AA-D026A-TE VAX-11 Symbolic Debugger Reference Manual.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

AA-D026A-TE VAX-11 Symbolic Debugger Reference Manual.Pdf I I I I • rii~5555555 I I • • VAX-11 Symbolic Debugger Reference Manual Order No. AA-D026A-TE • • I I • • I 5555555YJ I ( August 1978 This document describes the VAX-11 Symbolic Debugger, a program used in locating errors in executable user images. The information in this document is particularly pertinent to programmers using the VAX-11 MACRO assembly language. VAX-11 Symbolic Debugger Reference Manual ( Order No. AA-D026A-TE ( SUPERSESSION/UPDATE INFORMATION: This is a new document for this release. OPERATING SYSTEM AND VERSION: VAX!VMS V01 SOFTWARE VERSION: VAX!VMS V01 To order additional copies of this document, contact the Software Distribution Center, Digital Equipment Corporation, Maynard, Massachusetts 01754 digital equipment corporation -maynard, massachusetts First Printing, August 1978 The information in this document is' subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may only be used or copied in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by DIGITAL or its affiliated companies. Copyright © 1978 by Digital Equipment Corporation ( The postage-prepaid READER'S COMMENTS form on the last page of this document requests the user's critical evaluation to assist us in pre­ paring future documentation. The following are trademarks of Digital Equipment Corporation: ( DIGITAL DECsystem-lO MASSBUS DEC DEC tape OMNIBUS PDP DIBOL OS/8 DECUS EDUSYSTEM PHA UNIBUS FLIP CHIP RSTS COMPUTER LABS FOCAL RSX COMTEX INDAC TYPESET-8 DDT LAB-8 TYPESET-ll DECCOMM DECSYSTEM-20 TMS-ll ASSIST-II RTS-8 lTPS-IO VAX VMS SBI DECnet lAS CONTENTS Page PREFACE vii CHAPTER 1 INTRODUCTION TO DEBUGGING 1-1 1.1 VAX-,ll SYMBOLIC DEBUGGER FACILITIES 1-1 1.2 USING THE VAX-II DEBUGGER 1-2 1. 2.1 Breakpoints 1-2 ( 1. 2.2 Tracepoints and Opcode Tracing 1-2 1. 2.3 Watchpoints 1-2 1. 2.4 Examining and Modifying Locations 1-2 1. 2. 5 Evaluating Expressions 1-2 1. 2. 6 Program Control 1-3 1. 2. 7 Starting and Ending Debugging Sessions 1-3 1. 2.8 Debugger Commands 1-3 1.3 SYMBOLIC REFERENCES 1-4 1. 3.1 Debugger Symbol Table 1-4 1. 3. 2 Scope 1-5 1. 3. 3 Pathnames 1-5 c 1. 3. 4 Local Symbol Definition 1-5 CHAPTER 2 BEGINNING AND ENDING A DEBUGGING SESSION 2-1 2.1 INITIATING THE DEBUGGER 2-1 2.2 STARTUP CONDITIONS 2-2 2.2.1 Startup Messages 2-2 2.2.2 Language Setting 2-3 2.2.3 Scope Setting 2-3 2.2.4 Setting Symbols 2-3 2.2.5 Entry and Display Modes 2-3 2.3 TERMINATING A DEBUGGING SESSION 2-4 CHAPTER 3 CONTROLLING PROGRAM EXECUTION 3-1 3.1 INITIATING AND CON,TINUING EXECUTION WITH GO 3-1 3.2 STEPPING THROUGH YOUR PROGRAM 3-2 3.2.1 Step Types 3,...2 3.2.2 Setting Step Types 3-3 3.2.3 Showing Step Types 3;..3 3.3 INTERRUPTING EXECUTION 3-3 C~'l':E:R 4 SPECIAL ·CHARACTERS 4-1 • ,'i>..{' " 4.1 EVALUATING ARITHMETIC EXPRESSIONS 4-1 4.1.1 Plus Sign (+) 4-2 4.1. 2 Minus Sign (-) 4-2 4.1. 3 Multiplication Operator (*) 4-3 4.1. 4 Division Operator (I) 4-3 4.1.5 Shift Operator (@) 4-3 4.1. 6 Precedence Operators « ••• » 4-3 4.1. 7 Radix Operators 4-4 iii CONTENTS (Cont.) c Page 4.2 SPECIAL CHARACTERS IN ADDRESS EXPRESSIONS 4-4 4.2.1 Current Location Symbol (.) 4-5 4.2.2 Previous Location Symbol (A) 4-5 4.2.3 Last Value Displayed Symbol (\) 4-5 4.2.4 Contents Operator (@) 4-6 4.2.5 Range Operator (:) 4-6 4.3 SPECIAL DELIMITING CHARACTERS 4-6 4.3.1 Mode Keyword Delimiter (/) 4-7 4.3.2 DEPOSIT and DEFINE Command Delimiter (=) 4-8 4.3.3 Symbolic Pathnam:e Element Separator (\) 4-8 4.3.4 DO Command Sequence Delimiters 4-9 4.3.5 CALL Command Argument Delimiters ( ( ••• ) 4-9 4.3.6 Command Separator ( ; ) 4-9 4.3.7 Argument Separator ( , ) 4-9 4.3.8 Input String Delimiters 4-10 f- 4.3.9 Bit Field Delimiters 4-10 4.3.10 Line Continuation Operator ( - ) 4-11 CHAPTER 5 ENTRY AND DISPLAY MODES 5-1 5.1 KEYWORD SUMMARY FOR ENTRY AND DISPLAY MODES 5-1 5.2 INITIALIZED MODES 5-2 5.3 CONTROL OF DEBUGGING MODES 5-2 5.3.1 Changing Modes 5-2 5.3.2 Reporting Current Modes 5-3 5.3.3 Restoring the Debugger's Initial Modes 5-3 5.3.4 Overriding Current Modes at Command Level 5-4 5.4 CONTEXT MODES 5-4 5.4.1 Effects of Context Modes 5-5 5.4.2 SYMBOLIC/NOSYMBOLIC Modes 5-6 5.4.3 INSTRUCTION/NO INSTRUCTION Modes 5-6 5.4.4 Evaluating VAX-II MACRO Literals 5-8 5.4.5 ASCII/NOASCII Modes 5-8 5.5 RADIX MODES 5-9 5.5.1 DECIMAL Mode 5-9 5.5.2 HEXADECIMAL Mode 5-10 5.5.3 OCTAL Mode 5-10 5.6 LENGTH MODES 5-10 ( 5.7 PATHNAME SEARCH MODES 5-10 5.7.1 GLOBAL/NOGLOBAL Modes 5-10 5.7.2 SCOPE/NOS COPE Modes 5-11 CHAPTER 6 SYMBOLS AND PATHNAMES 6-1 6.1 PATHNAMES 6-1 6.2 SYMBOL TYPES 6-2 6.2.1 Permanent Symbols 6-2 6.2.2 Defining Symbols During a Debugging Session 6-2 6.2.3 Local Symbols 6-5 6.2.4 Global SYmbols 6-5 6.3 THE DEBUGGER'S SYMBOL TABLE 6-6 6.3.1 Symbol Table Input (SET MODULE) 6-6 6.3.2 Symbol Table Status Report (SHOW MODULE) 6-6 6.3.3 Symbol Table Purging (CANCEL MODULE) 6-7 6.4 TRANSLATING SYMBOLS INTO VALUES 6-7 6.5 TRANSLATING VALUES INTO PATHNAMES 6-9 iv c CONTEN.TS (Con t. ) Page CHAPTER 7 BREAKPOINTS 7-1 7.1 USE OF BREAKPOINTS 7-1 7.1.1 Breakpoint Reporting at Program Stop 7-1 7.1. 2 Continuing From a Breakpoint 7-2 7.2 SETTING BREAKPOINTS 7-2 7.2.1 General Breakpoint Specification 7-2 7.2.2 DO Command Sequence at Breakpoint 7-3 7.2.3 Breakpoint "After" Option 7-4 7.2.4 Temporary Breakpoints 7-4 7.3 SHOWING BREAKPOINTS 7-4 7.4 CANCELING BREAKPOINTS 7-4 7.5 BREAKPOINT EXAMPLES 7-5 7.5.1 Examples of Setting Breakpoints 7-5 ( 7.5.2 Examples of Showing Breakpoints 7-5 7.5~3 Examples of Canceling Breakpoints 7-6 CHAPTER 8 TRACEPOINTS AND OPCODE TRACING 8-1 8.1 USING THE TRACE FACILITY 8-1 8.2 SETTING TRACEPOINTS 8-2 8.2.1 Individual Tracepoints 8-2 8.2.2 Tracing All Call-Type Instructions 8-2 8.2.3 Tracing All Branch-Type Instructions 8-3 8.2.4 Tracing All Call-Type and Branch-Type ( Instructions 8-3 8.3 SHOWING. TRACING MODES 8-3 8.4 CANCELING TRACING 8-3 8.5 TRACING EXAMPLES 8-4 8.5.1 Examples of Setting Tracepoints 8-4 8.5.2 Examples of Showing Tracepoints 8-4 8.5.3 Examples of Canceling Tracepoints 8-4 CHAPTER 9 WATCHPOINTS 9-1 9.1 USE OF WATCHPOINTS 9-1 9.1.1 Watchpoint Reporting 9-1 9.1. 2 Continuing From a Watchpoint 9-2 9.2 SETTING WATCHPOINTS 9-2 9.3 SHOWING WATCHPOINTS 9-2 9.4 CANCELING WATCHPOINTS 9-3 9.5 WATCHPOINT EXAMPLES 9-3 9.5.1 Examples of Setting Watchpoints 9-3 9.5.2 Examples of Showing Watchpoints 9-3 9.5.3 Examples of Canceling Watchpoints 9-4 9.6 WATCHPOINT RESTRICTIONS 9-4 CHAPTER 10 EXAMINE AND DEPOSIT COMMANDS. 10.1 EXAMINING MEMORY LOCATIONS AND REGISTERS 10-1 10.1.1 Examining Numeric Data 10-2 10.1. 2 Examining Instructions 10-3 10.1. 3 Displaying Locations As ASCII Characters 10-3 10.2 MODIFYING MEMORY LOCATIONS AND REGISTERS 10-3 10.2.1 Depositing Numeric Data 10-4 10.2.2 Depositing Instructions 10-4 10.2.3 Depositing ASCII Data 10-5 v CONTENTS (Cont.) ( Page CHAPTER 11 USING THE EVALUATE COMMAND 11-1 11.1 USING EVALUATE 11-1 11. 2 EXPRESSION EVALUATION 11-1 11. 3 EVALUATING BIT FIELDS 11-1 11.4 EVALUATING VAX-II MACRO LITERALS 11-2 CHAPTER 12 EXCEPTION CONDITIONS 12-1 12.1 PROCESSING EXCEPTION CONDITIONS 12-1 12.2 BREAK ON EXTERNAL EXCEPTION CONDITION 12-2 CHAPTER 13 CALLING ROUTINES AND SHOWING CALLS 13-1 13.1 CALLING ROUTINES 13-1 13.2 SHOWING ACTIVE CALLS 13-1 CHAPTER 14 PROCESSOR STATUS LONGWORD (PSL) 14-1 14.1 DISPLAYING THE PROCESSOR STATUS LONGWORD 14-1 14.2 ALTERING THE PROCESSOR STATUS LONGWORD 14-1 CHAPTER 15 DEBUGGER MESSAGES 15-1 15.1 INFORMATIONAL MESSAGES (PREFIX:%DEBUG-I-) 15-2 15.2 WARNING MESSAGES (PREFIX:%DEBUG-W~) 15-3 ( 15.3 ERROR MESSAGES (PREFIX:%DEBUG-E-) 15-8 15.4 FATAL ERROR MESSAGES (PREFIX:%DEBUG-F-) 15-8 APPENDIX A COMMAND SUMMARY A-I INDEX Index-1 FIGURES ( FIGURE 6-1 Debugger Symbo1-to-Va1ue Search Algorithm 6-8 TABLES TABLE I-I Summary of VAX-II Symbolic Debugger Commands 1-4 2-1 Debugger Initiation Qualifiers 2-2 4-1 Arithnietic Special Characters 4-1 4-2 Address Representation Characters 4-4 4-3 Delimiting Characters ' 4-7 5-1 Keyword Summary for Entry and Display Modes 5-1 14-1 PSL Alteration Values 14-2 vi ( PREFACE MANUAL OBJECTIVES This manual describes the facilities supplied with the VAX-II Symbolic Debugger.
Recommended publications
  • LABEL MATRIX 2021 Release Notes Version 2021.00.00
    LABEL MATRIX 2021 Release Notes Version 2021.00.00 Table of Contents System Requirements ................................................................................................................. 3 Virtual Environment .................................................................................................................... 3 LABEL MATRIX 2021 New Features, Improvements and Fixes ........................................................... 4 LABEL MATRIX 2019 New Features, Improvements and Fixes ........................................................... 5 LABEL MATRIX 2018 New Features, Improvements and Fixes ........................................................... 7 LABEL MATRIX 2016 New Features, Improvements and Fixes ......................................................... 10 LABEL MATRIX 2015 New Features, Improvements and Fixes ......................................................... 11 LABEL MATRIX 2014 New Features, Improvements and Fixes ......................................................... 12 LABEL MATRIX 2012 New Features, Improvements and Fixes ......................................................... 14 LABEL MATRIX 8 New Features, Improvements and Fixes .............................................................. 15 New Device Support.................................................................................................................. 19 Known Limitations .................................................................................................................... 34 www.teklynx.com
    [Show full text]
  • P310 Maintenance Manual
    P310 Maintenance Manual CPARD RINTER P RODUCTS Manual No. 980264-001 Rev. B ©2001 Zebra Technologies Corporation FOREWORD This manual contains service and repair information for P310 Card Printers manufactured by Zebra Technology Corporation, Camarillo, California. The contents include maintenance, diagnosis and repair information. TECHNICAL SUPPORT For technical support, users should first contact the distributor that originally sold the product—phone +1 (800) 344 4003 to locate the nearest Eltron Products Distributor. Eltron Products offers the following: U.S.A Europe Asia Latin America http://www.eltron.com Internet ftp://ftp.eltron.com e-mail [email protected] [email protected] [email protected] [email protected] Compu 102251,1164 Serve Phone +805 578 1800 +33 (0) 2 40 09 70 70 +65 73 33 123 +1 847 584 2714 +44 (0) 1189 895 762 FAX +1 805 579 1808 +65 73 38 206 +1 847 584 2725 +33 (0) 2 40 09 70 70 RETURN MATERIALS AUTHORIZATION Before returning any equipment to Eltron for either in- or out-of-warranty repairs, contact the Eltron Repair Administration for a Return Materials Authorization (RMA) number. Then repackage the equipment, if possible using original packing materials, and mark the RMA number clearly on the outside. Ship the equipment, freight prepaid, to one of the following addresses: For USA and Latin America: For Europe, Asia, and Pacific: Zebra Technologies Corporation Zebra Technologies Corporation Eltron Card Printer Products Eltron Card Printer Products 1001 Flynn Road Zone Industrielle Rue d’Amsterdam Camarillo, CA 93012-8706, USA 44370 Varades, France Phone: +1 (805) 579-1800 Phone: +33 (0) 2 40 09 70 70 FAX: +1 (805) 579-1808 FAX: +33 (0) 2 40 83 47 45 COPYRIGHT NOTICE This document contains information proprietary to Zebra Technology Corporation.
    [Show full text]
  • The-Dark-Zebra-User-Guide.Pdf
    ZebraHZ and THE DARK ZEBRA Version 2.9.3 22. Jul 2021 U-HE • Heckmann Audio GmbH • Berlin Table of Contents Introduction 5 The Dark Zebra .....................................................5 ZebraHZ ................................................................5 Installation .............................................................6 Terms of Use .........................................................7 User Interface 8 Basic Operation ....................................................8 Upper Bar ..............................................................9 GUI size ...............................................................10 Synthesis Window ...............................................10 Main grid .........................................................11 Lane Mixer ......................................................12 Lane Compressors ..........................................13 Performance Window ..........................................14 Lower Bar and Lower Pane .................................15 Preset Browser 16 Overview .............................................................16 Directory Panel (folders) ..................................17 Presets Panel (files) .........................................19 Preset Info Panel .............................................21 Installing More Soundsets................................... 21 Preset Tagging ....................................................22 Search by Tags ....................................................23 Search by Text ....................................................24
    [Show full text]
  • Programming Announcements Announcements Announcements
    5/20/2008 Programming Announcements FIT100 FIT100 • Why is programming fun? • Undergraduate Research • Finally, there is the delight of working in such a Symposium tractable medium. The programmer, like the ∗ Friday poet, works only slihtllightly re-moved from pure thought-stuff. He builds his castles in the air, ∗ How many attended? from air, creating by exertion of the imagination. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures. Source: Frederick P. Brooks, Jr. The Mythical Man-Month Essays on Software Engineering. Announcements Announcements FIT100 FIT100 •Project 2B • Labs this week ∗ Due on Wednesday before 12 Noon ∗ Monday-Tuesday •If yyqou don't submit the quiz before 11, • Finish uppp proj ect 2B your answers are gone!! ∗ Wednesday-Thursday • Aim at submitting quiz before 11 • Grading spreadsheet that will calculate your current grade in the class Getting Help Exercise 4 FIT100 FIT100 • JavaScript Exercise 4 ∗ Describe how you use a for loop to cyygcle through radio buttons to find the one that has been checked. 1 5/20/2008 Exercise 4 Exercise 4 FIT100 FIT100 <label for="giraffe">Giraffe</label><br /> <label for="giraffe">Giraffe</label><br /> <input type="radio" id="giraffe" <input type="radio" id="giraffe" name="animals" /> name="animals" /> <label for="zebra">Zebra</label><br /> <label for="zebra">Zebra</label><br /> <input type="radio" id="zebra" <input type="radio" id="zebra" name="animals" /> name="animals" /> <label for="lion">Lion</label><br
    [Show full text]
  • Zebra 2.0 and Lagopus: Newly-Designed Routing Stack On
    Zebra 2.0 and Lagopus: newly-designed routing stack on high-performance packet forwarder Kunihiro Ishiguro∗, Yoshihiro Nakajimay, Masaru Okiz, Hirokazu Takahashiy ∗ Hash-Set, Tokyo, Japan y Nippon Telegraph and Telephone Corporation, Tokyo, Japan z Internet Initiative Japan Inc, Tokyo, Japan e-mail: [email protected], [email protected], [email protected], [email protected] Abstract First GNU Zebra architecture and its issues Zebra 2.0 is the new version of open source networking When we designed the first GNU Zebra, the biggest ambition software which is implemented from scratch. Zebra 2.0 was to make multi-process networking software work. The is designed to supports BGP/OSPF/LDP/RSVP-TE and co- first GNU Zebra is made from a collection of several dae- working with Lagopus as fast packet forwarder with Open- mons that work together to build the routing table. There may Flow API. In this new version of Zebra, it adapts new archi- be several protocol-specific routing daemons and Zebra’s ker- tecture which is mixture of thread model and task completion nel routing manager. Figure 1 shows the architecture of the model to achieve maximum scalability with multi-core CPUs. first GNU Zebra. RIB (Routing Information Base) / FIB (For- Zebra has separate independent configuration manager that warding Information Base) and the interface manager are sep- supports commit/rollback and validation functionality. The configuration manager understand YANG based configuration arated into an isolated process called ’zebra’. All of protocol model so we can easily add a new configuration written in handling is also separated to it’s own process such as ’ripd’, YANG.
    [Show full text]
  • Verifiable Asics Riad S
    Verifiable ASICs Riad S. Wahby?◦ Max Howald† Siddharth Garg? abhi shelat‡ Michael Walfish? [email protected] [email protected] [email protected] [email protected] [email protected] ?New York University ◦Stanford University †The Cooper Union ‡The University of Virginia Abstract—A manufacturer of custom hardware (ASICs) can under- deploy the two ASICs together, and, if their outputs differ, mine the intended execution of that hardware; high-assurance ex- a trusted processor can act (notify an operator, impose fail- ecution thus requires controlling the manufacturing chain. How- safe behavior, etc.). This technique provides no assurance if ever, a trusted platform might be orders of magnitude worse in per- formance or price than an advanced, untrusted platform. This pa- the foundries collude—a distinct possibility, given the small per initiates exploration of an alternative: using verifiable computa- number of top-end fabs. A high assurance variant is to execute tion (VC), an untrusted ASIC computes proofs of correct execution, the desired functionality in software or hardware on a trusted which are verified by a trusted processor or ASIC. In contrast to platform, treating the original ASIC as an untrusted accelerator the usual VC setup, here the prover and verifier together must im- pose less overhead than the alternative of executing directly on the whose outputs are checked, potentially with some lag. trusted platform. We instantiate this approach by designing and This leads to our motivating question: can we get high- implementing physically realizable, area-efficient, high throughput assurance execution at a lower price and higher performance ASICs (for a prover and verifier), in fully synthesizable Verilog.
    [Show full text]
  • Printer RFID Reader the Tags Will All Be Within Six Inches of the Reader/Writer Module So High Amplification Is Unnecessary
    Compact RFID Printer Module for WJ Communications, Inc. Dr. John Bellantoni, Liaison A Major Qualifying Project Report Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of bachelor of Science Submitted by: ___________________________________ Brett Ferguson [email protected] ___________________________________ Ian Levesque [email protected] ____________________________________ Jeremy Turner [email protected] Approved by: ____________________________________ Project Advisor: Professor John Orr [email protected] March 1, 2007 1 Abstract In order to advance the expanding RFID market with a truly unique product, this project focuses on the creation of a compact, short-range RFID module with integrated antenna. To achieve this goal, a prototype is constructed and tested following standard RF design techniques. The final module, named the WJM4000, reliably reads and writes RFID tags while featuring a smaller form factor and consuming less power than existing RFID designs. 2 Executive Summary Radio Frequency Identification (RFID) technology has been in use for over 50 years, but has only recently begun to experience massive growth in the form of new applications and implementations. Recent standardization efforts have created a market for a wide variety of RFID transponders (tags) and many different styles of readers and writers. One area of particular growth is inventory and supply-chain management, both industrial and commercial. This application commonly utilizes compact passive tags embedded within adhesive labels, which are printed with conventional barcode information, but also contain additional information in the form of EPC codes written into the embedded RFID tags. Major companies in the barcode industry, such as Zebra Technologies, have expanded their lines of barcode printers to include RFID functionality.
    [Show full text]
  • Zebra EPL Programming Guide
    EPL Programming Guide © 2007 ZIH Corp. The copyrights in this manual and the software and/or firmware in the label printer described therein are owned by ZIH Corp. Unauthorized reproduction of this manual or the software and/or firmware in the label printer may result in imprisonment of up to one year and fines of up to $10,000 (17 U.S.C.506). Copyright violators may be subject to civil liability. This product may contain EPL™, EPL2™, ZPL®, ZPL II®, and ZebraLink™ programs; Element Energy Equalizer® Circuit; E3®; and Monotype Imaging fonts. Software © ZIH Corp. All rights reserved worldwide. ZebraLink and all product names and numbers are trademarks, and Zebra, the Zebra logo, ZPL, ZPL II, Element Energy Equalizer Circuit, and E3 Circuit are registered trademarks of ZIH Corp. All rights reserved worldwide. All other brand names, product names, or trademarks belong to their respective holders. For additional trademark information, please see “Trademarks” on the product CD. Proprietary Statement This manual contains proprietary information of Zebra Technologies Corporation and its subsidiaries (“Zebra Technologies”). It is intended solely for the information and use of parties operating and maintaining the equipment described herein. Such proprietary information may not be used, reproduced, or disclosed to any other parties for any other purpose without the express, written permission of Zebra Technologies Corporation. Product Improvements Continuous improvement of products is a policy of Zebra Technologies Corporation. All specifications and designs are subject to change without notice. Liability Disclaimer Zebra Technologies Corporation takes steps to ensure that its published Engineering specifications and manuals are correct; however, errors do occur.
    [Show full text]
  • ZQ511/ZQ521 User Guide (En)
    ZQ511/ZQ521 Mobile Printers User Guide P1106523-01EN ZEBRA and the stylized Zebra head are trademarks of Zebra Technologies Corporation, registered in many jurisdictions worldwide. All other trademarks are the property of their respective owners. © 2020 Zebra Technologies Corporation and/or its affiliates. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. For further information regarding legal and proprietary statements, please go to: SOFTWARE: http://www.zebra.com/linkoslegal COPYRIGHTS: http://www.zebra.com/copyright WARRANTY: http://www.zebra.com/warranty END USER LICENSE AGREEMENT: http://www.zebra.com/eula Terms of Use Proprietary Statement This manual contains proprietary information of Zebra Technologies Corporation and its subsidiaries (“Zebra Technologies”). It is intended solely for the information and use of parties operating and maintaining the equipment described herein. Such proprietary information may not be used, reproduced, or disclosed to any other parties for any other purpose without the express, written permission of Zebra Technologies. Product Improvements Continuous improvement of products is a policy of Zebra Technologies. All specifications and designs are subject to change without notice. Liability Disclaimer Zebra Technologies takes steps to ensure that its published Engineering
    [Show full text]
  • DS2208 Digital Scanner Product Reference Guide (En)
    DS2208 Digital Scanner Product Reference Guide MN-002874-06 DS2208 DIGITAL SCANNER PRODUCT REFERENCE GUIDE MN-002874-06 Revision A October 2018 ii DS2208 Digital Scanner Product Reference Guide No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Zebra. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Zebra grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Zebra. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Zebra. The user agrees to maintain Zebra’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
    [Show full text]
  • ZPL II Programming Guide 45541L-004 Rev
    ZPL II Programming Guide For x.10 through x.13 Firmware © 2006 ZIH Corp. The copyrights in this manual and the software and/or firmware in the label printer described therein are owned by ZIH Corp. Unauthorized reproduction of this manual or the software and/or firmware in the label printer may result in imprisonment of up to one year and fines of up to $10,000 (17 U.S.C.506). Copyright violators may be subject to civil liability. This product may contain ZPL®, ZPL II®, and ZebraLink™ programs; Element Energy Equalizer® Circuit; E3®; and Monotype Imaging fonts. Software © ZIH Corp. All rights reserved worldwide. ZebraLink and all product names and numbers are trademarks, and Zebra, the Zebra logo, ZPL, ZPL II, Element Energy Equalizer Circuit, and E3 Circuit are registered trademarks of ZIH Corp. All rights reserved worldwide. All other brand names, product names, or trademarks belong to their respective holders. For additional trademark information, please see “Trademarks” on the product CD. Proprietary Statement This manual contains proprietary information of Zebra Technologies Corporation and its subsidiaries (“Zebra Technologies”). It is intended solely for the information and use of parties operating and maintaining the equipment described herein. Such proprietary information may not be used, reproduced, or disclosed to any other parties for any other purpose without the express, written permission of Zebra Technologies. Product Improvements Continuous improvement of products is a policy of Zebra Technologies. All specifications and designs are subject to change without notice. Liability Disclaimer Zebra Technologies takes steps to ensure that its published Engineering specifications and manuals are correct; however, errors do occur.
    [Show full text]
  • I See Dead Μops: Leaking Secrets Via Intel/AMD Micro-Op Caches
    I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches Xida Ren Logan Moody Mohammadkazem Taram Matthew Jordan University of Virginia University of Virginia University of California, San Diego University of Virginia [email protected] [email protected] [email protected] [email protected] Dean M. Tullsen Ashish Venkat University of California, San Diego University of Virginia [email protected] [email protected] translation; the resulting translation penalty is a function of Abstract—Modern Intel, AMD, and ARM processors translate complex instructions into simpler internal micro-ops that are the complexity of the x86 instruction, making the micro-op then cached in a dedicated on-chip structure called the micro- cache a ripe candidate for implementing a timing channel. op cache. This work presents an in-depth characterization study However, in contrast to the rest of the on-chip caches, the of the micro-op cache, reverse-engineering many undocumented micro-op cache has a very different organization and design; features, and further describes attacks that exploit the micro- op cache as a timing channel to transmit secret information. as a result, conventional cache side-channel techniques do not In particular, this paper describes three attacks – (1) a same directly apply – we cite several examples. First, software is thread cross-domain attack that leaks secrets across the user- restricted from directly indexing into the micro-op cache, let kernel boundary, (2) a cross-SMT thread attack that transmits alone access its
    [Show full text]