Contents | < Browse | Browse >

 O U T P U T   E X A M P L E 
__________________________________________________________________________
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

   This is how a PatchWork hit looks like:

exec.library OldOpenLibrary("dos.library")
Severity 1: obsoleted, use OpenLibrary() instead
PC=08339720 TCB=08399D58 ("Shell Process")
Data: 00000001 020CE5C5 00004000 08350BA4 00000001 00000001 020CFF85 08339714
Addr: 08350BA4 08339732 08014E0C 08339714 084F3C08 00F92D70 0800083C 084F3BFC
----> 08339732 - "pwtest"  Hunk 0000, Offset 0000001A
----> 00F92D70 - "ROM - dos 39.23 (8.9.92)"  Hunk 0000, Offset 00000314
PC-8: 00000000 00000000 0833653C 00000000 00000030 00000000 43FA0018 2C780004
PC *: 4EAEFE68 22402C78 00044EAE FE627000 4E75646F 732E6C69 62726172 79004E71
Stck: 084F3BFC 08339724 00F9359C 00004000 0839A74C 08533B40 00001970 48E7303E
Stck: 24482649 61A66730 2C6A0018 206A0014 4EAEFF94 2848204B 610000B8 661C2449
----> 08339720 - "pwtest"  Hunk 0000, Offset 00000008
----> 08339724 - "pwtest"  Hunk 0000, Offset 0000000C
----> 00F9359C - "ROM - dos 39.23 (8.9.92)"  Hunk 0000, Offset 00000B40
__________________________________________________________________________
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

   Now for the single lines:

   The first line contains what function caused the hit:

exec.library OldOpenLibrary("dos.library")
                            ^^^^^^^^^^^^^--- passed parameters
             ^^^^^^^^^^^^^^----------------- function name
^^^^^^^^^^^^-------------------------------- library name


   The second one describes the hit itself:

Severity 1: obsoleted, use OpenLibrary() instead
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^--- cause
^^^^^^^^^^---------------------------------------- severity level


   (With the TINY option set, no more lines are displayed.)

   The third line locates the hit:

PC=08339720 TCB=08399D58 ("Shell Process")
                          ^^^^^^^^^^^^^^^--- task name
                ^^^^^^^^-------------------- address of the task structure
   ^^^^^^^^--------------------------------- address of the JSR instruction
                                             that caused the hit.


   (With the SMALL option set, no more lines are displayed.)

   After that, the data and address register contents follow:

Data: 00000001 020CE5C5 00004000 08350BA4 00000001 00000001 020CFF85 08339714
Addr: 08350BA4 08339732 08014E0C 08339714 084F3C08 00F92D70 0800083C 084F3BFC


   If you enabled DREGCHECK or AREGCHECK, the contents of any register
   will be passed to SegTracker (of course SegTracker must be running):

----> 08339732 - "pwtest"  Hunk 0000, Offset 0000001A
----> 00F92D70 - "ROM - dos 39.23 (8.9.92)"  Hunk 0000, Offset 00000314


   With SHOWPC enabled, 64 bytes around the PC at hit time will be shown:

PC-8: 00000000 00000000 0833653C 00000000 00000030 00000000 43FA0018 2C780004
PC *: 4EAEFE68 22402C78 00044EAE FE627000 4E75646F 732E6C69 62726172 79004E71


   After that, all stack lines will be shown. You can change the number
   of stack lines using the STACKLINES parameter. Defaults to 2 lines.

Stck: 084F3BFC 08339724 00F9359C 00004000 0839A74C 08533B40 00001970 48E7303E
Stck: 24482649 61A66730 2C6A0018 206A0014 4EAEFF94 2848204B 610000B8 661C2449


   If SegTracker is running, it will be fed with the PC:

----> 08339720 - "pwtest"  Hunk 0000, Offset 00000008


   And last but not least, if STACKCHECK is enabled, all longwords shown
   in the stack lines above are passed to SegTracker:

----> 08339724 - "pwtest"  Hunk 0000, Offset 0000000C
----> 00F9359C - "ROM - dos 39.23 (8.9.92)"  Hunk 0000, Offset 00000B40