---------------------
CHAPTER 5:
*** THE GEMDOS ***
---------------------
*** GEMDOS FUNCTIONS ***
-------------------------------
- The GEMDOS functions can be directly called in assembly.
Just:
.Pass the parameters needed by the function in the system stack
(WORDS or L-W).
.Pass the function code in the system stack. (WORD)
.Call the GEMDOS with a TRAP #1
- The same is true for BIOS and XBIOS functions.
(Only the TRAP number changes: TRAP #13 for BIOS and TRAP #14 for
XBIOS)
- ATTENTION! The GEMDOS, BIOS and XBIOS functions often return
information: in certain data registers and some
address registers.
Care must be taken to preserve the concerned registers before
calling one of these functions so as not to lose their content.
(e.g. using MOVEM)
- Before using the GEMDOS, BIOS and XBIOS functions, it is necessary
to reserve a certain amount of memory because when the operating
system launches your program, we must allocate the quantity of memory
that the program really needs.
(To avoid overlapping of data in memory)
The operating system (the GEM Desktop) will read the BASE PAGE which
is at the start of your .PRG program (see the INTRODUCTION chapter)
before executing it.
This BASE PAGE is of size $100 (256) bytes and contains all
the information needed by the operating system for the loading
of the PRG, but it is up to us to indicate the size of memory
that will need to be reserved.
After loading the program, SP points to the BASE PAGE, so
the various data contained in the
BASE PAGE can easily be read by incrementing SP for example.
Organization of the BASE PAGE:
------------
Byte:$00=Start of the Base Page
----- $04=Pointer to the end of free memory
$08=Pointer to the start of the prg
$0C=Size of the TEXT area
$10=Pointer to the DATA area
$14=Size of the DATA area
$18=Pointer to the BSS area
$1C=Size of the BSS area
$20=Pointer to the DTA buffer
$24=Pointer to the base page of the calling PRG (parent)
$80=The command line
To indicate the size of memory to reserve, there is a GEMDOS function, the parameters to pass are:
.the number of BYTES to reserve (L-W)
.A L-W which is the pointer to the end of free memory
.a WORD equal to 0
The function code is $4A (function 'SETBLOCK')
To find the number of bytes to reserve (the total size of the PRG)
thanks to the Base Page, we add:
.The size of the Base Page ($100 bytes)
.The space occupied by the instructions (L-W at $C(SP) because SP points to
the start of the base page)
.The size of the DATA area (L-W at $14(SP) )
.The size of the BSS area (L-W at $1C(SP) )
We put the result in a dn register and place it as a parameter
(L-W) in the system stack (MOVE.L dn,-(SP) ) followed by a L-W which is
the pointer to the end of free memory and a WORD equal to 0:
(MOVE #0,-(SP) )
Then we stack the code of the function SETBLOCK: MOVE #$4A,-(SP)
and call the GEMDOS with TRAP #1.
This initialization must be done at the beginning of any program.
----------------------------------------------------------------
To avoid retyping everything each time, we will create a
MACRO INSTRUCTION that will do it for us.
A MACRO is delimited by the directives:
MACRO (After the name of the Macro to mark the beginning of the MACRO)
-----
ENDM (At the end of the MACRO to mark the end of it)
----
Example: A MACRO called ADD which adds the low word
---- of registers d0 and d1 will be written:
TEXT
add MACRO ;beginning of the macro
ADD.W d0,d1 ;the Macro itself
ENDM ;End of the Macro
; This MACRO can then be used:
MOVE #3,d0
MOVE #5,d1
add ;call of the MACRO 'add'
MOVE d1,res
BSS
res DS.W 1 ;We will find the word 5+3=8 in 'res'
END
The MACRO can be used as many times as you want, but
care must be taken not to put Labels in your MACRO because they
would be rewritten multiple times and this would cause errors...
The MACRO can then be saved in a file.
To indicate to the LINKER that you are going to use a MACRO that is in
an external file, you will have to use the DIRECTIVE:
INCLUDE "file.xxx"
-------
It must be used before the first MACRO from 'file.xxx' is
used.
The entire file will be ASSEMBLED separately, but only the used MACROs
will be included.
But let's go back to our GEMDOS 'setblock' function:
The Listing of the SETBLOCK Macro will be:
TEXT
SETBLOCK MACRO ;beginning macro
move.l a7,a5 ;USP in a5
lea stack,a7 ;'stack' is the address pointing to an area
;of memory reserved for certain
;functions.
;(the name of the label is arbitrary...)
;(Of course, you must reserve this area with
;DS.x space: 200 bytes are generally enough)
move.l 4(a5),a5 ;free memory ending address in a5
move.l $c(a5),d0 ;TEXT area length in d0
add.l $14(a5),d0 ;adds the size of the DATA zone
add.l $1C(a5),d0 ;adds the size of the BSS zone
add.l #$100,d0 ;adds size of Base P. to d0
move.l d0,-(sp) ;STACKS the space to reserve (1st parameter)
move.l a5,-(sp) ;STACKS a5 (2nd parameter)
move #0,-(sp) ;STACKS word=0 (3rd parameter)
move #$4a,-(sp) ;STACKS the CODE of SETBLOCK
trap #1 ;GEMDOS call ->execution of the function.
add.l #12,sp ;When returning, SP is incremented to
;regain its initial value.
ENDM ;end of the MACRO
END ;end of assembly
We will save this macro in the file 'INIT_TOS.L'.
All the programs we write will therefore have to look like this:
---------------------------------------------------------------------
TEXT
INCLUDE "INIT_TOS.L" ;Linkage of the file
SETBLOCK ;call of the MACRO SETBLOCK
. ;the instructions
. ;that form the prg
.
DATA ;the data zone
. ;with the initialized data
.
.
BSS ;the bss zone
. ;with the reservations
.
.
DS.B 200 ;and space reserved for the needs
stack DS.B 1 ;of the GEMDOS, BIOS, XBIOS functions we
;will use. (Upstream of the
;'stack' label). USP points on 'stack' and
;will be decremented when passing the
;parameters to the functions
;(MOVE.x source, -(SP) )
;:Let's not forget that only the memory that
;the program really needs is
;reserved after SETBLOCK.
END
The listing of the SETBLOCK macro instruction is found in the file
INIT_TOS.L on this disk and is fully available to you.
NB:You will therefore always have to make sure to reserve memory in the
-- BSS zone upstream from the address pointed to by the label we
named 'STACK'.
There is no need to economize on space by reserving little memory,
the size of the BSS segment does not affect the
size of the PRG...
- I will now enumerate the various functions of the GEMDOS.
Only the commonly used functions will be studied, for the
others, you will have to refer to THE ST BIBLE, but I doubt you
will need to use them in the near future...
For each function, I will give you:
.The CODE and the NAME of the function
---- ---
.The PARAMETERS to pass
----------
.The PURPOSE of the function
---
.A MACRO INSTRUCTION that uses the studied function if it
can be frequently useful to us...
All these macro instructions that we will create from the
GEMDOS, BIOS and XBIOS functions will be collected in the file
MACROS.L and of course, you can use them whenever
you desire.
*** THE GEMDOS FUNCTIONS ***
-------------------------------
$00 (TERM), no parameter
---
TERM allows to end the program and return to the calling program
(or parent program).
That is to say that if we use the TERM function of gemdos, the prg stops and
returns to the GEM DESKTOP (if the program has only been loaded from
the DESKTOP) or to the instruction following the calling instruction, of
the FATHER program. In this latter case, the PRG using the term function is
named SON program and has been loaded by the so called 'FATHER' program.
TERM MACRO ;TERM macro named 'TERM'
CLR.W -(SP) ;TERM code
TRAP #1 ;GEMDOS call
ENDM ;MACRO end
$01 (CCONIN), no parameter
---
CCONIN waits for a character on the keyboard and displays it at the current
cursor position.
The function returns, the ASCII code of the pressed key in the low
byte of the low word of d0 and the SCANCODE of the
key in the low byte of the high word of d0.
The SCANCODE allows to identify keys that do not have an ASCII code
(such as function keys) and it also allows to distinguish between
keys that have the same ASCII code (such as numbers on the numeric
keypad and those on the main block)
The ASCII code and SCANCODE can be reached in this way for
example:
MOVE #$01,-(SP) ;CCONIN CODE
TRAP #1 ;-->gemdos
ADDQ.L #2,SP ;we reinitialize SP
CMPI.B #'A',d0 ;compare the low byte of the low word of
;d0 with the ASCII code of
;'A' that is $41
BEQ yes
SWAP.W d0 ;SWAP the 2 words of d0
CMPI.B #0,d0 ;is the SCANCODE nill ???
BNE no
etc...
NB:You have noticed that I wrote:CMPI #'A',d0.
-- Writing 'A' or the ASCII code of A that is $41 is identical.
You can therefore for example replace MOVE #$42,d0 with MOVE #'B',d0
,this makes the listing more readable if you use instructions
that must move data representing ASCII codes...
The assembler will make the correction. (just as MOVE source,an is
accepted and replaced by MOVEA source,an)
CCONIN MACRO ;The equivalent macro
MOVE #$1,-(SP)
TRAP #1
ADDQ.L #2,SP
ENDM
$02 (CCONOUT), WORD=ascii code
---
CCONOUT displays the character represented by the ASCII code that is passed
as a parameter on the stack at the current cursor position.
CCONOUT MACRO $\1 ;here, $\1 tells the assembler that we
;will pass a parameter to the macro.
move \1,-(SP) ;we stack the parameter \1
move #2,-(SP) ;then the code of CCONOUT
trap #1 ;gemdos
addq.l #4,SP ;correction of the stack
ENDM ;end of the MACRO
As you can see, we have just created a MACRO instruction
that accepts a PARAMETER.
It is indicated to the assembler by the directive: MACRO $\1
The parameter can be for example:#'A' or d0 or #$48 etc...
Examples of using the macro CCONOUT (with a parameter):
CCONOUT #'a'
will display an 'a' on the screen
MOVE #'a',d0
CCONOUT d0
idem
CCONOUT #53
will display the character with ASCII code 53.
$03 (CAUXIN), no parameter
---
CAUXIN allows the reception of a character via the RS232 interface.
If there has been no error, the ASCII code of the character returns in
the low byte of d0.
MOVE #$3,-(SP)
TRAP #1
ADDQ.L #2,SP
$04 (CAUXOUT), WORD=ascii code
---
CAUXOUT causes the emission of the character whose ASCII code has been passed
as a parameter in the stack to the RS232 interface.
MOVE #'A',-(SP) ;sends an 'A'
MOVE #$4,-(SP)
TRAP #1
ADDQ.L #4,SP
$05 (CPRNOUT),WORD=ascii code
---
CPRNOUT emits the character whose ASCII code has been stacked to
the printer.
If the character was well sent, we obtain the word -1 in d0.
If the printer is unable to receive the character, we obtain a
word equal to 0 in d0.
MOVE #'A',-(SP) ;we print an 'A'
MOVE #$5,-(SP) ;CPRNOUT code
TRAP #1
ADDQ.L #4,SP
$06 (CRAWIO),WORD=$FF or ascii code
---
CRAWIO admits two types of parameters.
If the parameter is a WORD equal to $FF, CRAWIO tests if a key of
the keyboard IS pressed.(like INKEY in BASIC)
If a key was pressed, its ASCII code and its scan code enter
in d0, otherwise d0 remains unchanged.
If the parameter is different from $FF, this value is interpreted as
the ASCII code of a character to send to the screen.
INKEY MACRO ;CRAWIO with $FF as parameter
MOVE #$FF,-(SP)
MOVE #$6,-(SP)
TRAP #1
ENDM
Example of using the INKEY macro:
-------
test INKEY ;macro call INKEY
CMPI.B #'A',d0 ;compare the ASCII code of d0 with 'A'
BEQ yes ;key 'A' pressed? If yes, goes to 'yes'
JMP test ;otherwise return to 'test'
yes NOP
As long as the 'A' key is not pressed, we jump to 'test'.
$07 (CRAWCIN), no parameter
---
CRAWCIN waits for a key to be pressed.
The recognized character is not displayed, but the ASCII code and scan code
of the pressed key is transmitted to d0 in return.
WAIT MACRO ;waiting macro for a key
MOVE #$7,-(SP) ;CRAWCIN code
TRAP #1
ADDQ.L #2,SP ;keys codes in d0.
ENDM
$08 (CNECIN), no parameter
---
Identical function to CRAWCIN, except that here, pressing CONTROL-C ends the
PRG (like with PTERM), CONTROL-S stops the display, CONTROL-Q resumes
the display interrupted by control-s.
$09 (PRINT LINE), L-W= address of a string of characters terminated by a
--- zero byte.
This function allows to display a string of characters on the screen.
The string of characters to be displayed must be located in the DATA area
and must be terminated by a NULL byte.
PRINTLINE MACRO $\1 ;MACRO with \1 parameter: The address of
;the string of characters to be displayed.
PEA \1 ;STACK the address \1.
MOVE #$9,-(SP) ;PRINTLINE code
TRAP #1
ADDQ.L #6,SP
ENDM
Example of using the macro PRINTLINE:
PRINTLINE laurent
PRINTLINE exp2
PRINTLINE exp3
DATA
laurent DC.B 'laurent PIECHOCKI 8,impasse Bellevue 57980',0
exp2 DC.B 53,54,56,80,45,25,0
exp3 DC.B 27,'E',7,'LAURENT',25,0
NB: To obtain effects such as screen erasing, line jumps... there are special codes that must be transmitted to
--- functions such as PRINTLINE,CCONOUT...
The codes preceded by the ASCII value 27 (ESC).
-----------------------------------------------
27,'E' :erase the screen
27,'B' :positions the cursor one line lower
27,'A' :positions the cursor one line higher
27,'C' :positions the cursor one line further to the right
27,'D' :positions the cursor one line further to the left
27,'J' : clear the screen from the current cursor position
27,'L' : insert a line
27,'M' : delete the line where the cursor is
27,'I' : scroll the cursor and text upwards
27,'H' : position the cursor at line 1, column 1
27,'K' : delete a line from the cursor to the end of the line
27,'Y',x,y : position the cursor at line x-32 and at column
y-32
----
----
27,'b',x : Change the text color to color number x
27,'c',x : Change the background color to color number x
27,'f' : Makes the cursor disappear
27,'e' : Makes the cursor reappear
27,'j' : Memorize the cursor position
27,'k' : Position the cursor at the memorized position
27,'p' : VIDEO-INVERSE mode of writing
27,'q' : Return to normal VIDEO
Thus, if I write:
------------------
PRINTLINE clear
DATA
clear DC.B 27,'E','laurent',0
or
--
CCONOUT #27
CCONOUT #'E'
PRINTLINE laurent
DATA
laurent DC.B 'laurent',0
Clear the screen (ESC,'E') and display the string:'laurent'
$0A (READLINE), L-M pointing to a buffer
---
READLINE allows the entry of a certain quantity of characters on the screen.
(similar to INPUT in BASIC).
The string can be modified during editing with
[Backspace] and [Delete] and will be validated by [Return] or [Enter].
(CONTROL-C ends the program)
You must provide the address of a buffer organized as follows:
In BSS area: DS.B maximum number of characters to enter+2
You must have placed at the beginning of this buffer a BYTE representing the maximum
number of characters to enter (MOVE.B x,buffer) before using the
READLINE function.
After returning from the function:
In 'buffer'+1 is the number of entered characters
In 'buffer'+2 is the start of the entered character string.
READLINE MACRO $\1 ;parameter=buffer address
PEA \1
MOVE #$0A,-(SP)
TRAP #1
ADDQ.L #6,SP
ENDM
Example of using the READLINE macro:
---------------------
MOVE.B #5,resu ;5 characters to enter
LEA resu,a5 ;address of 'resu' in a5
READLINE resu ;readline
addq.l #2,a5 ;a5 points to the entered character string
MOVE.B #0,zero ;places a NULL BYTE at the end of the string for
PRINTLINE a5 ;display the string with PRINTLINE
TOUCH ;waiting for a key press
DESKTOP ;then exit the program
BSS
resu DS.B 7 ;reservation for READLINE
zero DS.B 1 ;reservation for the NULL byte that will end the
;string for PRINTLINE
$0B (CONIN STAT),no parameter
---
Calling this function returns a WORD in d0 equal to -1 if the keystroke buffer contains characters.
d0=0 if there are no characters available in this buffer.
MOVE #$B,-(SP)
TRAP #1
ADDQ.L #2,SP
TST.W D0
BNE nothing
$0E (SETDRIVE),WORD=drive number to activate.
---
SETDRIVE activates the drive whose number is passed as a parameter in
the system stack.
0=Drive A
1=Drive B etc...
In return, the function gives d0 which is organized in such a way that the
only active bit of d0 represents the last activated drive.
(active bit number=drive number)
DRIVE MACRO $\1 ;param. \1=drive number
MOVE \1,-(SP)
MOVE #$E,-(SP)
TRAP #1
ADDQ.L #4,SP
ENDM
Example of use:
------------------
DRIVE #2
Drive C is activated.
If the last active Drive was drive B, we would have:
d0=%0000000000000010
|
\|/
bit number1=drive B
$19 (CURRENT DISK),no parameter
---
This function allows you to know which DRIVE is ACTIVE.
The number of the active drive is returned in d0 in the previous format.
WATHDRIVE MACRO ;Which is the active drive?
MOVE #$19,-(SP)
TRAP #1
ADDQ.L #2,SP
ENDM
$1A (SETDTA), L-M=address of the DTA buffer
---
SETDTA installs the DTA buffer used by some GEMDOS functions that operate on files.
This buffer must be 44 bytes in size, its address must be
stacked in the system stack and must be EVEN.
To obtain an even address, you can reset the PC with the
BSS directive or use appropriate directives (but specific to
the assembler used): ALIGN.W for PROFIMAT
:CNOP 0,2 for METACOMCO
You can also simply make a correction by adding 1 BYTE
to a lower address (DS.B 1), this has the effect of increasing the value
of the DTA address: odd address+1=even address.
PEA buffer
MOVE #$1A,-(SP)
TRAP #1
ADDQ.L #6,SP
BSS
buffer DS.B 44
$20 (SUPER),L-M=0 or L-M=new SP value
---
Here is the function that allows you to switch to SUPERVISOR MODE.
If the parameter you provide is a L-M=0, SUPER will activate SUPERVISOR MODE and return the SP value in d0.
You must save this address because it will be essential to
return to USER MODE (To exit the program for example)
If you stack another L-M than 0, it will be interpreted as the new
SP value and d0 will contain the old SP value.
SUPER MACRO ;switching to SUPERVISOR MODE
CLR.L -(SP)
MOVE.W #$20,-(SP)
TRAP #1
ADDQ.L #6,SP
MOVE.L d0,sauv_sp ;save SP in 'sauv_sp'
ENDM
Of course, a L-M must be reserved in 'sauv_sp'!
To return to USER MODE (essential to exit the program
for example...):
Use the same function, but pass it the old
SP value that was saved in sauv_sp.
USER MACRO ;returning to USER MODE
MOVE.L sauv_sp,-(SP) ;restore SP
MOVE.W #$20,-(SP)
TRAP #1
ADDQ.L #6,SP
ENDM
$2A (GET DATE),no parameter
---
Allows you to obtain the DATE of the GEM desktop clock in d0 as follows:
Bits 0 to 4=day
Bits 5 to 8=month
Bits 9 to 15=(year-1980)
MOVE #$2A,-(SP)
TRAP #1
ADDQ.L #2,SP
Example: if d0=%0001000000100001
The date is:
DAY:bits 0 to 4 :%00001=the 1st
MONTH:bits 5 to 8 :%00001=January
YEAR :bits 9 to 15:%0001000=8+1980=1988
$2B (SET DATE),WORD=date
---
SET DATE allows setting the GEM clock to the date you provide as a parameter.
The date (WORD) is in the format previously described.
bits 0 to 4: day
bits 5 to 8: month
bits 9 to 15: (year-1980)
If the date is incorrect (45/20/1745...), d0 returns with the value -1,
otherwise, it returns with the value 0.
MOVE #%00010000000100001,-(SP) ;January 1st, 1988
MOVE #$2A,-(SP)
TRAP #1
ADDQ.L #4,SP
$2C (GET TIME),no parameter
---
GET TIME returns the time from the GEM clock in d0 in the form:
bits 0 to 4 :(seconds/2)
bits 5 to 10 :minutes
bits 11 to 15:hour
Example:
test MOVE #$2C,-(SP) ;GET TIME
TRAP #1
ADDQ.L #2,SP
;d0 contains the time
AND.W #%11111,d0 ;we MASK bits 0 to 4 of d0:
;bits 5 to 15 of d0 are therefore cleared.
;it leaves the seconds.
MULS #2,d0 ;x2 because seconds=(seconds/2) in d0
CMPI #30,d0 ;do we have seconds=30?
BEQ yes ;if yes: go to 'yes'
JMP test ;otherwise, return and request the time again.
$2D (SET TIME),WORD=time
---
SET TIME sets the time of the GEM clock with the parameter provided.
The time must be coded in the form:
bits 0 to 4 :(seconds/2)
bits 5 to 10 :minutes
bits 11 to 15:hours
Example:
MOVE #%0001000000100001,-(SP)
MOVE #$2D,-(SP)
TRAP #1
ADDQ.L #4,SP
We set the clock to 2h, 1 min, 2 sec
$31 (KEEP PROCESS),WORD=0,L-M=number of bytes to protect.
---
KEEP PROCESS, like PTERM, ends the program and returns to the 'parent' program.
With PTERM, the exited program is permanently erased from memory,
while with KEEP PROCESS, a certain amount of BYTES in memory (parameter 2) is reserved and the program to exit is placed there.
This is important for interrupt-driven programs, for example,
we will talk about this again...
KEEP MACRO $\1 ;parameter=number of bytes to reserve
CLR.W -(SP)
MOVE.L #\1,-(SP)
MOVE #$31,-(SP)
TRAP #1
ADDQ.L #8,SP
ENDM
Example of use:
KEEP 1024
We place the PRG in the reserved KO and exit...
NB: Be careful that you reserve enough memory...
--
$3C (CREATE),WORD=file attribute,L-M=address of the file name
---
CREATE allows creating a file in which you can place data.
The first parameter is the file attribute:
0=file accessible in Read and Write
1=file accessible in Read only
2=invisible file
4=system file (invisible to desktop)
8=volume label file (invisible to desktop)
The second parameter is the address pointing to the file name:
Organized like this: 'A:\file\name.ext',0
If the name of the program to create is 'name.ext' and if it is in the
'file' (unnecessary if it is not in a file...).
'A:' indicates that it is on the floppy disk unit A.
The character string must end with a NULL byte.
In return, CREATE returns in d0 the FILE HANDLE number of the file.
This number is used to distinguish the different external programs loaded.
CREATE MACRO $\1,$\2,$\3 ;CREATE with 3 parameters
MOVE #\1,-(SP) ;\1=file attribute
PEA \2 ;\2=address of the name
MOVE #$3C,-(SP)
TRAP #1
ADDA.L #8,SP
MOVE d0,\3 ;\3=address to save d0.
ENDM
Example of use:
CREATE 0,prg,handle ;file in Read/Write mode
DATA
prg DC.B 'A:\laurent.gag',0 ;name of the file to create
BSS
handle DS.W 1 ;1 Word for the handle
$3D (OPEN),WORD=attribute,L-M=address of the file name to open
---
OPEN allows opening a file created with CREATE for later use (reading or writing).
The first parameter to provide is the attribute of the file to open
The second parameter to provide is the address of the name of the file to open.
If OPEN encounters no problems (file present and accessible),
d0 returns with the file handle number, otherwise, it returns with a
negative value. (This is an error code, see the list at the end of the
chapter.)
OPEN MACRO $\1,$\2,$\3 ;OPEN with 3 parameters
MOVE #\1,-(SP) ;\1=attribute
PEA \2 ;\2=address of the file name
MOVE #$3D,-(SP)
TRAP #1
ADDQ.L #8,SP
MOVE d0,\3 ;\3=address to save the handle
ENDM
Example of use:
OPEN 0,prg,handle ;opening the file (Read/Write attribute)
DATA
prg DC.B 'A:\name.ext',0 ;name of the file to open
BSS
handle DS.W 1 ;1 Word for the handle
$3E (CLOSE),WORD=handle number
---
If the file was opened with OPEN, it will be closed by CLOSE, you must
pass the file handle number as a parameter.
In return, if the file was correctly closed, d0=0.
CLOSE MACRO $\1 ;MACRO with 1 parameter
MOVE \1,-(SP) ;\1=handle number
MOVE #$3E,-(SP)
TRAP #1
ADDQ.L #4,SP
ENDM
Example of use:
CLOSE handle
BSS
handle DS.W 1 ;here was placed the file handle.
$3F (READ),L-M=buffer address,L-M=number of bytes to read,WORD=handle number
---
READ allows reading a file opened by OPEN.
The following parameters must be provided to READ:
1st: The address of a buffer where the read data will be placed
2nd: The number of bytes to read from the file
3rd: The file handle number
D0 returns with the number of bytes read or a negative error code.
READ MACRO $\1,$\2,$\3 ;MACRO with 3 parameters
PEA \1 ;\1=buffer address
MOVE.L \2,-(SP) ;\2=number of bytes to read
MOVE \3,-(SP) ;\3=handle number
MOVE #$3F,-(SP)
TRAP #1
ADDA.L #12,SP
ENDM
Example of use:
READ buffer,#1024,handle ;read 1 KB of data
BSS
buffer DS.B 1024 ;the buffer for the 1024 bytes to read
handle DS.W 1 ;here is the handle number
$40 (WRITE),L-M=address of the data buffer to write,L-M=number of bytes
--- to write,WORD=handle number.
WRITE allows writing data to a file opened with OPEN.
The parameters to pass are:
1st: The address of the buffer containing the data to write to the file.
2nd: The number of bytes to write to the file
3rd: The handle number
D0 returns with 0 if everything is OK or with a negative error code.
WRITE MACRO $\1,$\2,$\3 ;3 parameters
PEA \1 ;\1=buffer address
MOVE.L \2,-(SP) ;\2=number of bytes to write
MOVE \3,-(SP) ;\3=handle number
MOVE #$40,-(SP)
TRAP #1
ADDA.L #12,SP
EDNM
Example of use:
WRITE data,#10,handle
BSS
data DS.B 10 ;the 10 bytes to write
handle DS.W 1 ;here was saved the handle
$43 (FATTRIB),WORD=attribute,WORD=write or read,L-M=address of the name of
--- the file to modify
FATTRIB allows changing or reading the attribute of a file.
The parameters to pass are:
1st: The attribute to write (if you want to change it, otherwise put 0)
0=file accessible in Read and Write
1=file accessible in Read only
2=invisible file
4=system file (invisible to desktop)
8=volume label file (invisible to desktop)
10=sub-directory file (for reading only!)
$20=file written and closed correctly (for reading only!)
2nd: A Word equal to 1 if FATTRIB should CHANGE the attribute
A Word equal to 0 if FATTRIB should READ the attribute, in this case,the attribute
of the file returns in d0. (or a negative error code)
3rd: The address pointing to the name of the file to modify or read
FATTRIB MACRO $\1,$\2,$\3 ;macro with 3 parameters
MOVE \1,-(SP) ;\1=attribute
MOVE \2,-(SP) ;\2=write or read
PEA \3 ;\3=address of the file name
MOVE #$43,-(SP)
TRAP #1
ADDA.L #10,SP
ENDM
Example of use:
FATTRIB #$02,#1,prg
DATA
prg DC.B 'A:\auto\laurent.tab',0
FATTRIB will hide the file 'laurent.tab' from the 'auto' file on the desktop.
$4B (PEXEC),L-M=environment address,L-M=command line address,L-M=program name address,WORD=loading mode
PEXEC allows loading an external file in 3 modes.
In mode 0: The program is loaded, PEXEC passes the command line and the en-
vironment to the loaded program and then executes it.
(the command line and the environment are parameters that
can be passed to programs like .TTP or .APP)
In mode 3: The program is loaded, PEXEC passes the command line and the en-
vironment to the program and the address where it is located
is obtained in d0.
In mode 4: The program loaded in mode 3 is executed.(in this case,the environment
and the command line should not be used)
The parameters to pass to PEXEC are:
1st: The environment address
2nd: The command line address
3rd: The program name address
4th: The loading mode (0,3 or 4)
The program using PEXEC is called the PARENT program, the program loaded by
PEXEC is the CHILD program.
The PARENT program remains in memory after using PEXEC.
PEXEC MACRO $\1,$\2,$\3 ;MACRO with 3 parameters
PEA \1 ;\1=environment address
PEA \2 ;\2=command line address
PEA \3 ;\3=program name address
MOVE \4,-(SP) ;\4=mode
MOVE #$4B,-(SP)
TRAP #1
ADDA.L #16,SP
ENDM
Example of use:
PEXEC nul,zero,prg,#0
DATA
nul DC.B 0 ;no environment
zero DC.B 0 ;no command line
prg DC.B 'A:\laurent.prg\',0 ;the program to load and execute in
;mode 0
NB: For possible inclusions of ASSEMBLER files under a
-- program in GFA BASIC, simply use the EXEC function
of the GFA, and pass the parameter in the command line.
The CHILD program in assembler will read the parameter which
is at the $80th byte of the base page, it will then execute
taking into account the parameter, and using the
PTERM function of Gemdos, it will hand back control to the
PARENT program in GFA...
$4E (SEARCH),WORD=file attribute,L-M=file name address to
--- search for
SEARCH checks if the file whose name is given is present
on the floppy disk.
If it is present, d0 returns with the value 0 and the DTA buffer, which will
have been previously installed with the SETDTA function ($1A), will be organized
as follows:
Byte 21 : file attribute
Bytes 22 to 23: File installation time
Bytes 24 to 25: File installation date
Bytes 26 to 29: File size in bytes
Bytes 30 to 43: NAME and SUFFIX of the found file
If the file is not found by SEARCH, d0 returns with the error
code -33 (file not found)
Note: Files with the Volume Label attribute cannot be recognized
-- by SEARCH...
If the file name is of the type:
. 'A:\file.*',0 : The SUFFIX of the file is not considered
-----------
. 'A:\*.ext',0 : Only the SUFFIX is considered
----------
. 'A:\*.*',0 : =All files
--------
. 'A:\A??.ext',0: The ? can be any letter
------------
(for example ABC.ext and AXX.?AA can be identified by A??.*)
But in these cases, several names are suitable for SEARCH (for example, if we
search for 'A:\PRG.*',0: 'A:\PRG.EXT',0 and 'A:\PRG.DOC',0 are suitable),
SEARCH will then take the first file from the directory that fits.
SEARCH MACRO $\1,$\2,$\3 ;MACRO with 3 parameters
PEA \1 ;\1=DTA buffer address (44 bytes)
MOVE #$1A,-(SP) ;SETDTA
TRAP #1
ADDQ.L #6,SP ;The DTA buffer is installed
MOVE \2,-(SP) ;\2=file attribute
PEA \3 ;\3=file name address
MOVE #$4E,-(SP) ;SEARCH
TRAP #1
ADDQ.L #8,SP
ENDM
Example of use:
SEARCH dta,#0,prg ;attribute=Read/Write
CMPI #-33,d0 ;file not found ??
BEQ file_not_found ;then go to file_not_found
DATA
prg DC.B 'A:\file\name.ext',0 ;The program to search for
BSS
dta DS.B 44 ;44 bytes reserved for the DTA
$4F (SEARCH NEXT),no parameter
---
If we use SEARCH and look for files whose name can vary
(PRG.* for example) and if several files correspond to this name, we have
seen that the first file from the directory that fits is selected.
With SEARCH NEXT, we can search for other files that fit the
multiple-choice file name.
SEARCH NEXT returns a NULL value in d0 if there are no more files
whose name fits the searched file name.
So, for example (To find files of the type 'x.*'), we can test
the existence of other fitting files by integrating SEARCH
NEXT in a loop by testing d0 (if d0=0 we have to exit: thus, we will use
TST.W d0 then DBEQ dn,loop...)
MOVE #$4F,-(SP)
TRAP #1
ADDQ.L #2,SP
$56 (FRENAME),L-M=new name address,L-M=old name address,
--- WORD=0
FRENAME allows changing the name of a file.
Just pass the address pointing to the new file name and
the address pointing to the old file name as parameters.
D0 returns with a null value or a negative error message.
RENAME MACRO $\1,$\2 ;MACRO with 2 parameters
PEA \1 ;\1=new file name address
PEA \2 ;\2=old name address
MOVE #0,-(SP) ;\3=0
MOVE #$56,-(SP)
TRAP #1
ADDA.L #12,SP
ENDM
Example of use:
RENAME new_name,old_name
DATA
new_name DC.B 'A:\zzzzz.zzz',0 ;new file name
old_name DC.B 'A:\zzzzz.aaa',0 ;old name
-------------
APPENDIX: GEMDOS error codes:
-32: Invalid function number
-33: Nonexistent file
-34: Nonexistent access name
-35: Too many files open
-36: Impossible to input
-37: Invalid reference number
-39: Insufficient memory
-46: Invalid floppy disk unit
-49: No more other files
--------------------
That's it for the GEMDOS functions.
I have not enumerated all the GEMDOS functions, the others will
hardly ever be useful to you:
Only the interesting functions have been presented here.
You can now head to your ASSEMBLER and create your
first programs:
They may not yet be brilliant, but at least they will have
the merit of being in ASSEMBLER and allowing you to progress.
Good luck...
Others, please read the next chapter on BIOS and
XBIOS functions which is on disk number 2.
----------------
The exercises will follow, and with them YOUR first programs in
ASSEMBLER worthy of the name...
PIECHOCKI Laurent
8, impasse Bellevue continued in: BIOS.DOC (DISK 2)
57980 TENTELING -----------------