 4-4: DDT Commands to Display Memory COMMAND DISPLAY MODE OPEN CHANGE DEPOSIT COMMAND DISPLAY MODE OPEN CHANGE DEPOSIT CONTENTS OF THE CURRENT EXPR CONTENTS OF THE CURRENT EXPR DISPLAY LOCATION LOCATION DISPLAY LOCATION LOCATION / Yes Current Yes Yes(1) No [ Yes Numeric Yes Yes(1) No ] Yes Symbolic Yes Yes(1) No ! No Suppress Yes Yes(1) No \ Yes(2) Current Yes No Yes(1) <TAB> Yes(2) Current Yes Yes Yes(1) <RET> No Restore No No Yes(1) <LF> Yes(2) Current Yes Yes(.+1) Yes(1) <BKSP> Yes(2) Current Yes Yes(.-1) Yes(1) or ^ (1) If you enter expr. (2) If not suppressed by !. 4-9 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.4.1 Commands that Use the Current Location 4.4.1 Commands that Use the Current Location The commands <RET>, <LF>, and <BKSP> use the address of the current location to determine the next address of the current location. These commands do not make entries to the location sequence stack. {expr}<RET> does the following: o deposits expr (if given) in the open location o closes the open location o resets the current typeout mode to the prevailing typeout mode o does not change the address of the current location {expr}<LF> does the following: o deposits expr (if given) in the open location o closes the open location o increments the location counter o opens the current location o o displays the open location (unless display has been suppressed by !) {expr}<BKSP> and {expr}^ do the following: o deposits expr (if given) in the open location o closes the open location o decrements the location counter o opens the current location o o displays the open location (unless display has been suppressed by !) 4-10 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.4.2 Commands that Use the Location Sequence Stack 4.4.2 Commands that Use the Location Sequence Stack The commands <ESC><RET>, <ESC><LF>, and <ESC><BKSP> use the current location stack entry to determine the next address of the current location. Repetitions of these commands refer to successively earlier entries on the stack, until you again address the most recent entry. These commands do not make entries to the location sequence stack. {expr}<ESC><RET> does the following: o deposits expr (if given) in the open location o closes the open location o changes the value contained in the location counter to the current location stack entry o opens the current location o starts a new line and displays the address and contents of the open location in the current display mode o causes the previous entry on the location sequence stack to become the current location stack entry NOTE If display is suppressed as a result of using the ! command, the command {expr}<ESC><RET> restores the current display mode, which can be either a temporary or prevailing display mode. {expr}<ESC><LF> does the following: o deposits expr (if given) in the open location o closes the open location o changes the value contained in the location counter to the current location stack entry o increments the location counter o opens the current location o starts a new line and displays the address of the open location 4-11 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY o displays the contents of the open location (unless display has been suppressed by !) o causes the previous entry on the location sequence stack to become the current location stack entry {expr}<ESC><BKSP> and {expr}<ESC>^ do the following: o deposits expr (if given) in the open location o closes the open location o changes the value contained in the location counter to the current location stack entry o decrements the location counter o opens the current location o displays the address of the open location o o displays the contents of the open location (unless display has been suppressed by !) o causes the previous entry on the location sequence stack to become the current location stack entry 4.4.3 Commands that Use an Address within the Command 4.4.3 Commands that Use an Address within the Command The commands: / (slash) [ (left square bracket) ] (right square bracket) ! (exclamation point) \ (backslash) <TAB> use an expression given in the command (either explicitly or by default) to determine the addresses of the current location and the open location. 4-12 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY The complete syntax of these commands is: {expr}{<ESC>{<ESC>}}c where expr may be an address, ".", a symbol, or any expression that is legal in DDT, and c is the command. When you use the commands /, [, ], !, \, and <TAB>: ____ o If you omit expr > DDT uses the current quantity as a default. > <TAB> enters the address of the current location on the location sequence stack and changes the current location to the address determined from the current quantity. ____ o If you enter expr, DDT enters the address of the current location on the location sequence stack (except \). ____ o DDT treats expr (whether given or defaulted) as if it were in instruction format and performs the effective address calculation as follows: > If you omit <ESC>, DDT does not perform indexing or indirection. > If you include one <ESC>, DDT treats expr as an IFIW (instruction format indirect word), and uses the I and Y fields of expr to perform indexing and indirection when appropriate. > If you use <ESC><ESC>, DDT utilizes EFIWs (extended format indirect words), as appropriate, when performing effective address calculations, and can thereby calculate 30-bit addresses. > In section zero, when you include <ESC><ESC>, it is treated as one <ESC>. These commands always do the following: o close the open location o open the location at the address indicated by expr o change the current quantity to the value displayed (all commands except !) 4-13 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY The following is a list that gives a complete description of the effects of each command. COMMAND EFFECTS / o closes the open location o opens the location at the address calculated from the current quantity o displays the contents of the open location in the current display mode o sets the current quantity to the value displayed expr/ o closes the open location o opens the location at the address calculated from expr o enters the address of the current location on the location sequence stack o changes the current location to the location at the address calculated from expr o displays the contents of the open location in the current display mode o sets the current quantity to the value displayed [ o closes the open location o opens the location at the address calculated from the current quantity o displays the contents of the open location in numeric mode in the current radix o o sets the current quantity to the value displayed 4-14 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY expr[ o closes the open location o opens the location at the address calculated from expr o enters the address of the current location on the location sequence stack o changes the current location to the location at the address calculated from expr o displays the contents of the open location in numeric mode in the current radix o sets the current display mode to numeric mode in the current radix o sets the current quantity to the value displayed ] o closes the open location o opens the location at the address calculated from the current quantity o displays the contents of the open location in symbolic mode o sets the current display mode to symbolic mode o sets the current quantity to the value displayed expr] o closes the open location o opens the location at the address calculated from expr o enters the address of the current location on the location sequence stack o changes the current location to the location at the address calculated from expr o displays the contents of the open location in symbolic mode o sets the current display mode to symbolic mode o sets the current quantity to the value displayed 4-15 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY ! o closes the open location o opens the location at the address calculated from the current quantity o does not display the contents of the open location o suppresses display of the open location by the \, <TAB>, <LF>, and <BKSP> commands (any other display command restores the current display mode) o does not change the current quantity expr! o closes the open location o opens the location at the address calculated from expr o enters the address of the current location on the location sequence stack o changes the current location to the location at the address calculated from expr o does not display the contents of the open location o suppresses display of the open location by the \, <TAB>, <LF>, and <BKSP> commands (any other display command restores the current display mode) o does not change the current quantity \ o closes the open location o opens the location at the address calculated from the current quantity o displays the contents of the open location in the current display mode (unless display has been suppressed by !) o sets the current quantity to the value displayed 4-16 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY expr\ o deposits expr in the open location o closes the open location o opens the location at the address calculated from expr o does not change the address of the current location (and does not enter the address of the current location on the location sequence stack) o displays the contents of the open location in the current display mode (unless display has been suppressed by !) o sets the current quantity to the value displayed <TAB> o closes the open location o opens the location at the address calculated from the current quantity o enters the address of the current location on the location sequence stack o changes the current location to the location at the address calculated from the current quantity o starts a new line and displays the address of the open location (which is also the current location) o displays the contents of the open location in the current display mode (unless display has been suppressed by !) o sets the current quantity to the value displayed expr<TAB> o deposits expr in the open location o closes the open location o opens the location at the address calculated from expr o enters the address of the current location on the location sequence stack o changes the current location to the location at the address calculated from expr 4-17 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY o starts a new line and displays the address of the open location (which is also the current location) o displays the contents of the open location in the current display mode (unless display has been suppressed by !) o sets the current quantity to the value displayed ____ You can treat expr as an IFIW (instruction format indirect word), and ____ use any indexing and indirection specified by expr to compute the effective address of the location to be opened. Use the command form: {expr}<ESC>c where c is /, [, ], !, \, or <TAB>. For example, assume the following conditions as indicated by the display commands: COMMAND DISPLAY EXPLANATION LABL1/ SYM1 Display contents of LABL1. LABL1+1/ SYM2 Display contents of LABL1+1. SYM2/ SYM3 Display contents of SYM2. 2/ 1 Display contents of AC 2. @LABL1(2)/ SYM1 DDT uses Y field only. @LABL1(2)<ESC>/ SYM3 <ESC> causes indexing and indirection. Note that DDT does not start a new line unless you enter <TAB>, <RET>, <LF> or <BKSP>, or until the display wraps around the end of the line. DDT also displays three spaces (or a tab, depending on the TTY control mask) before and after its output. Thus, an actual DDT terminal display might be the following (user input is lowercase; <LF> and <TAB> do not appear on the screen, but are shown to indicate where you pressed the corresponding keys): 2/ 1 labl1/ SYM1 <LF> LABL1+1/ SYM2 <TAB> SYM2/ SYM3 sym4/ MOVE 1,@LABL1(2) <ESC><TAB> SYM2/ SYM3 ____ You can treat expr as an EFIW (extended format indirect word) and use ____ any indexing and indirection specified by expr to compute the (global) effective address of the location to be opened. Use the command form: {expr}<ESC><ESC>c where c is /, [, ], !, \, or <TAB>. 4-18 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.5 DISPLAYING ASCIZ STRINGS 4.5 DISPLAYING ASCIZ STRINGS You can display memory as an ASCIZ string. The command addr<ESC>0T where addr defaults to the open location (if there is one, otherwise addr defaults to the current location), displays memory, beginning with addr, as an ASCIZ string. The display stops when DDT finds a zero byte, or when you type in any character, which DDT displays, but otherwise ignores. The current location remains unchanged. 4.6 ZEROING MEMORY 4.6 ZEROING MEMORY To deposit the same value in each of a string of memory words (useful for initializing memory to zero), enter: addr1<addr2>{expr}<ESC>Z where expr is any legal DDT expression, addr1 is the first word to receive expr, and addr2 is the last. Follow addr1 with a left angle bracket (<) and addr2 with a right angle bracket (>). Both addr1 and addr2 are required. If you omit expr, it defaults to zero. Prior to execution, DDT enters the address of the current location on the location sequence stack and closes the open location. When DDT has | completed execution of the command, the current location is the word | at addr2 + 1. There is no open location. This command restores the prevailing display mode. If you enter: ? while DDT is executing the <ESC>Z command, DDT displays: Depositing: addr/ value ____ where addr is the location where DDT will make the next deposit, and _____ ____ value is the contents of addr before the deposit. If you enter any other character, DDT stops executing the <ESC>Z | command, and waits for your next command. The character that you | enter to terminate the <ESC>Z command is otherwise ignored. 4-19 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.7 AUTOMATIC WRITE-ENABLE 4.7 AUTOMATIC WRITE-ENABLE If you attempt to deposit a value in a location that is write-protected, DDT returns the message ?NOT WRITABLE This is the TOPS-20 default condition. To allow DDT to modify write-protected memory, type in <ESC>{0}W If you now attempt to deposit a value in a location that is write-protected, DDT removes the protection, deposits the value, and then reinvokes the protection. Note that you cannot use this command to enable patching in FILDDT. To prevent DDT from modifying write-protected memory, type in <ESC><ESC>{0}W The zero in the above commands is optional and has no effect on the operation of the commands. DDT allows the zero for compatibility with prior versions of DDT. 4-20 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.8 AUTOMATIC PAGE CREATION 4.8 AUTOMATIC PAGE CREATION If you attempt to deposit a value in a location within a nonexistent page, DDT creates the page and deposits the value. If you attempt to deposit a value within a nonexistent section, DDT creates the section as well as the page. This is the default condition. To prevent DDT from creating a page when you attempt to deposit a value within a nonexistent page, type in <ESC><ESC>1W If you now attempt to deposit a value in a location within a nonexistent page, DDT returns the error message CAN'T CREATE PAGE To allow DDT to create the page (and the section, as required) when you attempt to deposit a value within a nonexistent page, type in <ESC>1W 4-21 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.9 DISPLAYING PAGE ACCESSIBILITY INFORMATION | 4.9 DISPLAYING PAGE ACCESSIBILITY INFORMATION | | You can get information about the access requirements of the pages and | sections in the program you are debugging, using the $L and $$L | commands. The complete format for this command is: {{arg1<}arg2}{<ESC>}<ESC>L where arg1 and arg2 are section numbers. Using one <ESC> causes DDT to display access information about the section and about individual pages. Using <ESC> twice causes DDT to display access information only about the section(s). If you include both arg1 and arg2, DDT displays the information for all sections that your program and DDT are using, in the range arg1 to arg2, inclusive. If you include only arg2, DDT displays access information for that section only. If you omit both arguments, DDT displays access information for all sections that your program and DDT are using. The page and section accessibility bits and their meanings are: Read Page can be read. Write Page can be written. Copy-on-write Page is copy-on-write Execute page can be executed Private page is private Zero Page is allocated but zero.(FILDDT only) For example, the command <ESC>L might produce the following display: | Section 0 Read, Write, Execute, Private | 000 Read, Write, Execute, Private | 770 Read, Execute | 771 Read, Write, Execute, Private | Section 37 Read, Write, Execute, Private | 700-701 Read, Copy-on-write, Execute | 703-730 Read, Copy-on-write, Execute | 735-736 Read, Write, Execute, Private | 740-753 Read, Execute And the command <ESC><ESC>L might produce a display like the following: Section 0 Read, Write, Execute, Private Section 37 Read, Write, Execute, Private 4-22 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY 4.10 WATCHING A MEMORY LOCATION 4.10 WATCHING A MEMORY LOCATION If you wish to have DDT monitor or "watch" a memory location while your program is running, and display the location whenever its contents change, enter: addr<ESC>V ____ where addr is the address of the location to be watched, and defaults to the current location. When you enter the command, DDT starts a new line and displays: addr/ value ____ _____ where addr is the address of the location being watched, and value is the contents of the location. This command also restores the prevailing display mode. ____ DDT checks addr every "jiffy" (about 20 milliseconds), and displays ____ the address and contents of addr whenever those contents change. ____ (Executive mode EDDT watches addr continuously.) If you enter a question mark (?) while DDT is watching, DDT displays: Watching: addr/ value ____ _____ where addr is the address of the location being watched, and value is ____ the contents of addr. To terminate the watch, enter any other character. DDT stops monitoring the word, starts a new display line, echoes the character you enter, starts another line, and waits for more input. The character that you enter to terminate the watch is otherwise ignored. Because any input character terminates the watch, you cannot continue execution and watch your own user program. The <ESC>V command is useful to watch activity in a separate process (such as the running monitor or other job, for which you must be using EDDT or FILDDT). The page that contains the word you wish to watch must be mapped into your own process (the one that contains DDT and your program). 4.11 TTY CONTROL MASK 4.11 TTY CONTROL MASK ___ You can control certain aspects of DDT's display by setting DDT's TTY _______ ____ control mask. The command <ESC>1M returns a value that is the address of the DDT location that contains this mask. Table 4-5 summarizes the features controlled by the bits in the TTY control mask. 4-23 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY Table 4-5: TTY Control Mask Table 4-5: TTY Control Mask BIT VALUE EXPLANATION BIT VALUE EXPLANATION 15 0 Display the commands (and results) from the file executed by the <ESC>Y command (default). 1 Do not display the commands (or results) from the file executed by the <ESC>Y command. 16 0 When interrupting program execution at a breakpoint, display the address and contents of the breakpoint (default). 1 When interrupting program execution at a breakpoint, display only the address of the breakpoint. 17 0 Display 3 spaces when spacing DDT output (1). 1 Display DDT output fields at tab stops (1). 34 0 The terminal does not have a tab mechanism (2). 1 The terminal has a tab mechanism (2). 35 0 Echo deleted characters (3). 1 Backspace over deleted characters (3). (1) If bit 17 is reset (default), DDT displays 3 spaces between output fields (such as between the address of a location and the contents of the location), and at the end of display lines. If bit 17 is set, DDT lines up the output fields in columns beginning at tab stops (see bit 34). Figure 4-1 illustrates the two different modes. (2) If bit 34 is set, DDT displays a tab character (<CTRL/I>) between fields. If bit 34 is reset, DDT displays enough spaces to start the field at the next tab stop. When starting up, DDT checks whether your terminal can handle TAB characters (<CTRL/I>), and sets this bit accordingly. (3) When starting up, DDT checks whether your terminal can backspace to delete characters, and sets this bit accordingly. 4-24 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY To change the settings of the TTY control mask, use the command: expr<ESC>1M where expr evaluates to the required bit pattern. You can also open the location addressed by <ESC>1M with one of the DDT display commands, and deposit an expression that contains the new bit settings. Figure 4-1 is an illustration of the effects of bit 17 in the TTY control mask. The code being examined is the first few lines of X.MAC, listed in Figure 2-1. The example is not a complete debugging session; only enough is shown to illustrate the effects of bit 17 of the TTY control mask. The numbers at the left of the DDT display lines are to assist you in following the commentary that follows the display. User input is in lowercase. | | Figure 4-1: DDT Session Showing Columnar Output | Figure 4-1: DDT Session Showing Columnar Output | | SCREEN DISPLAY 1. DDT 2. start/ MOVE P,PWORD x$: .$b $g 3. $1B>>START/ MOVE P,PWORD $x 4. P/ -10,,STACK PWORD/ -10,,STACK 5. START+1/ MOVEI IDX,TABLE1 $x 6. IDX/ TABLE1 TABLE1 $1m/ 2 1,,2 7. start$g 8. $1B>>START/ MOVE P,PWORD $x 9. P/ -10,,STACK PWORD/ -10,,STACK 10. START+1/ MOVEI IDX,TABLE1 $x 11. IDX/ TABLE1 TABLE1 COMMENTARY Line 1: o DDT is loaded and waiting for a command. Line 2: ______ o Enter start/ to examine location start. _______ o Enter x<ESC>: to open the symbol table for module X. _______ _____ o Enter .<ESC>b to set breakpoint at location START. ______ o Enter <ESC>g to begin execution. 4-25 DISPLAYING AND MODIFYING MEMORY DISPLAYING AND MODIFYING MEMORY Line 3: o DDT displays breakpoint information. ______ o Enter <ESC>x to execute the next instruction. Line 4: o DDT displays results of executing the instruction. Line 5: o DDT displays the next instruction. ______ o Enter <ESC>x to execute the instruction. Line 6: o DDT displays the results of executing the instruction. ________ o Enter <ESC>1m/ to display and open the TTY control mask. o DDT displays the mask. Bit 34 is set. _________ o Enter 1,,2<RET> to set bits 17 and 34. Line 7: ___________ o Enter start<ESC>g to restart the program. Line 8: o DDT displays the breakpoint information. ______ o Enter <ESC>x to execute the instruction. Line 9: o DDT displays the results of executing the instruction. Line 10: o DDT displays the next instruction. ______ o Enter <ESC>x to execute the next instruction. Line 11: o DDT displays the results of executing the instruction. 4-26 CHAPTER 5 CHAPTER 5 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION 5.1 BEGINNING EXECUTION 5.1 BEGINNING EXECUTION To begin execution of your program, enter: <ESC>G Your program will run, beginning at its start address. If you have not set any breakpoints, your program runs to completion, or until it makes a fatal error. At TOPS-20 command level, you can then use the ___ DDT command to reenter DDT and examine your program. You can start or continue program execution at any address with the command: addr<ESC>G 5.2 USING BREAKPOINTS 5.2 USING BREAKPOINTS __________ A breakpoint is a program location that has been altered such that if your program PC reaches the address of the breakpoint, your program transfers control to DDT. When you set a breakpoint with DDT, DDT stores the address of the breakpoint in an internal table. When you command DDT to begin or continue program execution, DDT stores the instructions from all breakpoints in the table, and replaces them with JSRs into a DDT entry table. While program execution is suspended at a breakpoint, you can examine and modify memory, remove breakpoints, insert new breakpoints, execute individual instructions, and continue program execution. 5-1 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION During this time, the command "<ESC>." returns the value that is the address of the next instruction to be executed. The command "<ESC><ESC>." returns a value that is the previous value returned by "<ESC>.". When you first receive control at the breakpoint, "<ESC>." returns the address of the breakpoint and "<ESC><ESC>." returns zero. Before you start execution with <ESC>G, "<ESC>." and "<ESC><ESC>." are illegal commands (if you try to execute them, DDT sounds the terminal buzzer or bell and displays a question mark). NOTE This manual uses the term "$." to represent the value returned by the command "<ESC>.", and the term "$$." to represent the value returned by the command "<ESC><ESC>.". You can set up to 12 breakpoints at a time (this is a DDT assembly parameter) in your program. These breakpoints are numbered 1 through ___________ __________ 12. There is also one breakpoint (the unsolicited breakpoint, numbered zero) that can be used by your MACRO program to "call" DDT. Each breakpoint has several internal DDT locations associated with it, which contain information to control DDT action with respect to the breakpoint. You can examine and modify these DDT locations with the same DDT commands that you use to examine and modify locations in your user program. <ESC>nB is a command that returns the value that is the address of the first DDT word associated with breakpoint n. The symbol $nB is used here to represent that address. Table 5-1 contains a list of the breakpoint locations of interest to the user, and their contents. Table 5-1: Breakpoint Locations of Interest Table 5-1: Breakpoint Locations of Interest LOCATION CONTENTS LOCATION CONTENTS $nB Address of breakpoint n. $nB+1 Instruction for conditional breakpoint n. $nB+2 Proceed count for conditional breakpoint n. $nB+3 Address of a location to be opened and displayed when the breakpoint is reached. | $nB+4 Address of an ASCIZ DDT command string to be executed | when the breakpoint is reached. 5-2 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION When your user-program PC reaches a breakpoint, your program executes the JSR into DDT. When this occurs, DDT does the following: o saves your user-program context o replaces the JSR instructions at all breakpoints with the original program instructions o displays the breakpoint number, breakpoint address, and the contents of the breakpoint (depending on bit 16 of the TTY control mask) o sets "$." to the breakpoint address o sets "$$." to zero o enters the address of the current location (set before you started the program or proceeded from a breakpoint) on the location sequence stack o changes the current location to the breakpoint o waits for you to give a DDT command When you command DDT to restart or continue program execution, DDT does the following: o saves the program instructions from all breakpoints o replaces the program instructions at all breakpoints with JSR instructions to DDT o if you have not executed the instruction at the breakpoint with <ESC>X, DDT simulates execution of the instruction at the breakpoint o restores your user-program context o DDT performs a JRSTF (if in section zero, otherwise XJRSTF) to the next instruction to be executed 5.2.1 Setting Breakpoints 5.2.1 Setting Breakpoints ___ _ __________ To set a breakpoint, enter: addr<ESC>{n}B where addr is the address where you want to suspend execution (addr can be ".", the command that returns the address of the current location), and n is the number of the breakpoint (and defaults to the lowest unused breakpoint number). 5-3 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION If you do not specify n, it defaults to the lowest available (unset) breakpoint. If you have already set twelve breakpoints, DDT displays "?" and sounds the terminal buzzer or bell. If you specify n, it must be greater than zero and less than 13. DDT restores the original contents of any (previously set) breakpoint designated as breakpoint n before setting new breakpoint n. You cannot set more than one breakpoint at the same address. DDT simply sets the same breakpoint again, even if you explicitly specify a breakpoint number the second time. You cannot set a breakpoint at AC zero. Assume the following conditions: o location LABL1+3 contains the instruction MOVE 1,LABL2 o breakpoint 2 is set at LABL1+3 If your program reaches LABL1+3 it executes the JSR to DDT, and DDT does the following: o saves your user-program context o restores the original program instructions to the breakpoints o sets "$." to LABL1+3 o sets "$$." to zero o enters the address of the current location on the location sequence stack o changes the current location to LABL1+3 (the breakpoint) o opens location LABL1+3 o displays: $2B>>LABL1+3/ MOVE 1,LABL2 ___ _ __________ ___ ____ ___ _______ __ __________ ________ To set a breakpoint and have DDT display an additional location when your program reaches the breakpoint, enter: addr1<addr2<ESC>{n}B where addr1 is the location to be displayed, and addr2 is the location of the breakpoint. Follow addr1 with a left angle bracket (<). 5-4 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION Assume the following conditions: o location LABL1+3 contains the instruction MOVE 1,LABL2 o location LABL3 contains value SYMBL1 o breakpoint 2 was set by the command: LABL3<LABL1+3<ESC>B If your program reaches LABL1+3 it executes the JSR to DDT, and DDT does the following: o saves your user-program context o restores the original program instructions to the breakpoints o sets "$." to LABL1+3 o sets "$$." to zero o enters the address of the current location on the location sequence stack o changes the current location to LABL1+3 (the breakpoint) o enters the address of the current location (the breakpoint) on the location sequence stack o changes the current location to LABL3 o opens location LABL3 o displays: $2B>>LABL1+3/ MOVE 1,LABL2 LABL3/ SYMBL1 Note that, because DDT placed the breakpoint address on the location sequence stack, you can enter <ESC><RET> to change the current location back to the breakpoint. 5-5 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION _______ ___ _______ To display the address of any breakpoint, enter: <ESC>nB/ where n is the address of the breakpoint. DDT displays the address of breakpoint n, and you can use the examine commands to open and display the instruction at breakpoint n. If breakpoint n is not set, DDT displays zero. ______ __________ To remove breakpoint n, enter: 0<ESC>nB To remove all breakpoints, enter: <ESC>B 5.2.2 Proceeding from Breakpoints 5.2.2 Proceeding from Breakpoints After your program has reached a breakpoint, you can continue execution at "$." by entering: <ESC>P DDT saves the program instructions from all breakpoints, replaces the program instructions with JSRs to DDT, restores your user-program context, and if you have not executed any program instructions with the <ESC>X command, simulates execution of the instruction at the breakpoint. DDT then executes a JRSTF (in section zero, otherwise DDT executes an XJRSTF) to the next instruction to be executed. You can cause the program to start execution at a different location ____ with the {addr}<ESC>G command, where addr defaults to the program's start address. 5-6 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION Once your program has reached a breakpoint and DDT has interrupted execution, you can cause DDT to continue execution but NOT stop at that breakpoint until your program has reached that breakpoint a specified number of times. To do this, enter: expr<ESC>P ____ where expr is the proceed count. DDT places expr at location $nB+2, where n is the number of the breakpoint at which your program has stopped. DDT resumes execution of your program. Each time your program reaches breakpoint n, DDT decrements the proceed count stored at $nB+2. Your program continues execution until: o it reaches a different breakpoint o it terminates normally o it commits a fatal error o the proceed count reaches zero _________ _______ ____ Each breakpoint has an associated automatic proceed flag. If this flag is set and the program reaches the breakpoint, DDT decrements the proceed count at $nB+2 (where n is the number of the breakpoint) and displays the breakpoint information if the proceed count is less than one. DDT then automatically continues program execution. ______ The <ESC>P command resets (clears) the automatic proceed flag associated with the breakpoint at which DDT has suspended program execution. ___ _ __________ ___ ___ ___ __________ _________ _______ ____ To set a breakpoint and set the associated automatic proceed flag, enter: {addr1<}addr2<ESC><ESC>{n}B where addr2 is the address of the breakpoint and may be ".", addr1 is an (optional) additional location to be displayed, and n is optional and defaults to the lowest unused breakpoint. Each time your program reaches breakpoint n, DDT decrements the associated proceed count, and if the result is less than one, displays: $nB>>addr2/ instr where n is the breakpoint number, addr2 is the address of the breakpoint, and instr is the contents of the word at addr2. 5-7 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION ______ If you entered addr1< when you gave the command, DDT displays: $nB>>addr2/ instr addr1/ contents where n is the breakpoint number, addr2 is the address of the breakpoint, instr is the contents of the word at addr2, addr1 is the ________ additional location to be displayed, and contents is the contents of the word at addr1. DDT then automatically continues program execution until: o your program reaches a different breakpoint o your program terminates normally o your program commits a fatal error o you enter any character while your program is at breakpoint n You can interrupt the automatic proceed function if you enter a character while your program is at breakpoint n. DDT then resets the automatic proceed flag and suspends program execution at the breakpoint. DDT echoes the character that you entered, which is otherwise ignored. _______ ____ _ __________ ___ ___ ___ __________ _________ _______ To proceed from a breakpoint and set the associated automatic proceed ____ flag, give the command: {expr}<ESC><ESC>P where expr is the proceed count. DDT stores the proceed count at $nB+2. 5-8 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION 5.2.3 Conditional Breakpoints 5.2.3 Conditional Breakpoints To cause DDT to interrupt program execution at a breakpoint only if a specific condition is satisfied, you must store a single test instruction or a call to a test routine in DDT's breakpoint table. You can use a test routine in your program, or one that you enter in DDT's patching area. See Chapter 8 (Inserting Patches with DDT) for more information about the patching area. To enter the test instruction (or the call to the test routine), open the DDT location addressed by the command <ESC>nB+1 by entering: <ESC>nB+1/ where n is the number of the breakpoint. You must enter n, or DDT interprets the command as <ESC>B, and removes all breakpoints. | Deposit the test instruction or the call to the test subroutine. If | your program reaches breakpoint n, DDT executes the instruction at $nB+1. DDT then proceeds as follows: o If the instruction does not cause a program counter skip, DDT decrements the proceed count at $nB+2. If the result is zero or less, DDT interrupts execution at breakpoint n. o If a program counter skip of 1 does occur, DDT interrupts execution at breakpoint n. o If the conditional instruction is a call to a subroutine that returns by skipping over two or more instructions, DDT does not interrupt program execution. If DDT interrupts execution because the test instruction resulted in a program counter skip, DDT displays only one angle bracket after the breakpoint identification, as: $3B>LABL1/ MOVE 1,LABL2 5-9 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION 5.2.4 The "Unsolicited" Breakpoint 5.2.4 The "Unsolicited" Breakpoint You can cause your MACRO program to "call" DDT by inserting the following instruction in your program: JSR $0BPT## The two pound-signs (##) appended to $0BPT in your MACRO program declare the symbol as EXTERNAL. NOTE "$" represents the dollar sign character, which is part of the symbol, and is not the DDT echo of the ESCAPE key. You must load RDDT.REL with your program or you will get a LINK error (?LNKUGS undefined global symbol) when you load your program. Load RDDT.REL with your program as follows (your input is in lowercase; the last line indicates that DDT is loaded and ready to accept your commands): | @link | */debug filnam/go | DDT | ______ | where filnam is the name of your MACRO-20 program. You can start your | program running with the <ESC>G command. If your program executes the | JSR instruction, DDT interrupts program execution and displays: $0B>>addr+1/ instr ______ _____ ___ _____ where addr+1 is the first location after the JSR $0BPT instruction, _____ and instr is the contents of that location. 5-10 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION 5.3 EXECUTING EXPLICIT INSTRUCTIONS 5.3 EXECUTING EXPLICIT INSTRUCTIONS To execute a specific instruction, enter the instruction followed by <ESC>X: instr<ESC>X For example: MOVE 1,@LABL1(3)<ESC>X After executing the instruction, DDT starts a new line and displays: o <> if in-line execution of instr would result in skipping no instructions. o <SKIP> if in-line execution of instr would result in skipping 1 instruction. o <SKIP 2> if in-line execution of instr would result in skipping 2 instructions. o <SKIP 3> if in-line execution of instr would result in skipping 3 instructions. NOTE "In-line execution" means execution of the instruction as part of normal program flow. The execution of instructions with this command has no effect on your user-program PC. This command restores the prevailing display mode. 5.4 SINGLE-STEPPING INSTRUCTIONS 5.4 SINGLE-STEPPING INSTRUCTIONS After your program has transferred control to DDT from a breakpoint, you can execute program instructions one at a time. This is called "single-stepping." "<ESC>." is a command that returns the address of the next instruction to be executed. To execute the instruction whose address is returned by "<ESC>.", enter: <ESC>X 5-11 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION For example, breakpoint 3 is set at LABL1+3. If your program PC reaches LABL1+3, control passes to DDT, which displays: $3B>>LABL1+3/ ADD 1,LABL2(2) Examining the environment, you learn the following: o AC 1 contains 1 o AC 2 contains 3 o LABL1+4 contains MOVEM 1,@LABL2(3) o LABL2+3 contains SYM3 as shown by the following terminal display (DDT does not display <LF> or <ESC>): $3B>>LABL1+3/ ADD 1,LABL2(2) <ESC>\ SYM3 <LF> LABL1+4/ MOVEM 1,@LABL2(3) 1/ 1 <LF> 2/ 3 If you now enter the command <ESC>X, DDT does the following: o changes "$$." to LABL1+3 o executes the instruction at LABL1+3 o changes "$." to LABL1+4 o changes the current location to LABL1+4 o opens LABL1+4 o displays: 1/ SYM3+1 LABL2+3/ SYM3 LABL1+4/ MOVEM 1,@LABL2(3) If single-stepping an instruction results in a value of ($. minus $$.) not equal to 1, DDT also begins a new line and displays: o <SKIP> if ($. minus $$.) = 2 o <SKIP 2> if ($. minus $$.) = 3 o <SKIP 3> if ($. minus $$.) = 4 o <JUMP> if ($. minus $$.) is greater than 4 or less than 1 5-12 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION before displaying the address and contents of the next instruction to be executed. For example, the following shows a typical terminal display where you enter <ESC>X to single-step the first instruction at a breakpoint (DDT echoes <ESC> as $): $4B>>LABL1+5/ AOSN 3 / 0 <ESC>x 3/ 1 <SKIP> LABL1+7/ MOVEM 1,LABL2 o 5.5 EXECUTING SUBROUTINES AND RANGES OF INSTRUCTIONS 5.5 EXECUTING SUBROUTINES AND RANGES OF INSTRUCTIONS To execute a series of n instructions beginning with the instruction whose address is returned by the command "<ESC>.", enter: n<ESC>X where n is the number of instructions to execute. DDT then does the following for each instruction: o starts a new display line o executes the instruction o displays the address of any register or memory location referenced by the execution of the instruction, and the contents of those locations after execution of the instruction o changes the current location to the next instruction to be executed o opens the current location o displays the address and contents of the next instruction to be executed o changes "$." to the address of the next instruction to be executed o changes "$$." to the address of the instruction just executed 5-13 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION To suppress typeout of all but the last instruction executed, use the command: n<ESC><ESC>X where n is the number of instructions to execute. To continue program execution until the PC (program counter) enters a range of instructions, enter: {addr1<}{addr2>}<ESC><ESC>X where addr1 is the lower end of the range, and addr2 is the upper end. Addr1 defaults to 1 + "$." and addr2 defaults to addr1 + 3. Follow addr1 with a left angle bracket (<) and addr2 with a right angle bracket (>). This command also indicates skips and jumps. This command is useful for executing a loop or a subroutine call quickly and without typeout. For example, breakpoint 3 is at location LABL1. $3B>>LABL1/ PUSHJ 17,SUBRTN <ESC><ESC>X ;Enter <ESC><ESC>X <SKIP> ;SUBRTN returns + 2 LABL1+2/ ADD 1,2 If you enter a question mark (?) while DDT is executing an <ESC><ESC>X command, DDT displays: Executing: addr/ instr ____ where addr is the address of the next instruction to be executed, and _____ instr is the instruction. _________ ___ _________ __ ___ ______ __ ____________ To terminate the execution of the series of instructions, enter any character other than ? (question mark). DDT does the following: o echoes the character o displays <SKIP>, <SKIP 2>, <SKIP 3>, or <JUMP>, as appropriate o starts a new display line o changes the current location to the address of the next instruction to be executed o displays the address and contents of the current location 5-14 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION o opens the current location o waits for your next command 5.5.1 Single-Stepping "Dangerous" Instructions 5.5.1 Single-Stepping "Dangerous" Instructions DDT classifies the following as "dangerous" instructions: o instructions that can modify memory o instructions that can cause an arithmetic trap o instructions that can cause a stack overflow o a monitor call or I/O instruction Before single-stepping one of these instructions, DDT saves and replaces the original instructions at the breakpoints with JSRs to DDT, and restores the full user-program context (including interrupt system and terminal characteristics) before executing the instruction. After executing the instruction, DDT replaces the JSRs at the breakpoints with the original program instructions, and saves the full user-program context. DDT does not check whether the instruction actually results in one of these conditions, only whether the opcode is in the class of instructions that can cause these effects. This can make executing subroutines and ranges of instructions under DDT control extremely time-consuming. | To execute a subroutine or series of instructions without checking for | dangerous instructions, use the command: {addr1<}{addr2>}<ESC><ESC>1X where addr1 is the lower end of the range, and addr2 is the upper end. Addr1 defaults to 1 + "$." and addr2 defaults to 3 + addr1. Follow addr1 with a left angle bracket (<), and addr2 with a right angle bracket (>). CAUTION This command executes much faster than <ESC><ESC>X, but if the execution of an instruction causes a software interrupt, the error and trap handling mechanism may not function correctly. In addition, program instructions that change or rely on terminal or job characteristics that are also used by DDT can cause unpredictable results. 5-15 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION 5.6 USER-PROGRAM CONTEXT 5.6 USER-PROGRAM CONTEXT When DDT interrupts your program's execution at a breakpoint, and after it has executed a dangerous instruction during an <ESC>X or <ESC><ESC>X command, it saves the user-program context. The command <ESC>nI, where 0<=n<=8 (decimal), returns the address of the word that contains the information for "function" n. You can use this address to display and modify these values. Most of these values are useful only in executive mode. DDT displays the address of the word containing the information for function n as: $I+n where 1<=n<=10 (octal). If n = 0, DDT displays only $I. | Table 5-2 lists the functions. Table 5-2: User-Program Context Values Table 5-2: User-Program Context Values FUNCTION VALUE FUNCTION VALUE 0 Executive mode CONI PI. 1 Executive mode PI channels turned off. 2 Executive mode CONI APR. 3 User PC flags. 4 User PC address. 5 EPT page address. 6 UPT page address. 7 CST base virtual address. 10 SPT base virtual address. DDT restores the user-program context whenever you execute <ESC>G, <ESC>P, and when you execute <ESC>X, or <ESC><ESC>X of dangerous instructions. 5-16 CONTROLLING PROGRAM EXECUTION CONTROLLING PROGRAM EXECUTION Functions 5 through 10 (octal) affect DDT's interpretation of your program's virtual address space. You can alter DDT's interpretation of your program's virtual address space with the physical and virtual addressing (<ESC>nU) commands described in Chapter 11 (Physical and Virtual Addressing Commands). However, any alterations that you make do not become part of your user-program context, and do not affect TOPS-20's interpretation of your program's virtual address space. DDT also saves and restores the user-program ACs as part of the user-program context. DDT stores the contents of the ACs in an internal "register" block. Any references you make to addresses 0-17 refer to the relative locations in DDT's internal register block. These actions are totally transparent to you. 5-17 5-18 CHAPTER 6 CHAPTER 6 SEARCHING FOR DATA PATTERNS IN DDT SEARCHING FOR DATA PATTERNS IN DDT With DDT you can search for memory locations that contain a specific value, and conversely, for words that do not contain a specific value. You can also set a mask to indicate to DDT that only specified bits are to be considered when performing the search. In addition, you can search for words that reference a specific address. You can specify a range within which to perform the search, or default the range to all of your program's address space. In either case, DDT compares the contents of each location within the range with the specified value. ______ ___ _____ ____ _____ _ ________ _____ To search for words that match a specific value, enter: {addr1<}{addr2>}expr<ESC>W where expr is the value for which DDT is to search, and addr1 and addr2 delimit the range in which the search is to be conducted. Follow addr1 with a left angle bracket (<) and addr2 with a right angle bracket (>). Addr1 defaults to zero and addr2 defaults to 777777 in the current section. Expr can be any legal DDT expression. DDT does the following: o compares each location (after ANDing it with the search mask) within the search range with the 36-bit value resulting from evaluating expr o starts the search by comparing the contents of addr1 with ____ expr o stops the search after comparing the contents of addr2 with ____ expr o displays (on a new line) the address and contents of each location that matches expr o enters the address of each matching location on the location sequence stack 6-1 SEARCHING FOR DATA PATTERNS IN DDT SEARCHING FOR DATA PATTERNS IN DDT o sets the current location to addr2 o displays a blank line to indicate the search is over o restores the prevailing display mode NOTE If DDT finds more matching locations than there are words on the location sequence stack, the earlier entries are overwritten. o ______ ___ _____ ____ __ ___ _____ _ _________ _____ To search for words that do NOT match a specified value, enter: {addr1<}{addr2>}expr<ESC>N where expr is the value which is not to be matched, and addr1 and addr2 delimit the range within which DDT is to search. Follow addr1 with a left angle bracket (<) and addr2 with a right angle bracket (>). Addr1 defaults to zero and addr2 defaults to 777777 in the current section. Expr is any legal DDT expression. NOTE When you use the DDT search functions while running FILDDT, addr2 defaults to 777777 (in the current section) unless: | | o the target is the running monitor job and you are | using physical addressing o the target is an .EXE file and you are using normal virtual addressing o the target is a disk structure or data file In these cases, addr2 defaults to the last word of the target. See Chapter 9 (FILDDT), and Chapter 11 (Physical and Virtual Addressing Commands), for more information. 6-2 SEARCHING FOR DATA PATTERNS IN DDT SEARCHING FOR DATA PATTERNS IN DDT DDT functions as for the <ESC>W command, except: o DDT searches for and displays the address and contents of any word within the address range that does NOT match the 36-bit value resulting from evaluating expr. o DDT enters the locations of non-matching words on the location sequence stack. o ______ ___ __________ __ __ _______ To search for references to an address, enter: {addr1<}{addr2>}expr<ESC>E where addr1 and addr2 delimit the range of the search, and expr contains the address for which DDT is to search. Follow addr1 with a left angle bracket (<) and addr2 with a right angle bracket (>). Addr1 defaults to zero and addr2 defaults to 777777 in the current section. Expr is any legal DDT expression. DDT performs an IFIW effective address calculation on the expression contained in each word within the range, and uses the 18-bit result to determine whether there is a match. Thus, if bits 14-17 (the X field of an instruction) or bit 13 (the I field of an instruction) are nonzero, indexing or indirection may result in DDT finding different search results at different times. DDT does not check whether the expression is actually an instruction before performing the effective address calculation. o If you enter a question mark (?) while DDT is performing any of the above searches, DDT displays: Searching: addr/ value ____ where addr is the address of the location that will next compare, and _____ ____ value is the contents of addr. _____ ___ ______ To abort the search, enter any character other than question mark (?). DDT stops searching, and waits for more input. The character that you enter to terminate the search is otherwise ignored. | Each of the above search commands restores the prevailing display | mode. 6-3 SEARCHING FOR DATA PATTERNS IN DDT SEARCHING FOR DATA PATTERNS IN DDT <ESC>M is a command that addresses a DDT location that contains a ______ ____ search mask used to prevent specified bits in the memory word from being considered during the search. This mask is used only by <ESC>W and <ESC>N, not by <ESC>E. DDT logically ANDs the search mask with the memory word before making the comparison, but does not change the memory word. If DDT finds a match, it displays the entire word. DDT sets the search mask to 777777,,777777 (compare all 36 bits) by default. To set the search mask, enter: expr<ESC>M ____ where expr evaluates to the required bit pattern. For example, to search for all of the RADIX50 references to MAIN. (user input is in lowercase): <ESC><ESC>5t ;Set typeout mode to RADIX50. 37777,,777777<ESC>m ;Ignore the left 4 bits. main.<ESC>5"<ESC>w ;Enter RADIX50 symbol, start search. 4112/ 4 MAIN. ;DDT displays match found. 4775/ 0 MAIN. ;DDT displays match found. ;Search over, DDT displays blank line. You can also examine and modify the search mask with the examine and deposit commands described in Chapter 4 (Displaying and Modifying Memory). 6-4 CHAPTER 7 CHAPTER 7 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT 7.1 OPENING AND CLOSING SYMBOL TABLES 7.1 OPENING AND CLOSING SYMBOL TABLES Each separate program module has its own symbol table. When displaying a value symbolically, if more than one symbol is defined with that value, DDT displays the first global symbol found. When searching for a symbol, DDT searches the "open" symbol table first. For display purposes, DDT treats local symbols found in the open symbol table as global symbols. DDT appends a pound-sign (#) to local symbol names that it finds in a symbol table that is not open. For example: SYMBL1# where SYMBL1 is a local symbol that DDT found in a symbol table that is not open. If you enter an expression that contains a symbol that is defined in more than one of your program modules, DDT uses the value of the symbol that is contained in the open symbol table. If the symbol is not defined in the open symbol table, or if there is no open module and there is not a global definition of the symbol, DDT displays: M ____ ___ ______ _____ To open the symbol table of a program module, enter: name<ESC>: ____ where name is the name of the program module as specified by the TITLE pseudo-op in your MACRO-10 program (or the equivalent mechanism in a higher-level language program). DDT closes any currently open symbol ____ table and opens the symbol table associated with module name. 7-1 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT ____ ___ ____ __ ___ ______ __________ ____ ___ ____ ______ _____ To find the name of the module associated with the open symbol table, enter: <ESC>1: If there is an open symbol table, DDT displays the name of the module associated with the open symbol table. For example, if the symbol table for module X is open, the screen display is as follows (DDT echoes <ESC> as $, and does not display any spaces between the command and the module name): $1:/X If there is no open symbol table, DDT displays three spaces (or a tab, depending on the TTY control mask), and waits for your next command. _____ ___ ____ ______ _____ To close the open symbol table, enter: <ESC>: 7.2 DEFINING SYMBOLS 7.2 DEFINING SYMBOLS To redefine a symbol or to create a new symbol in the current symbol table, enter: expr<symbol: ____ ______ where expr is any legal DDT expression, and symbol is the symbol name. ______ To define symbol as the address of the open location, enter the command: symbol: | If there is no open location, DDT uses the address of the last ______ | location that was open. DDT defines symbol as a global symbol. If ______ | you previously used symbol as an undefined symbol, DDT inserts the ______ | correct value in all the places you referenced symbol, and removes ______ | symbol from the undefined symbol table. 7-2 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT 7.3 SUPPRESSING SYMBOL TYPEOUT 7.3 SUPPRESSING SYMBOL TYPEOUT To prevent a symbol from being displayed, enter: symbol<ESC>K ______ ______ where symbol is the symbol to be suppressed. DDT still accepts symbol ______ as input, but no longer displays symbol as output. To suppress the last symbol that DDT displayed (in an address, in the contents of a memory word, or in the evaluation of an expression), enter: <ESC>D DDT suppresses the last symbol displayed, and then redisplays the current quantity. DDT does not display its usual three spaces between the command and the displayed value. In the following example, assume that symbol SIZE is defined as 3. User typein is lowercase (<LF> does not appear on the terminal screen). start/ JFCL 0 <LF> LOOP/ AOS 1 <LF> LOOP+1/ MOVE 2,1 <ESC>dMOVE 2,1 <LF> START+3/ MULI 2,SIZE <ESC>dMULI 2,3 __________ _ ______ ___ _______ To reactivate a symbol for typeout, redefine the symbol. For example, to reactivate the display of symbol SIZE, above, enter: size<size: Note that SIZE is now defined as a global symbol, even if it was previously a local symbol. 7.4 KILLING SYMBOLS 7.4 KILLING SYMBOLS To remove a symbol from the symbol table, enter: symbol<ESC><ESC>K ______ DDT removes symbol from the symbol table, and no longer displays ______ ______ symbol or accepts symbol as input. 7-3 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT 7.5 CREATING UNDEFINED SYMBOLS 7.5 CREATING UNDEFINED SYMBOLS It is sometimes convenient to use symbols that have not yet been defined. To create an undefined symbol, enter: symbol# ______ ______ where symbol is the undefined symbol name. DDT enters symbol in the undefined symbol table. When you later define the symbol, DDT enters it into the defined symbol table, removes it from the undefined symbol table, and enters the correct value in all locations where you referenced the symbol. You can use undefined symbols only as parts of expressions that you are depositing to memory. Undefined symbols can be either fullword or right-halfword values; they cannot be used as the A or X fields of an instruction, or as the left-halfword of an expression. | | | 7.6 FINDING WHERE A SYMBOL IS DEFINED | 7.6 FINDING WHERE A SYMBOL IS DEFINED | To determine the modules in which a symbol is defined, enter: symbol? ______ where symbol is the name of the symbol. DDT displays the name of each ______ program module in which symbol is defined. If the symbol is a global symbol, DDT displays a "G", as: sym? MAIN. G DDT does not display G following a local symbol found in the open symbol table. When DDT has searched the entire symbol table, it displays a blank line. 7-4 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT 7.7 SEARCHING FOR SYMBOLS 7.7 SEARCHING FOR SYMBOLS To search for all the symbols that begin with a specific character pattern, use the command sym<ESC>? where sym is the character pattern for which you are searching, and may be one to six characters long. DDT searches your symbol tables and displays all symbols that begin with that pattern. DDT also displays all modules in which the symbol is found, whether the symbol is global, and the value of the symbol. In addition, if the symbol represents a value in which only one bit is set, DDT displays the number of the bit. For example, the command fdb<ESC>? might cause the following display: FDBIN INOUT G 3 FDBOUT INOUT G 2 (1B34) FDB MOD1 7 7.8 LISTING UNDEFINED SYMBOLS 7.8 LISTING UNDEFINED SYMBOLS To get a list of all currently undefined symbols, enter: ? DDT displays a list containing each undefined symbol. | | | 7.9 LISTING SYMBOLS | 7.9 LISTING SYMBOLS | | To get a list of all symbols starting with a certain character or set | of characters, enter: | | {val1<{val2>}}{sym}<ESC>{n}? | ____ ____ | where val1 and val2 restrict the values of symbols which DDT displays. ____ | If only val1 is present, only symbols having that value are displayed. ____ ____ | If both val1 and val2 are present, symbols with (signed) values ____ ____ _ | between val1 and val2 inclusive are displayed. The n argument is an | octal mask of flags. | | If bit 35 is on, only symbols defined in the open module are | displayed. If any of bits 33-30 are on, the corresponding bit from | 0-3 must be present in the symbol's definition. Any other bits are in | error. 7-5 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT | For example, entering "<ESC>4?" displays all global symbols, "<ESC>1?" | displays all symbols defined in the open module, and "5<100>T<ESC>5?" | displays all global symbols defined in the open module, starting with | "T", whose values are in the range of 5-100. 7.10 LOCATING SYMBOL TABLES WITH PROGRAM DATA VECTORS 7.10 LOCATING SYMBOL TABLES WITH PROGRAM DATA VECTORS DDT Version 44 can access symbol tables pointed to by JOBDAT, by PDVs (program data vectors) and by values you store in DDT. The command <ESC>5M returns the address of a DDT location that contains information to direct DDT to the current symbol table. The symbol $5M refers to the memory location at the address returned by the <ESC>5M command. If the value contained in $5M is negative (bit 0 is set), the right-halfword contains the number of the section that contains the JOBDAT area. If the value contained in $5M is positive (bit zero is clear, and the value in $5M is nonzero), $5M contains the 30-bit address of the PDV currently in use by DDT. If $5M contains zero, DDT uses values (which can be stored by the user) pointed to by locations 770001 and 770002 of UDDT, to determine which symbol table(s) to use. The algorithm that DDT uses is described below. To set $5M to a PDV address, type in addr<ESC>5M where addr is the the PDV address. If you know the PDV name, you can type in <ESC><ESC>:/name/ ____ where name is the name of the PDV, and the slashes (/) represent any ____ ____ characters that do not appear in name. If name is a null string, DDT searches for a PDV with no name or a null name. DDT ignores any ____ characters in name beyond a length of 39. ____ DDT searches for a PDV named name, and places its address in $5M. If DDT does not find the PDV, it displays ? and sounds the terminal buzzer or bell. 7-6 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT You can learn the names of the PDVs associated with your program by using the following sequence of TOPS-20 commands: @GET program-name @INFORMATION VERSION To display the name of the PDV addressed by $5M, type in <ESC><ESC>1: If $5M contains the address of a PDV, DDT displays the name of the PDV; otherwise, it does nothing. Whenever DDT is entered from its start address or from a breakpoint, if $5M is zero, DDT initializes $5M according to the following rules: o If XDDT was started by the UDDT stub, AND the location addressed by location 770001 in the stub has bit zero set: > DDT uses the location addressed by location 770001 (in the stub) as an IOWD pointer to a symbol table in the section that contains the stub. > DDT uses the location addressed by location 770002 (in the stub) as as IOWD pointer to the undefined symbol table in the section that contains the stub. o If XDDT was not started by the UDDT stub, OR the location addressed by location 770001 in the stub has bit zero clear: > If no PDVs exist, DDT sets $5M to -1,,n, where n is: * the section that contains the UDDT stub (if the stub exists) OR * the section that contains the entry vector (if an entry vector exists) OR * section zero. > If there is one (only) PDV, DDT sets $5M to the address of the PDV. 7-7 MANIPULATING SYMBOLS IN DDT MANIPULATING SYMBOLS IN DDT > If there is more than one PDV, DDT examines word .PVSYM of each PDV in ascending memory order (DDT first looks at the PDV closest to 0,,0). DDT then sets $5M to: * the address of the first (lowest in memory) PDV that contains a .PVSYM word that contains a global address (if there is one). * the address of the first (lowest in memory) PDV that exists in or above the section containing the entry vector (if there is one). * the address of the first (lowest in memory) PDV. NOTE DDT ignores its own PDV when setting $5M. 7-8 CHAPTER 8 CHAPTER 8 INSERTING PATCHES WITH DDT INSERTING PATCHES WITH DDT To replace the instruction at the open location with a series of instructions and test the new instructions without reassembling your program, you can use the DDT patch function. DDT deposits (in a patching area) the replaced instruction, the new series of instructions, and one or more JUMPA instructions back to the main line of your program. DDT also deposits (in the location that contains the replaced instruction) a JUMPA instruction to the first word of the patch. ______ _ _____ ____ ____ __ ________ ______ ___ ___________ To insert a patch that will be executed before the instruction at the open location, enter: {expr}<ESC>< ____ where expr is the start of the patching location, and defaults first to PAT.., then to PATCH. KDDT and MDDT default to FFF (an area created during the monitor build), PAT.., and PATCH, in that order. ____ If you do not enter expr, and DDT finds none of the default symbols, DDT uses the value contained in JOBDAT location .JBFF as the address ____ to begin the patch. If expr is a symbol (or the default), DDT updates the symbol table when you terminate the patch, so that the symbol identifies the first word after the patch that you just terminated. o If there is no open location when you initiate the patch, DDT displays "?" and sounds the terminal buzzer or bell. NOTE ____ If expr is an AC address, or resolves to a value less than 0,,140, DDT displays "?" and sounds the terminal buzzer or bell. 8-1 INSERTING PATCHES WITH DDT INSERTING PATCHES WITH DDT When you issue a command to start a patch, DDT saves the address of the open location, closes the open location, changes the current location to the first word in the patching area, and opens that word. DDT also displays the address and contents of the first word of the patching area. For example: <ESC>< PAT../ 0 You can now enter the patch, using deposit instructions (the expr<LF> format is probably most useful). DDT updates the current and open locations according to the rules for the command that you use. _________ ___ _____ To terminate the patch, enter: {expr}<ESC>{n}> ____ _ where expr is the last word of the patch you are entering, and n is the number of returns possible from execution of the patch. The default for n is 2, allowing for a return to 1 + the address of the instruction being replaced, and for a "skip return" to 2 + the address of the instruction being replaced. When you terminate the patch, DDT deposits the instruction being replaced into the first location following the current location, unless: o display is not suppressed by ! AND o the current location is zero AND ____ o the current location is closed OR you omitted expr in which case DDT deposits the instruction being replaced into the current location. This prevents the patch from containing unintended null words. DDT deposits n JUMPA instructions in the locations immediately following the one in which it deposited the original program instruction. The first JUMPA instruction has 1 in its A field, and jumps to 1 + the address of the replaced instruction, the second JUMPA instruction has 2 in its A field and jumps to 2 + the address of the replaced instruction, and so on. The AC numbers are used for identification purposes only. Any JUMPA instruction beyond the sixteenth contains 17 in its A field. DDT then changes the current location to the location that was open when you initiated the patch, deposits in the current location a JUMPA instruction to the first word of the patch that you entered, and displays the address, original contents, and new contents of the current location. The current location is "open", and can be modified by your next command. 8-2 INSERTING PATCHES WITH DDT INSERTING PATCHES WITH DDT ____ If you default expr, or enter a symbol in the {expr}<ESC>< command, when you terminate the patch, DDT redefines the symbol that identifies the start of the patch. If DDT used the value contained in JOBDAT location .JBFF as the address of the patching area, DDT changes the values contained in .JBFF and the left half of JOBDAT location .JBSA. In all cases, the new value is the address of the memory location after the last word of the patch. By default, there are 100 (octal) words in the patching area. DDT does not check whether your patch overflows the patching area. You can control the size of the patching area with the /PATCHSIZE switch in LINK. NOTE DDT allows you to use other DDT commands while you are in the process of entering a patch. DDT does not check whether the current and open locations are in the patching area, or whether you are entering patch instructions in sequence. When you terminate the patch, DDT deposits the instruction being replaced in the current location regardless of whether the current location is in the patching area. ______ _ _____ ____ ____ __ ________ _____ ___ ___________ To insert a patch that will be executed after the instruction at the open location, enter: {expr}<ESC><ESC>< ____ where expr is the address of the patching location (PAT.. is the default). The results are the same as inserting the patch before the instruction as above, except: o When you open the patch DDT deposits the replaced instruction in the first word of the patch. o When you terminate the patch, DDT deposits the first JUMPA instruction (rather than the instruction being replaced) in the first location following the current location unless: > display is not suppressed by ! AND > the current location is zero AND ____ > the current location is closed OR you omitted expr in which case DDT deposits the first JUMPA instruction in the current location. This is to prevent the patch from containing unintended null words. 8-3 INSERTING PATCHES WITH DDT INSERTING PATCHES WITH DDT NOTE ____ If expr is an AC address, or resolves to a value less than 0,,140, DDT displays "?" and sounds the terminal buzzer or bell. Figure 8-1 illustrates the patching function. The program being patched is X.MAC (see Figure 2-1). The patch inserts a SKIPN instruction that is to be executed after the instruction at START+4. Figure 8-1: Annotated Patching Session Figure 8-1: Annotated Patching Session DDT OUTPUT USER INPUT EXPLANATION START+4/ MOVE 2(IDX) As a result of your last command, DDT displays the contents of START+4. | <ESC><ESC>< Enter <ESC><ESC>< to start | the patch. | | PAT../ 0 MOVE 2(IDX) DDT displays the address | and contents of the first | word of the patch area, and | deposits the instruction from | START+4 in the first word of | the patch. | | PAT..+1/ 0 DDT displays the address | and contents of the next word | of the patch area. | | pat..= Check the address of PAT.." | (the first word of the patch | area). 14432 DDT displays the current address of "PAT..". | skipn 1,0<ESC>2> Enter the new instruction, | and terminate the patch with | a normal return and one skip | return by entering <ESC>2>. | | PAT..+2/ 0 JUMPA 1,START+5 DDT displays the next word | of the patch area, then | deposits a JUMPA instruction | to 1 + the address of the | replaced instruction. 8-4 INSERTING PATCHES WITH DDT INSERTING PATCHES WITH DDT Figure 8-1: Annotated Patching Session (Cont.) | Figure 8-1: Annotated Patching Session (Cont.) | | | DDT OUTPUT USER INPUT EXPLANATION | | PAT..+3/ 0 JUMPA 2,START+6 DDT displays the address | and contents of the next word | of the patch area, then | deposits a JUMPA instruction | to 2 + the address of the | replaced instruction. START+4/ MOVE 2(IDX) JUMPA STACK+10 DDT displays the address and original contents of the replaced instruction, then deposits and displays a JUMPA instruction to the first word of the patch. START+4 is the current location, and is "open". pat..= Check the address of the patch area. 14436 DDT updated "PAT..". Figure 8-2 shows the terminal display as it actually appears when you insert the patch described above. Your input is in lowercase. Figure 8-2: Terminal Display of Patching After an Instruction Figure 8-2: Terminal Display of Patching After an Instruction | START+4/ MOVE 2(IDX) $$< | PAT../ 0 MOVE 2(IDX) | PAT..+1/ 0 pat..=14432 skipn 1,0$2> | PAT..+2/ 0 JUMPA 1,START+5 | PAT..+3/ 0 JUMPA 2,START+6 | START+4/ MOVE 2(IDX) JUMPA STACK+10 pat..=14436 | Figure 8-3 shows the terminal display when inserting the same patch ______ | before the instruction at START+4. You enter the instruction in the ________ | form expr<LF> (user input is lowercase). Note the use of the patch ____ _ termination command without expr and without n. 8-5 INSERTING PATCHES WITH DDT INSERTING PATCHES WITH DDT Figure 8-3: Terminal Display of Patching Before an Instruction Figure 8-3: Terminal Display of Patching Before an Instruction | START+4/ MOVE 2(IDX) $< | PAT../ 0 .=14432 skipn 1,0 | PAT..+1/ 0 $> | PAT..+1/ 0 MOVE 2(IDX) | PAT..+2/ 0 JUMPA 1,START+5 | PAT..+3/ 0 JUMPA 2,START+6 | START+4/ MOVE 2(IDX) JUMPA STACK+10 pat..=14436 _____ ___ _____ ___ ___ ________ To abort the patch you are entering, enter: <ESC>0< DDT displays 3 spaces (or a tab, depending on the TTY control mask) and changes the current location to the location that was open when you initiated the patch. The symbol that denotes the start of the patching area is unchanged. Any deposits that you made as part of the patch remain in the patching area. This allows you to restart the same patch, or to write over the patch with a new one. 8-6 CHAPTER 9 CHAPTER 9 FILDDT FILDDT 9.1 INTRODUCTION 9.1 INTRODUCTION FILDDT is a utility used to examine and change disk files and physical disk blocks. You can also use FILDDT to examine monitor crash dumps, and to examine the running monitor. With FILDDT, you can look at .EXE files as if they had been loaded with the monitor GET command, or as if they were binary data files. In selecting a disk file, a disk, or the monitor with FILDDT, you are _______ _______ _____ really establishing the virtual address space that FILDDT accesses. When discussing the contents of that virtual address space, where the contents can be any of the above objects, this chapter uses the term ______ target. Once you have accessed a target, you can examine and modify it with the DDT examine and modify commands (you cannot modify the running monitor with FILDDT), and then save it with your modifications. You can use all of DDT's commands for examining and modifying memory, but you cannot use any commands that cause the execution of program instructions, such as <ESC>X, <ESC>G, and so on. If you attempt to execute a program instruction, FILDDT sounds the terminal buzzer or bell. 9.2 USING FILDDT 9.2 USING FILDDT There are two command levels in FILDDT. This document refers to these ______ _______ _____ ___ _______ _____ two levels as FILDDT command level and DDT command level. FILDDT command level accepts FILDDT commands to control session parameters and to select the target. FILDDT command level employs TOPS-20 command recognition and help. When at FILDDT command level, FILDDT displays the prompt: FILDDT> 9-1 FILDDT FILDDT Once you access a target, FILDDT enters DDT command level. At DDT command level, use DDT commands to examine and modify the target. The syntax of a FILDDT command-level command is: command {file-spec{/switch...}} _______ _________ where command is a FILDDT command-level command, file-spec is a ______ TOPS-20 file specification, and switch invokes a specific function or parameter about the function that you can perform (enable patching, for example). You can use FILDDT commands to invoke functions and parameters that are invoked by analogous FILDDT switches. With a FILDDT command you can: o request HELP on FILDDT o specify the target to be examined o invoke FILDDT functions o establish certain parameters about the functions that you can perform o enter DDT command level o exit FILDDT A FILDDT command can have more than one of the above effects. The commands and switches are described in detail in the rest of this chapter. To start FILDDT, enter the TOPS-20 command: FILDDT FILDDT enters FILDDT command level and prompts: FILDDT> You can now use the FILDDT commands described on the following pages. 9-2 FILDDT FILDDT 9.2.1 FILDDT Commands 9.2.1 FILDDT Commands There are two classes of FILDDT-level commands; those that select the target that FILDDT is to access and those that establish what function FILDDT is to perform for the target (enable patching, extract symbols, and treat an .EXE file as data). The following are the targets (virtual address spaces) that FILDDT can access, and the commands that select them: TARGET COMMANDS Disk files GET Disk structures DRIVE, STRUCTURE The running monitor PEEK To examine and patch disk structures, you must have WHEEL, OPERATOR, or MAINTENANCE privileges enabled. To examine the running monitor, you must have WHEEL or OPERATOR privileges enabled. Following are the parameters you can invoke for the target and the commands and switches that select them: FUNCTION COMMAND SWITCH Treat file as pure binary data ENABLE DATA-FILE /DATA Enable patching ENABLE PATCHING /PATCH Enable thawed access ENABLE THAWED /THAWED Load symbol table only from file LOAD /SYMBOL To get HELP, enter: HELP FILDDT displays a very brief description of the FILDDT commands and redisplays the FILDDT> prompt. To return to TOPS-20 command level from FILDDT command level, enter: EXIT 9-3 FILDDT FILDDT 9.2.2 Symbols 9.2.2 Symbols To enhance performance, FILDDT uses a symbol table that it builds in its own address space, rather than one which exists in the target address space. FILDDT automatically extracts symbols to build its internal symbol table from the first .EXE file it loads during a session. Once FILDDT has an internal symbol table, it ignores any symbols in subsequently loaded .EXE files unless you use the LOAD command or the GET command with the SYMBOL switch. 9.2.3 Commands to Establish Formats and Parameters 9.2.3 Commands to Establish Formats and Parameters ENABLE DATA-FILE ENABLE DATA-FILE If you specify an .EXE file, DDT (by default) loads the file in virtual memory as if it were to be executed. You can use the ENABLE DATA-FILE command to look at an .EXE file as if it were a data file. FILDDT then loads the entire file (including the .EXE directory block) as a binary file, starting at virtual location zero. You can accomplish the same thing by appending the /DATA switch to the file-spec when you use the GET command. ENABLE PATCHING ENABLE PATCHING The ENABLE PATCHING lets you modify the target. You can also enable patching by appending the /PATCH switch to the file-spec when you use the GET command. If you do not enable patching, you can only examine the target. If you attempt to modify the target but have not enabled patching, FILDDT displays: ? Patching is not enabled Note that you cannot enable patching in FILDDT with the <ESC>W command. ENABLE THAWED ENABLE THAWED The ENABLE THAWED command lets you examine and modify (if you enable patching) files that require thawed access. You can also use the /THAWED switch when loading the file with the GET command. 9-4 FILDDT FILDDT LOAD LOAD The LOAD command tells FILDDT to copy the symbol table from the file named by file-spec. Once FILDDT has built its internal symbol table, FILDDT displays: [Extracting symbols from file file-spec] [n symbols loaded from file] where n is the number of symbols that FILDDT extracted from the file. FILDDT then again prompts you with FILDDT>. You can also load symbols from the file you specify in the GET command by appending the /SYMBOL switch to the file-spec. If the file you specify is not an .EXE file, FILDDT displays: % Not in .EXE format -- Data file assumed. [Extracting symbols from file file-spec] ? Symbols cannot be extracted from a data file FILDDT then redisplays its prompt. 9.2.4 Commands to Access the Target and Enter DDT 9.2.4 Commands to Access the Target and Enter DDT DRIVE DRIVE The DRIVE command allows you to access a physical structure directly. This may be useful if the home block has been damaged. To access disk structures with FILDDT, you must have WHEEL, OPERATOR, or MAINTENANCE privileges enabled. If you wish to be able to patch the disk structure, you must give the ENABLE PATCHING command before using the DRIVE command. To access the disk structure, enter: DRIVE c k u where c is the channel, k is the controller, and u is the unit, in decimal. 9-5 FILDDT FILDDT If the unit is part of a mounted structure, FILDDT displays: [Unit is part of structure name] ____ where name is the logical name of the disk structure. If FILDDT successfully access the unit, FILDDT enters DDT command level and displays: [Looking at unit u on controller k on channel c] where c is the channel, k is the controller, and u is the unit, in decimal. GET GET The GET command tells FILDDT to load the file you name, invoke any parameters for which you specify switches, and enter DDT command level. Legal switches are /DATA, /PATCH, /SYMBOL, and /THAWED, and correspond to the ENABLE DATA-FILE, ENABLE PATCHING, LOAD, and ENABLE THAWED commands, respectively. If FILDDT extracts symbols and builds an internal symbol table, it displays: [Extracting symbols from file file-spec] [n symbols loaded from file] where n is the number of symbols loaded. When FILDDT has loaded the file, it displays: [Looking at file file-spec] where file-spec is the TOPS-20 file specification of the file. If FILDDT does not find the file, it displays: ? Invalid file specification, message where message is a TOPS-20 error string. 9-6 FILDDT FILDDT PEEK PEEK Use the PEEK command to examine the running monitor. To use FILDDT to examine the running monitor, you must have WHEEL or OPERATOR privileges enabled. Once you have invoked FILDDT, if you wish to be able to use monitor symbols when looking at the running monitor, you must use the LOAD command first, as: LOAD SYSTEM:MONITR.EXE You cannot patch the running monitor with FILDDT. To examine the running monitor, enter: PEEK FILDDT displays: [Looking at running monitor] and enters DDT command level. NOTE You cannot use FILDDT to PEEK at the running monitor unless you are using normal virtual addressing. If you are PEEKing the monitor and change memory mapping to a mode other than normal virtual addressing with the n<ESC>0U, n<ESC>1U, n<ESC>2U, or $$U commands, FILDDT does not give an error. However, every page in the monitor then appears to DDT to be non-existent. In this case, most attempts to reference memory causes DDT to display ?, sound the terminal buzzer or bell, and set the error string to "CAN'T PEEK PHYSICAL". Searches do not cause errors, but never discover matches. 9-7 FILDDT FILDDT STRUCTURE STRUCTURE The STRUCTURE command allows you to access a disk structure by its logical name. To access disk structures with FILDDT, you must have WHEEL, OPERATOR, or MAINTENANCE privileges enabled. If you wish to be able to patch the disk structure, you must give the ENABLE PATCHING command before using the STRUCTURE command. To examine a disk structure, enter: STRUCTURE name where name is the logical name of the structure. If the structure contains more than one physical disk, you can access the entire logical structure. If FILDDT successfully accesses the structure, it enters DDT command level and displays: [Looking at file structure name] ____ where name is the logical name of the structure. 9.2.5 Exiting FILDDT 9.2.5 Exiting FILDDT When you are through examining and modifying the target, save the modified file by entering: <CTRL/E> FILDDT closes the file, saving any changes that you have made, and returns to FILDDT command level. Any symbol table that you have loaded (explicitly or by default) remains loaded until you specify another with the LOAD command or the /SYMBOL switch. If you have modified symbols, FILDDT also modifies the symbol table of the disk file, if one of the following occurred: o FILDDT automatically loaded the symbol table. o you loaded the symbol table and entered DDT command level by entering: GET file-spec/SYMBOL 9-8 FILDDT FILDDT | FILDDT sometimes runs out of memory when you use the <CTRL/E> | command to save files without exiting FILDDT. If FILDDT runs out | of memory while loading a file, it displays the message: | | ? Not enough memory for file pages | | If FILDDT runs out of space while building a symbol table, it | displays the message: | | ? Not enough memory for symbols | | To reclaim all of your available memory, exit FILDDT with the | <CTRL/Z> command, and then restart FILDDT with the TOPS-20 | command FILDDT. Note that this technique restores standard | virtual addressing conditions, as if you had used the <ESC>U | command. See Chapter 11 (Physical and Virtual Addressing | Commands) for more information about virtual addressing | conditions. To close the file, save all modifications (as with <CTRL/E>, above) and exit from FILDDT, enter: <CTRL/Z> | If you exit FILDDT by entering <CTRL/C>, changes that you make to | a disk file can still be in FILDDT's output buffer; if so, they | will NOT be saved. When you exit FILDDT, you can save FILDDT with its internal symbol table. This saves time if you often use FILDDT to debug a specific file (such as the monitor) that has a very large symbol table. Start FILDDT, load the symbol table, then exit. Use the TOPS-20 SAVE command to create a copy of FILDDT to be used with that specific file. For example (your input is in lowercase): @filddt FILDDT>load system:monitr.exe [34472 symbols loaded from file] FILDDT>exit @save FILDDT.EXE.1 Saved 9-9 10-1 CHAPTER 10 CHAPTER 10 PRIVILEGED MODES OF DDT PRIVILEGED MODES OF DDT NOTE This chapter makes no attempt to explain internal monitor mechanisms. This chapter assumes that you are aware of various monitor contexts. Certain monitor contexts may interfere with or be interfered with by DDT context switching. It is up to you to be aware of these. Note also that internal monitor locations that are used in examples in this chapter are subject to change in subsequent monitor releases. 10-1 PRIVILEGED MODES OF DDT PRIVILEGED MODES OF DDT 10.1 MDDT 10.1 MDDT MDDT is used to debug and patch the running monitor during timesharing, and is an integral part of the swappable monitor. To run MDDT, you must have WHEEL or OPERATOR privileges enabled. To invoke MDDT, start DDT and then execute the MDDT% JSYS. For example (user input is lowercase): @enable $ddt DDT mddt%<ESC>x MDDT You can also invoke MDDT by running a MACRO-20 program that executes the MDDT% JSYS. MDDT runs in the executive virtual address space of the process that executed the MDDT% JSYS. While in MDDT, you are still running in user context, you are running under timesharing, and your process is subject to being swapped out, as is any other user process. If for some reason you cannot access system files, you can enter MDDT through the MEXEC, as follows: @enable $<CTRL/E>QUIT MX>/ where the / (slash) command to MEXEC enters MDDT. To exit MDDT, enter: mretn<ESC>g or enter: <CTRL/Z>. 10-2 PRIVILEGED MODES OF DDT PRIVILEGED MODES OF DDT 10.2 KDDT 10.2 KDDT You can run KDDT in executive mode or in user mode. KDDT in executive mode is used to debug parts of the monitor which can not be debugged interactively such as those modules that deal with physical memory or paging. KDDT in user mode is used to debug and patch the monitor .EXE file, which you can then save for BOOTing at a later time. KDDT is part of the resident monitor. When running KDDT in executive mode, you can exercise any normal DDT functions, such as changing memory and setting breakpoints. When you stop at a breakpoint and control passes to KDDT, timesharing (if in effect) ceases. To run KDDT in executive mode use the /E command when BOOTing the monitor. For example (user input is in lowercase): BOOT>/e ;Type in /e [BOOT: LOADING] [OK] EDDT ;EDDT is loaded and waiting for your command Your debugging may be easier if you lock the swappable monitor in core. You can do this by executing the instruction that calls monitor routine SWPMLK. For example: CALL SWPMLK<ESC>X To run KDDT in user mode: @get system:monitr.exe @start 140 DDT You can use KDDT in user mode to patch the monitor (.EXE file) which will be booted the next time the system is BOOTed up. After you have started KDDT as above, use the DDT patching commands to insert your patch. When your patch is complete, exit KDDT with <CTRL/Z> and use the TOPS-20 SAVE command to save the patched version of the monitor. For example: <ESC>< ;ESCAPE key followed by a left angle ;bracket. .... .... ;Type in the patch. <ESC>> ;ESCAPE key followed by right angle ;bracket. <CTRL/Z> ;Exit KDDT @save system:monitr.exe ;Save the new version. 10-3 PRIVILEGED MODES OF DDT PRIVILEGED MODES OF DDT 10.3 EDDT 10.3 EDDT You can use EDDT to debug user programs that run in executive mode. You must load EDDT.REL with your program, as follows: @LINK S SYS:EDDT.REL,PROG/GO @SAVE PROG where PROG is the name of your MACRO-20 program. 10-4 10-5 11-1 CHAPTER 11 CHAPTER 11 PHYSICAL AND VIRTUAL ADDRESSING COMMANDS PHYSICAL AND VIRTUAL ADDRESSING COMMANDS | All TOPS-20 DDTs (including FILDDT) can do their own page mapping. | The commands described in this chapter allow you to set parameters to govern the interpretation of the address space which you are examining. You can control the mapping of the address space you are examining by choosing to use or bypass the user process table (UPT) or the executive process table (EPT). You can choose which special pages table (SPT) to use, and which hardware register block to use. Other commands allow you to emulate either KI-paging or KL-paging, control address relocation, and set memory protection limits. In each of the following commands, the argument (page, addr, n) defaults to zero. NOTE The DDT commands <ESC>G, <ESC>P, and <ESC>X have side effects that affect your control over physical and virtual addressing. In addition to their normal functions, these commands also do the following: o restore normal virtual addressing as if <ESC>U had been given (<ESC>X does NOT do this) o set the FAKEAC flag (as if <ESC>U had been given) o clear the relocation factor (as if 0<ESC>8U had been given) o reset the address-protection address to infinity (377777,,777777) o restore the active hardware register block to the one in use before any <ESC>4U command was given 11-1 PHYSICAL AND VIRTUAL ADDRESSING COMMANDS PHYSICAL AND VIRTUAL ADDRESSING COMMANDS COMMAND EXPLANATION <ESC>U This command enables memory mapping by standard TOPS-20 virtual addressing. When you give this command, DDT restores the virtual addressing conditions that were in effect before any {<ESC>}<ESC>nU (where 0<=n<=2) commands were given, and sets DDT's FAKEAC flag, thereby forcing DDT to interpret memory addresses 0-17 as DDT's own internal "registers", in which the user's registers were saved. <ESC><ESC>U This command enables DDT to use actual physical addresses when accessing memory, and clears DDT's FAKEAC flag, causing DDT to interpret memory addresses 0-17 as the hardware registers 0-17. This command is meaningful only when using KDDT in executive mode, or when using FILDDT to look at the running monitor. Although DDT accepts <ESC><ESC>U at other times, this command then produces the same effect as <ESC>U. The general syntax of the following virtual addressing commands is: arg<ESC>nU ___ where n is the function number of the command, and arg is dependent on the function (see the function descriptions below). Functions 0, 1, and 2 enable you to control memory mapping by selecting the executive process table (EPT), user process table (UPT), or the section map through which mapping occurs. Setting a mapping condition with any one of these functions (0, 1, and 2) also has the effect of clearing the effects of any prior use of one of these functions (0, 1, and 2). You can also specify the offset into the special pages table (SPT) with functions 0, 1, and 2 by using the following command: arg<ESC><ESC>nU where arg is the SPT offset, and 0<=n<=2. This form is legal only if KL-paging is in effect. NOTE All forms of <ESC>B and <ESC>X are illegal if you have used the page mapping functions (0, 1, or 2) and have not restored standard mapping with the <ESC>U command. 11-2 PHYSICAL AND VIRTUAL ADDRESSING COMMANDS PHYSICAL AND VIRTUAL ADDRESSING COMMANDS COMMAND EXPLANATION page<ESC>0U This command causes memory mapping to occur through the executive ____ process table (EPT) that is located at physical page page. offset<ESC><ESC>0U This command produces the same effect as page<ESC>0U (above), ______ except that offset is an offset (in words) into the SPT. page1<page2<ESC>0U This command is an exception to the general syntax, and is legal only under KI-paging. You can select both the user page table (UPT) and the executive page table (EPT) with this command, where _____ _____ page1 is the page number of the UPT, and page2 is the page number of the EPT. Follow page1 with a left angle bracket (<). page<ESC>1U This command causes memory mapping to occur through the user ____ process table (UPT) that is located at physical page page. With this command, you can bypass the EPT. offset<ESC><ESC>1U This command produces the same effect as page<ESC>1U (above), ______ except that offset is an offset (in words) into the SPT. page<ESC>2U This command causes mapping to occur through the section map at ____ physical page page. This command is legal only if KL-paging is in effect. offset<ESC><ESC>2U This command produces the same effect as page<ESC>2U (above), ______ except that offset is an offset (in words) into the SPT. This command is legal only if KL-paging is in effect. 11-3 PHYSICAL AND VIRTUAL ADDRESSING COMMANDS PHYSICAL AND VIRTUAL ADDRESSING COMMANDS COMMAND EXPLANATION n<ESC>3U This command determines whether DDT interprets references to memory locations 0-17 as references to hardware registers, or to DDT's own internal "registers" (which normally contain the user-program ACs), by setting or resetting DDT's FAKEAC flag. If n=0, reset FAKEAC flag (use the hardware registers 0-17). If n is nonzero, set FAKEAC flag (use DDT's internal registers 0-17). If you enter a nonzero value for n, DDT stores the value -1. n<ESC>4U This command tells DDT to copy hardware register block n (0<=n<=7) to its own internal register block, set the FAKEAC flag, and use hardware register block n as its own registers. If the FAKEAC flag is set when you give this command, DDT first restores the contents of its internal register block to the hardware register block from which they were copied. This command is legal in executive mode EDDT and KDDT only. Note that the microcode uses register block 7, and any attempt to use this block produces an almost immediate system crash. addr<ESC>5U ____ This command copies the 20 (octal) word block located at addr to DDT's internal "registers" and sets the FAKEAC flag. addr<ESC>6U This command sets the special pages table (SPT) to addr. addr<ESC>7U This command sets the core status table address (CST) to addr. addr<ESC>8U ____ This command sets the address relocation factor to addr. DDT adds addr to all user addresses that you enter. addr<ESC>9U ____ This command read-and-write-protects all addresses above addr (before adding relocation factor). 11-4 PHYSICAL AND VIRTUAL ADDRESSING COMMANDS PHYSICAL AND VIRTUAL ADDRESSING COMMANDS COMMAND EXPLANATION n<ESC>10U This command controls whether KI paging is enabled or cleared. If n is nonzero, KI paging is enabled. If n=0, KI paging is cleared. If you enter a nonzero value for n, DDT stores the value -1. | This command is illegal in executive mode EDDT. n<ESC>11U This command controls whether KL paging is enabled or cleared. If n is nonzero, KL paging is enabled. If n=0, KL paging is cleared. If you enter a nonzero value for n, DDT stores the value -1. | This command is illegal in executive mode EDDT. | 22<ESC>U | 23<ESC>U | | These commands specify the type of CPU on which the program is | being debugged. 22<ESC>U refers to a KL processor. 23<ESC>U | refers to a KS processor. | | For DDT, this command is meaningless, because DDT uses the | current CPU type. However, these commands may be useful for | FILDDT. You can interrogate DDT to determine the last virtual addressing command that was given for a specific function. The command: <ESC>nU where 0<=n<=11, returns the address of a DDT location that contains __ ___ _______ ___ ____ ________ ___ ____ the argument that was given if the command for that function was used, and returns the default value if that function was not used. If you entered a nonzero argument to a command that requires zero or nonzero values (or if the default is nonzero), this location contains -1. You can use DDT commands to examine this location. 11-5 PHYSICAL AND VIRTUAL ADDRESSING COMMANDS PHYSICAL AND VIRTUAL ADDRESSING COMMANDS The command: <ESC><ESC>nU where 0<=n<=2, returns the address of a DDT location that contains information that indicates which function you used, and whether you set a page address or an offset. You can use DDT commands to examine this location. This command is illegal for all functions where n>2. If you did not enter any commands affecting functions 0-2 since the last <ESC>U command, the right half of this DDT location word contains zero. Otherwise, the right half contains n+1, where n is the number of the command function you used. If you set a page address (with arg<ESC>nU), bit 1 of this word is reset. If you set an offset (with arg<ESC><ESC>nU), bit 1 of the word is set. 11-6 CHAPTER 12 CHAPTER 12 EXTENDED ADDRESSING EXTENDED ADDRESSING 12.1 LOADING DDT INTO AN EXTENDED SECTION 12.1 LOADING DDT INTO AN EXTENDED SECTION If your program is loaded in a nonzero section, merge DDT with your program with the TOPS-20 command: @DDT DDT is loaded into the highest-numbered free (nonexistent) section. If your program has a TOPS-10-style entry vector in section zero, the EXEC merges the UDDT stub into the section that contains the entry vector, and places that section's JOBDAT symbol table pointers (.JBSYM and .JBUSY) into the DDT locations pointed to by UDDT locations 770001 and 770002. UDDT then loads XDDT into the highest-numbered free section. You can load DDT into a specific section with the EXEC's /USE-SECTION switch, as: @DDT/USE-SECTION:n where n is the (octal) section number of a section that does not already exist. You can load DDT into an existing section with the /USE-SECTION and /OVERLAY switches. You must be careful, however, that your program _______ ________ does not use any pages that DDT uses. See the TOPS-20 COMMANDS _________ ______ REFERENCE MANUAL for more information about the use of these switches. 12-1 EXTENDED ADDRESSING EXTENDED ADDRESSING 12.2 EXAMINING AND CHANGING MEMORY 12.2 EXAMINING AND CHANGING MEMORY The commands /, [ (left square bracket), ] (right square bracket), !, \ and <TAB> (see Section 4.4.3) open a memory location at an address calculated from an expression typed in or defaulted in the command. The syntax of the command is {expr}{<ESC>{<ESC>}}c where c is the command, and expr is any legal DDT expression (expr defaults to $Q, the current quantity). In nonzero sections, you can cause DDT to utilize all indirection and indexing indicated by EFIWs (extended format indirect words) to calculate 30-bit global addresses by using the format {expr}<ESC><ESC>c This format also recognizes and utilizes instruction format indirect words (IFIW). These commands are thoroughly described in Chapter 4 (Displaying and Modifying Memory). 12.3 BREAKPOINTS 12.3 BREAKPOINTS If DDT is running in a nonzero section, breakpoints can be set in any section. 12.3.1 The Breakpoint Block 12.3.1 The Breakpoint Block To set breakpoints in a section external to the one containing DDT, DDT requires an area of contiguous storage in the section containing the breakpoint. This area is known as the "breakpoint block". The extra storage is required for saving global addresses for transfer of control between your program and DDT, and also for the execution of single-stepped instructions that reference memory locations that are not in their section. Each section within your program space that contains a breakpoint must have one breakpoint block. Breakpoint blocks are located at the same relative local address within each section (the default is 777700), and are 100 (octal) words in size. Each breakpoint block is always contiguous within one section. Breakpoint blocks never extend across section boundaries and never "wrap around" the end of a section to the beginning of the section. 12-2 EXTENDED ADDRESSING EXTENDED ADDRESSING DDT creates a breakpoint block in each section as required, if inter-section breakpoints are enabled (see below). You (or your program) can reference memory within a breakpoint block, but any information stored there can be overwritten by DDT. 12.3.2 Enabling and Disabling Inter-section Breakpoints 12.3.2 Enabling and Disabling Inter-section Breakpoints The section-relative (18-bit) address of the breakpoint block(s) is stored in an internal DDT location. The command <ESC>4M returns the address of that DDT location. The symbol $4M refers to the DDT location at the address returned by <ESC>4M. Inter-section breakpoints are enabled as long as $4M contains the address of the breakpoint block. At startup, DDT enables inter-section breakpoints by default. To change the address of the breakpoint block, enter: n<ESC>4M where n is the address of the breakpoint block, and can be any legal DDT expression (20<=n<=777700). DDT uses only the right half of n, and changes only the right half of the DDT location at $4M. By default, the section-relative breakpoint block address is 777700, placing the breakpoint block at the top of the section. To display the address of the breakpoint block, enter: <ESC>4M/ Inter-section breakpoints are disabled when $4M contains zero. NOTE In MDDT, $4M defaults to MDDBLK. In KDDT, $4M defaults to EDDBLK. Each symbol denotes the start of a 100-word (octal) block contained in page zero of the monitor. Page zero of the monitor is mapped into every section that contains monitor code. _______ _____________ ___________ To disable inter-section breakpoints, enter: 0<ESC>4M 12-3 EXTENDED ADDRESSING EXTENDED ADDRESSING While inter-section breakpoints are disabled, you cannot set a breakpoint in a section external to DDT, and any breakpoints already set in such a section are lost when you begin program execution with <ESC>G, or continue program execution with <ESC>P. For each breakpoint lost, DDT displays: % CAN'T INSERT $nB - IN NON-DDT SECTION where n is the breakpoint number. While inter-section breakpoints are disabled, DDT cannot execute the <ESC>X command when: o you try to execute the instr<ESC>X command, and the default section is not the section that contains DDT. o you try to single-step a dangerous instruction and the user-program PC is not in the section that contains DDT. | In these cases, when you try to use <ESC>X, DDT rings the terminal | bell or buzzer and sets its error message text to: | | Intersection reference and no $4M global breakpoint/execute block 12.4 DISPLAYING SYMBOLS IN NONZERO SECTIONS 12.4 DISPLAYING SYMBOLS IN NONZERO SECTIONS DDT normally uses right-halfword values when searching symbol tables for symbols to display. However, code linked in a nonzero section has symbols defined with the section number in the left-halfword. DDT uses a 30-bit value when searching for a symbol in the following circumstances: o when displaying the address of a location o when displaying the contents of a location as an address o when displaying the Y field of an instruction When displaying an address, DDT searches for a symbol defined with the 30-bit value of the address. If such a symbol is not found, DDT displays the address in halfword format. When displaying the Y field of an instruction, DDT searches for a symbol defined with a 30-bit value consisting of: o the section number of the address of the word being displayed o the section-relative address contained in the Y field of the instruction 12-4 EXTENDED ADDRESSING EXTENDED ADDRESSING If DDT does not find a symbol defined with that 30-bit value, it looks for a symbol defined with the 18-bit value contained in the Y field of the instruction. Assume a program with the following conditions: Symbol LABL1 is defined as 0,,300 Symbol LABL2 is defined as 3,,300 Location 1,,300 contains 3,,300 Location 1,,301 contains 2,,300 Location 3,,400 contains 200040,,300 (MOVE contents of location 300 to AC 1) When displaying the contents of location 1,,300, DDT displays: 1,,LABL1/ LABL2 When displaying the contents of location 1,,301, DDT displays: 1,,LABL1+1/ 2,,LABL1 When displaying the contents of location 3,,400, DDT displays: LABL2+100/ MOVE 1,LABL2 12.5 DEFAULT SECTION NUMBERS 12.5 DEFAULT SECTION NUMBERS To reduce the need to type in the section number as part of the address when you specify a location, DDT uses a default section number when you do not specify one. DDT has two section defaulting options: o permanent default section o floating default section The command <ESC>6M returns the address of an internal DDT location that contains section default information. The symbol $6M refers to the DDT location at the address returned by the command <ESC>6M. When DDT is in section zero, the default section number is always zero, regardless of the contents of $6M. NOTE When you use KDDT in user-mode, $6M defaults to 0,,0. In all other cases, $6M defaults to 1,,0. 12-5 EXTENDED ADDRESSING EXTENDED ADDRESSING 12.5.1 Permanent Default Section 12.5.1 Permanent Default Section | If the value contained in $6M is non-negative (bit zero is reset), the permanent default section option is in effect. DDT then takes the left half of $6M as the section number of any address that you type in without a section number. Set the permanent default section by entering: n,,0<ESC>6M where n is the section number, and can be any legal DDT expression. 12.5.2 Floating Default Section 12.5.2 Floating Default Section If the value contained in $6M is negative (bit zero is set), the floating default section option is in effect. This is the default option (at start-up, DDT initializes $6M to -1). DDT selects the floating default section as follows: o If you enter DDT from its normal start address, DDT sets the default section to: > the section that contains the program entry vector (if there is one) OR > section zero. o If you enter DDT from a breakpoint, DDT sets the default section to the section that contains the breakpoint. o If you open a local address between 20 and 777777, DDT sets the default section to the section that contains the open address. o If you type in an address that contains a section number (including a symbol that is defined with a section number), DDT sets the default section to the one in the address you entered. If you exit DDT with <CTRL/C> or <CTRL/Z>, and then reenter DDT, the current location does not change. If you give a command that takes the current location as its default address argument, DDT sets the floating default section to the section of the current location. In the following example, the DDT screen display is on the left, and explanatory comments are on the right. The entry vector is in section 1. Symbol START is not defined with a section number. User input is in lowercase. 12-6 EXTENDED ADDRESSING EXTENDED ADDRESSING SCREEN DISPLAY USER INPUT EXPLANATION SCREEN DISPLAY USER INPUT EXPLANATION 3,,place/ Examine location 3,,PLACE. LABL1 DDT displays the contents. <LF> Type in <LF> to examine the next location. 3,,PLACE+1/ LABL1+2 DDT displays the next location. The floating default section = 3. <CTRL/C> Exit with <CTRL/C>. The current location is 3,,PLACE+1. @ TOPS-20 prompts you. @ddt Reenter DDT. DDT DDT is loaded and ready for your command. The floating default section is 1, because the entry vector is in section 1. <LF> Type in <LF> to examine the next location. 3,,START+2/ LABL1+4 DDT displays the address and contents of the next location. DDT doesn't use the floating default section, because your <LF> command defaults addr to the current location, and uses its section number (3). start/ Examine location START. DDT uses the floating default section number because symbol START is defined with no section number. JFCL 0 DDT displays the contents. <LF> Type in <LF> to examine the next location. 1,,START+1/ MOVE 1,LABL1 DDT displays the address and contents of the location. 12-7 EXTENDED ADDRESSING EXTENDED ADDRESSING 12.6 EXECUTING SINGLE INSTRUCTIONS 12.6 EXECUTING SINGLE INSTRUCTIONS Instructions that are executed by means of the command instr<ESC>X where instr is the instruction for DDT to execute, are executed within the current default section. If that section is not the one that contains DDT, DDT uses the breakpoint block in that section to execute instr. If the floating default section option is in effect and you are unsure of the current default section, use the addr/ command to open a location in the section in which you wish DDT to execute instr. This sets the default section to the section specified by addr. If DDT is to execute the instruction in a section other than the one that contains DDT, inter-section breakpoints must be enabled. If you try to execute instr outside DDT's section while intersection breakpoints are disabled, DDT sounds the terminal buzzer or bell, displays "?" and sets its error string to: | Intersection reference and no $4M global breakpoint/execute block 12.7 ENTERING PATCHES IN EXTENDED SECTIONS 12.7 ENTERING PATCHES IN EXTENDED SECTIONS You cannot enter a patch if a patching area does not exist in the section that contains the word to be replaced. To ensure that there is a patching area for each section that contains user-program code, do one of the following: o reserve the same part of each section for patches, and define the patch symbol as 0,,addr, where addr is the local address of the patching area o use only one patching area and map it into all the sections that contain user-program code. Define the patch symbol as 0,,addr, where addr is the local address of the patching area. o define a different symbol for each section's patching area, and use the symbol appropriate to the section being patched If the left half of expr is zero, DDT defaults the section to the section that contains the open location. If the left half of expr is a value that is not the section that contains the open location, DDT displays: ?CAN'T PATCH ACROSS SECTIONS 12-8 APPENDIX A APPENDIX A ERROR MESSAGES ERROR MESSAGES DDT and FILDDT display error messages to indicate the results of your commands. DDT sometimes (and FILDDT usually) displays these messages on the screen, and at other times displays only a question mark. When only a question mark is displayed, a location internal to DDT usually points to a text string that is the error message. To display the error message, enter the command: <ESC>? o Following is a list of DDT messages together with explanations of what the messages indicate. ? ABOVE PROTECTION REGISTER LIMIT The address of the location you tried to display or modify is above the protection register limit, which is set by n<ESC>9U. ? ACTUAL REFERENCE FAILED A memory reference failed unexpectedly (the page exists and is readable, but the reference failed anyway). ? ADDRESS GREATER THAN 777777 An address to be mapped through a section table has a nonzero section number. This can occur only if you specified a section table with the n<ESC>{<ESC>}2U command. A-1 ERROR MESSAGES ERROR MESSAGES | ? ADDRESS BEYOND END OF PHYSICAL MEM | | You attempted to examine a physical memory location beyond the | end of physical memory. This error occurs only if you have used | the <ESC><ESC>U command to enable physical addressing. ? Bad format for .EXE file You specified a file that appears to have an .EXE directory, but the directory is badly formatted or DDT cannot read it because of some other reason. ? BAD $4M VALUE You used the n<ESC>4M command where 777700<n<20. ? BAD POINTER ENCOUNTERED DDT does not recognize the type code contained in a page map pointer. This can occur only if you are trying to do your own virtual address mapping, and used the expr<ESC>{<ESC>}nU command, where 0<=n<=2. ? CAN'T BE WRITE ENABLED Even though you have automatic write-enable turned on, DDT is unable to write-enable a page that exists and is write-protected. ? CAN'T CREATE PAGE DDT attempted to create a page and failed, or else cannot attempt to create the page (see the <ESC>1W command). ? CAN'T DEPOSIT INTO SYMBOL TABLE BECAUSE ..... You tried to define or kill a symbol, but DDT was unable to modify the symbol table. Look up the second part of the error message in this appendix. ? CAN'T DEPOSIT INTO SYMBOL TABLE BECAUSE DEPOSIT FAILED You tried to define or kill a symbol, but DDT was unable to modify the symbol table, and cannot identify the specific reason. A-2 ERROR MESSAGES ERROR MESSAGES % CAN'T INSERT $nB BECAUSE ..... DDT is not able to access the location where you inserted your breakpoint. Look up the second part of the error message in this appendix. This situation occurs before DDT tries to execute <ESC>G, <ESC>P, <ESC>X, or <ESC><ESC>X. % CAN'T INSERT $nB BECAUSE BREAKPOINT IS IN DIFFERENT SECTION DDT is not able to access the location where you inserted your breakpoint because inter-section breakpoints are not enabled (<ESC>4M contains zero). This error occurs before DDT tries to execute <ESC>G, <ESC>P, <ESC>X, or <ESC><ESC>X. To enable inter-section breakpoints, deposit the breakpoint block address in the location addressed by the command <ESC>4M. % CAN'T INSERT $nB BECAUSE MEM REF FAILED DDT is not able to access the location where you inserted your breakpoint. DDT is not able to identify the reason. This occurs before DDT tries to execute <ESC>G, <ESC>P, <ESC>X, or <ESC><ESC>X. A typical occurrence is when you have a breakpoint set in the swappable monitor (set in KDDT in executive mode), but the swappable monitor is not locked in memory. ? CAN'T PATCH ACROSS SECTIONS You tried to insert a patch in a section other than the one that contains the patching area. ? CAN'T PEEK PHYSICAL You attempted to PEEK at the monitor but have specified other than normal virtual addressing (FILDDT only). % CAN'T REMOVE $nB BECAUSE ..... DDT is not able to access the location where you inserted your breakpoint. Look up the second part of the error message in this appendix. This error occurs when your program enters DDT from a breakpoint. A-3 ERROR MESSAGES ERROR MESSAGES % CAN'T REMOVE $nB BECAUSE BREAKPOINT IS IN DIFFERENT SECTION DDT is not able to access the location where you inserted your breakpoint. because inter-section breakpoints are not enabled (<ESC>4M contains zero). This error occurs when your program enters DDT from a breakpoint. To enable inter-section breakpoints, deposit the breakpoint block address in the location addressed by the command <ESC>4M. % CAN'T REMOVE $nB BECAUSE MEM REF FAILED DDT is not able to access the location where you inserted your breakpoint. DDT is not able to identify the reason. This error occurs when your program enters DDT from a breakpoint. A typical occurrence is when you have a breakpoint set in the swappable monitor (set in KDDT in executive mode), but the swappable monitor is not locked in memory. % CAN'T SET BREAKPOINT, $4M NOT SET You attempted to set a breakpoint in a section other than the one containing DDT while inter-section breakpoints were not enabled. | ? FAILURE ON SWITCHING ADDRESS SPACE | | EDDT (Executive mode EDDT only) encountered an error while trying | to access the virtual address space where monitor symbols are | kept. ? Garbage at end-of-command FILDDT encountered extra text at a place in the command where there should have been only <RET>. | | | Intersection reference and no $4M global breakpoint/execute block | | Inter-section breakpoints are not enabled, and one of the | following is true: | | o you tried to execute the command instr<ESC>X but the default | section is not the section that contains DDT. | | o you tried to single-step a dangerous instruction but the | user-program PC is not in the section that contains DDT. A-4 ERROR MESSAGES ERROR MESSAGES ? I/O error Some kind of I/O error occurred when FILDDT attempted to read or write to the unit specified in a DRIVE or STRUCTURE command. ? Illegal channel number You entered a DRIVE command that contained an illegal channel number. ? Illegal controller number You entered a DRIVE command that contained an illegal controller number. ? Illegal unit number You entered a DRIVE command that contained an illegal unit number. ? Incorrect symbol table pointer FILDDT is unable to read the symbol table specified by the symbol table pointer in the file. ? Input device must be a disk The device you specified is not a disk. ? Insufficient memory to read EXE file directory FILDDT does not have enough free memory to read in the directory section of the .EXE file that you specified. A-5 ERROR MESSAGES ERROR MESSAGES ? Insufficient memory to read PDV list FILDDT does not have enough free memory to read in the list of PDVs in the .EXE file that you specified. NOTE FILDDT sometimes runs out of memory when you use the <CTRL/E> command to save files without exiting FILDDT. If this is the case, exit with the <CTRL/Z> command, and then restart FILDDT with the TOPS-20 FILDDT command. ? INVALID DDT INTERNAL ADDRESS You addressed an internal location that is not defined. This is most likely to occur after you use a command that returns a value (such as <ESC>M) to examine a DDT location and then use <LF> or <BKSP> to look at nearby memory. ? Invalid file specification, message where message is a TOPS-20 error string. FILDDT could not parse a filespec given to a LOAD or GET command. ? Invalid guide phrase input where input is a guide (or noise) phrase that you typed in, and does not match FILDDT's guide phrase. M You entered a symbol that is defined in more than one module. You can select the correct symbol by opening the symbol table ____________ associated with that module, using the command module<ESC>:. ? MDDT BREAKPOINT BLOCK ALREADY IN USE Only one fork may have breakpoints set in MDDT at one time. You attempted to set a breakpoint in MDDT while another fork had already set an MDDT breakpoint. A-6 ERROR MESSAGES ERROR MESSAGES ? Missing or extra units in structure The number of units with the name supplied in a STRUCTURE command does not agree with the number of units in the first structure with that name returned by MSTR%. ? No keyword input where input is a word that you typed in. You entered ENABLE without the DATA, PATCHING, or THAWED qualifier. ? NO READ ACCESS You tried to display a word in a page to which you do not have read access. ? No such command as input where input is a word that you typed in. You entered a command that FILDDT does not recognize. ? No such file structure COMND% and DEVST% think you supplied a disk name in a STRUCTURE command, but no unit with that name was returned by MSTR%. ? Not enough memory for file pages FILDDT does not have enough free memory for its file page buffers. NOTE FILDDT sometimes runs out of memory when you use the <CTRL/E> command to save files without exiting FILDDT. If this is the case, exit with the <CTRL/Z> command, and then restart FILDDT with the TOPS-20 FILDDT command. ? Not enough memory for symbols FILDDT does not have enough free memory to read in the symbol table from the specified .EXE file. See the note above. A-7 ERROR MESSAGES ERROR MESSAGES ? NOT IN CORE You tried to map through a page map pointer (in a UPT, SPT, or section table) that addresses a page that is swapped out. This can occur only if you are trying to do your own virtual address mapping, and used the expr<ESC>{<ESC>}nU command, where 0<=n<=2. % Not in .EXE format -- Data file assumed. A GET command without a /DATA switch or a previous ENABLE DATA-FILE command specified a file which is not in .EXE file format. FILDDT assumes it is a data file. ? NOT WRITABLE You tried to modify a word in a write-protected page. To enable writing on protected pages, use the <ESC>0W command. | | | ? Null filename illegal | | You did not enter a file specification to a command that requires | one. ? PAGE DOES NOT EXIST You tried to display a word in a nonexistent page. ? Patching is not enabled You attempted to modify (with FILDDT) a file, a disk, or the monitor, but did not use the /PATCH switch or the ENABLE PATCHING command. % Patching the running monitor is illegal You entered an ENABLE PATCHING command and then gave a PEEK command. ? PEEK FAILED You tried to PEEK at the monitor, but do not have WHEEL or OPERATOR privileges enabled. A-8 ERROR MESSAGES ERROR MESSAGES % Symbols cannot be extracted from a data file ___ _____________ You used the command GET filnam/SYMBOL. Either the file specified by filnam is not an .EXE file, or you previously used ______ _________ the command ENABLE DATA-FILE. ? Symbols cannot be extracted from a data file ____ ______ You used the command LOAD filnam, and the file specified by filnam is not an .EXE file. U You entered a symbol that DDT cannot locate in any symbol table. Cure this by entering the correct symbol, or by defining the ______________ symbol with the command {expr<}symbol:. ? UNEXPECTED MOVEM FAILURE DDT could not deposit to memory even though the page exists exists and is write-enabled. NOTE ____ In the following messages, unit is one of the following: o "Unit" (if you used the DRIVE command) o "Unit u on controller k on channel c" (if you used the STRUCTURE command, where u, k, and c are the arguments you entered) ____ % Unit has a bad BAT block The unit that you specified in a DRIVE or STRUCTURE command has a bad BAT block. ____ % Unit has a bad HOME block The unit that you specified in a DRIVE or STRUCTURE command has a bad HOME block. A-9 ERROR MESSAGES ERROR MESSAGES ____ ? Unit is off line The unit that you specified in a DRIVE or STRUCTURE command is off line. ____ % Unit is write locked You used an ENABLE PATCHING command and then specified a write-locked unit in a DRIVE or STRUCTURE command. % Update of file's symbol table failed FILDDT was unable to write the modified symbol table back to the file after you gave a <CTRL/Z> or <CTRL/E> command. This may also occur when you use the n<ESC>5M command. A-10 GLOSSARY GLOSSARY bit Bit is a contraction of "binary digit". A bit is the smallest unit of information in a binary system of notation. It is the choice between two possible states, usually designated as zero and one. Bits of data are often used as flags to indicate on/off or yes/no conditions. breakpoint A breakpoint is a location in a program's executable code that has been modified so that if the program attempts to execute the instruction at that location, control passes to DDT before the instruction is executed. current display mode The current display mode is the mode in which DDT displays the next word (unless there is an intervening command that changes the current display mode). Also known as the current typeout mode. current quantity The current quantity is the most recent of: o the last 36-bit quantity that DDT displayed o the 36-bit evaluation of the last expression that you entered as an argument to a command that deposits to memory This value is often used as the default argument for the next command. Also known as the last value typed. Gloss-1 GLOSSARY GLOSSARY current location The current location is a memory word that has been referenced by an earlier DDT command. The address of the current location is the default address for most DDT commands. current location stack entry The location that will become the current location as a result of the next <ESC><RET> command. current radix The current radix is the radix in which DDT displays numeric values. current typeout mode See current display mode. debugging Debugging is the process of finding and removing programming errors from programs. EDDT EDDT is the DDT variant that is used to debug executive-mode programs. FILDDT FILDDT is the DDT variant that is used to examine and modify disk files and disk structures. FILDDT is also used to examine (but not modify) the running monitor. jiffy A jiffy is a unit of time defined as one AC (alternating current) cycle. If your line power has a frequency of 60 Hz., a jiffy is one sixtieth of a second (about 16 milliseconds). If your line power has a frequency of 50 Hz., a jiffy is one fiftieth of a second (20 milliseconds). KDDT KDDT is the DDT variant used to debug the monitor. You can set breakpoints, single-step instructions, and perform any other DDT function. Gloss-2 GLOSSARY GLOSSARY last value typed See current quantity. location A location is a numbered or named place in storage or memory where a unit of data or an instruction can be stored. This ____ ______ ____ manual also uses the terms word and memory word. location counter The location counter is a memory word that contains the address of the current location. location sequence stack The location sequence stack is a stack in which DDT stores the addresses of locations used earlier. DDT uses the stack to access these locations again without having you explicitly enter the address of each of the locations. DDT references these addresses in a last-in, first-out manner. MDDT MDDT is the DDT mode used to examine and patch the running monitor. open location The open location is a memory word that you can modify with your next DDT command. prevailing display mode The prevailing display mode is a user-defined default display mode. DDT displays memory words in the prevailing mode unless you specify a temporary display mode. You can restore the prevailing mode with the <RET> command. See Chapter 4 (Displaying and Modifying Memory) for a list of other commands that restore the prevailing display mode. reset Reset refers to the zero condition of a bit or flag. A bit __ _____ that is zero is said to be reset. To reset is the verb that refers to the act of turning the bit off, "clearing" the bit, or making it zero. Gloss-3 GLOSSARY GLOSSARY set Set refers to the nonzero condition of a bit or flag. A bit __ ___ that is nonzero is said to be set. To set is the verb that refers to the act of turning the bit on, or making it nonzero. single-stepping Single-stepping is the process of executing program instructions one at a time using DDT, to verify the result of each instruction. target Target refers to the contents of the virtual address space that FILDDT is accessing. The virtual address space may contain a disk structure, a disk file, or the running monitor. temporary display mode The temporary display mode is a short-term, user-selected display mode which overrides the prevailing display mode. Temporary display mode remains in effect until you enter <RET> or <TAB>. Also known as the temporary typeout mode. temporary typeout mode See temporary display mode. Gloss-4 INDEX $, 2-2 ], 4-9, 4-12, 4-13, 4-15, $$., 5-2, 5-3 12-2 $., 5-2, 5-3 ^, 4-9 Backslash, 4-9, 4-12, 4-13, ASCIZ strings, 4-19 4-16, 12-2 Automatic page-creation, 4-21 <BKSP>, 2-3, 4-9 Automatic proceed <CTRL/U>, 2-3 terminating, 5-8 <CTRL/Z>, 2-3 Automatic proceed flag, 5-7 deleting, 2-3 Automatic write-enable, 4-20 Equal sign, 4-6 <ESC>, 2-3, 4-12 BACKSPACE key, 2-3 <ESC>", 3-6 <BKSP>, 2-3 <ESC>"5, 3-7 $0BPT, 5-10 <ESC>"c<ESC>, 3-7 Breakpoint block, 12-2 <ESC>., 5-2 Breakpoints, 2-5, 5-1 <ESC>0<, 8-6 conditional, 5-9 <ESC>0T, 4-5 DDT action at, 5-3 <ESC>1:, 7-2 display additional location at, <ESC>1M, 4-23, 4-25 5-4 <ESC>1S, 4-5 display address of, 5-6 <ESC>1W, 4-21 executing command strings at, <ESC>2M, 4-3 5-5 <ESC>3M, 4-3 executing instructions at, 5-11 <ESC>4M, 12-3 executing subroutines at, 5-13 <ESC>5M, 7-6 inter-section, 12-3 <ESC>5T, 4-5 proceeding from, 5-3, 5-6 <ESC>6M, 12-5 removing, 5-6 <ESC>6T, 4-5 setting, 5-3 <ESC>7T, 4-5 single-stepping at, 5-11 <ESC>:, 7-1, 7-2 unsolicited, 5-10 <ESC><, 8-1 Byte pointers, 4-6 <ESC><BKSP>, 4-11, 4-12 <ESC><ESC>., 5-2 <ESC><ESC>1:, 7-7 Commands <ESC><ESC>1W, 4-21 DDT <ESC><ESC>1X, 5-15 , 4-6 <ESC><ESC>:, 7-6 !, 4-9, 4-12, 4-13, 4-16, <ESC><ESC><, 8-3 4-17, 4-18, 12-2 <ESC><ESC>K, 7-3 ", 3-5 <ESC><ESC>nU, 11-2 ""<""">, 3-6 <ESC><ESC>P, 5-8 ., 4-7 <ESC><ESC>Q, 4-8 /, 4-9, 4-12, 4-13, 4-14, <ESC><ESC>U, 11-2 12-2 <ESC><ESC>W, 4-20 ;, 4-6 <ESC><ESC>X, 5-14, 5-16 =, 4-6 <ESC><LF>, 4-11 ?, 4-19, 4-23, 5-14, 6-3, 7-5 <ESC><RET>, 4-11 [, 4-9, 4-12, 4-13, 4-14, <ESC>>, 8-2 12-2 <ESC>?, 2-3 \, 4-9, 4-12, 4-13, 4-16, <ESC>B, 5-6, 11-2 12-2 <ESC>C, 4-5 Index-1 <ESC>D, 7-3 DDT variants, 1-2 <ESC>E, 6-3 Default section <ESC>F, 4-5 floating, 12-6 <ESC>G, 5-1, 5-6, 5-16, 11-1 permanent, 12-6 <ESC>H, 4-5 Display mode <ESC>I, 5-16 C, 4-5 <ESC>K, 7-3 current, 4-3 <ESC>M, 6-4 F, 4-5 <ESC>N, 6-2 H, 4-5 0<ESC>nB, 5-6 O, 4-5 <ESC>nB, 3-4, 5-3, 5-4, 5-6 prevailing, 4-2 <ESC>nI, 3-4 1S, 4-5 <ESC>nM, 3-4 S, 4-5 <ESC>nT, 4-5 symbolic, 4-1 <ESC>nU, 3-4, 11-2 0T, 4-5 <ESC>O, 4-5 5T, 4-5 <ESC>P, 5-6, 5-7, 5-16, 11-1 6T, 4-5 <ESC>Q, 4-8 temporary, 4-2 <ESC>S, 4-5 <ESC>U, 5-17, 11-2 EFIW, 4-13, 4-18 <ESC>V, 4-23 <ESC>, 2-2, 2-3 <ESC>W (search), 6-1 ESCAPE key, 2-2, 2-3 <ESC>W (write-protect), 4-20 Expression operators, 3-7 <ESC>X, 5-11, 5-13, 5-16, Expressions, 3-2 11-1, 11-2 Extended format indirect word, <ESC>Z, 4-19 4-13 Exclamation point, 4-9, 4-12, 4-13, 4-16, 4-17, 4-18, IFIW, 4-13, 4-18 12-2 Initializing memory, 4-19 Left square bracket, 4-9, Input 4-12, 4-13, 4-14, 12-2 ASCII character, 3-6 <LF>, 2-3, 4-9 ASCII string, 3-5 Period, 4-7 decimal integer, 3-3 <RET>, 2-3, 4-9, 4-10 floating point, 3-3 Reverse slash, 4-9, 4-12, halfwords, 3-10 4-13, 4-16, 12-2 instructions, 3-10 Right square bracket, 4-9, long text string, 3-4 4-12, 4-13, 4-15, 12-2 octal integer, 3-2 Semicolon, 4-6 RADIX50 word, 3-7 Slash, 4-9, 4-12, 4-13, 4-14, SIXBIT character, 3-7 12-2 SIXBIT string, 3-6 <TAB>, 2-3, 4-9, 4-12, 4-13, text, 3-4 4-17, 12-2 value returned by a command, Underscore, 4-6 3-3 <ESC>L (page access), 4-22 Input to DDT, 3-2 FILDDT Instruction format indirect word, <CTRL/Z>, 9-9 4-13 CONTROL key, 2-3 CPU type for FILDDT, 11-5 Last quantity typed, 4-8 Current display mode, 4-3 <LF>, 2-3 Current location, 2-4, 4-7 LINE FEED key, 2-3 Current location stack entry, 4-8 Location counter, 2-4, 4-7 Current quantity, 2-4, 4-8 Location sequence stack, 2-4, 4-8 Dangerous instructions, 5-15 $4M, 12-3 Index-2 $5M, 7-6 for address, 6-3 $6M, 12-5 for matching value, 6-1 Mask for non-matching value, 6-2 output byte size, 4-3 terminate, 6-3 search, 6-4 Search mask, 6-4 TTY control, 4-23 Single-stepping, 5-11 Maximum symbolic offset, 4-4 Symbol table Memory protection, 4-20 closing, 7-2 Memory watch, 4-23 finding name of, 7-2 opening, 7-1 $nB, 5-2 Symbolic debugging, 1-1 Symbols Open location, 2-4, 4-7 creating undefined, 7-4 Operators defining new, 7-2 in expressions, 3-7 deleting, 7-3 Output byte size mask, 4-3 listing specific, 7-5 listing undefined, 7-5 Page accessibility, 4-22 locating, 7-4 Patch multiply-defined, 7-1 abort, 8-6 reactivating typeout of, 7-3 before instruction, 8-1 redefining old, 7-2 following instruction, 8-3 suppressing typeout of, 7-3 terminate, 8-2, 8-3 TAB key, 2-3 Prevailing display mode, 4-2 <TAB>, 2-3 Proceed count, 5-7 Temporary display mode, 4-2 TTY control mask, 4-23 $$Q, 4-8 $Q, 4-8 Unsolicited breakpoint, 5-10 User-program context, 5-16 <RET>, 2-3 RETURN key, 2-2, 2-3 Watching memory, 4-23 Search Zeroing memory, 4-19 Index-3