User Tools

Site Tools


magazines:chacking17

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

magazines:chacking17 [2015-04-17 04:34] (current)
Line 1: Line 1:
 +<code>
 +                   ########
 +             ##################
 +         ######            ######
 +      #####
 +    #####  ####  ####      ##      #####   ####  ####  ####  ####  ####   #####
 +  #####    ##    ##      ####    ##   ##   ##  ###     ##    ####  ##   ##   ##
 + #####    ########     ##  ##   ##        #####       ##    ## ## ##   ##
 +#####    ##    ##    ########  ##   ##   ##  ###     ##    ##  ####   ##   ##
 +#####  ####  ####  ####  ####  #####   ####  ####  ####  ####  ####   ######
 +#####                                                                    ##
 + ######            ######           Issue #17
 +   ##################            November 15, 1998
 +       ########
  
 +
 +...............................................................................
 +
 + "The words of the wise are as goads, and as nails fastened by
 + the masters of assemblies."  Ecclesiastes 12
 +
 + "Before criticizing a man I try to walk a mile in his shoes.  That
 + way, if he gets mad he's a mile away and barefoot."  John Ianetta
 +
 +...............................................................................
 +
 +BSOUT
 +
 + For me, fall is a time for reflection.  The trees descend into their 
 +golden time and then seem to die.  And yet, under the surface they are quite 
 +alive, and teeming with activity at a smaller, less-visible scale, waiting to 
 +burst forwards again in full bloom.  I think there's a great metaphor for C= 
 +in this.  But I have no idea what it is.
 + In fact things are totally hectic around here, and I haven't given
 +more than a few moments thought towards the 64, so this will be a mighty
 +short editorial.  Between a PhD thesis and begging for jobs there hasn't been
 +much 64-time, but with a little here and a little there this issue is finally
 +squeaking out.  Everybody worked hard over the summer, and my goal was
 +to get it out in September.  Well, you know, these days, if something in
 +the 64 world is only two months late it's doing pretty good, so no big whoop.
 +C=Hacking ought to appear reguarly after December, though.
 + On the down side, some things, such as the challenge problem from
 +last time, will have to wait until the next issue.  I also stayed pretty
 +low-key while putting this issue together, but future issues will be more 
 +public in soliciting articles (e.g. on comp.sys.cbm).
 + In other news, a C64 C-compiler has finally appeared!  This outstanding
 +effort is the work of Ullrich von Bassewitz, uz@musoftware.de, the force 
 +behind Elite128 among other things.  The cc65 webpage is at
 +
 +        http://www.von-bassewitz.de/uz/cc65/
 +
 +so have a look, and tell Ullrich what a stellar guy he is :).  Also, as
 +most of you know, the Chicago Expo took place on October 24, and was a real
 +hoot!  Check out 
 +
 + http://driven.c64.org/
 +
 +for some nice pictures from the Expo, taken by Mark Seelye.
 +
 + Meanwhile, sit back, relax, and enjoy these latest musings from 
 +these, our masters of assembly.
 +
 +.......
 +....
 +..
 +.                                    C=H #17
 +
 +::::::::::::::::::::::::::::::::::: Contents ::::::::::::::::::::::::::::::::::
 +
 +BSOUT
 + o Voluminous ruminations from your unfettered editor.
 +
 +
 +Jiffies
 + o Is it a bug or a feature?
 +
 +
 +The C=Hallenge
 +
 + o To be continued...
 +
 +
 +Side Hacking
 +
 + o "SuperCPU Software Repair", by S. Judd <sjudd@nwu.edu>.
 +    An amateur's excursion into correcting errant wares.
 +
 +
 +Main Articles
 +
 + o "An Optimizing Hybrid LZ77 RLE Data Compression Program, aka
 +   Improving Compression Ratio for Low-Resource Decompression",
 +   by Pasi 'Albert' Ojala <albert@cs.tut.fi>
 +
 +   Part two of a two-part article on data compression, giving a
 +   detailed description of the compression algorithms used in 
 +   pucrunch, not to mention the decompression code.
 +
 + o "VIC-20 Kernel ROM Disassembly Project", by Richard Cini
 +   <rcini@email.msn.com>
 +
 +   This is the first in a series of articles which aims to
 +   present a complete, commented disassembly of the VIC-20
 +   ROMs.
 +
 + o Masters Class: "NTSC/PAL fixing, part I", by Russell Reed 
 +   <rreed@egypt.org>, Robin Harbron <macbeth@tbaytel.net>, and S. Judd.
 +
 +   Sit up straight and pay attention.  In the Masters Class, a
 +   Commodore luminary attempts to instruct a couple of ignorant
 +   plebians in his art.  In this case, Robin and I set out to
 +   learn NTSC/PAL fixing from one of the greats, Decomp/Style.
 +   Our first fix, a demo from the obscure Finnish group Pu-239,
 +   is included, along with detailed descriptions of our experiences.
 +
 + o "The Herd Mentality", by Bil Herd <bherd@zeus.jersey.net>
 +
 +   This is a collection of entertaining musings on Commodore and the 
 +   development of the C128, as provided by Bil Herd (and that's no
 +   bull).  If you don't know who Bil Herd _is_, why not type
 +   SYS 32800,123,45,6 on a 128 sometime...
 +
 +   
 +.................................. Credits ...................................
 +
 +Editor, The Big Kahuna, The Car'a'carn..... Stephen L. Judd
 +C=Hacking logo by.......................... Mark Lawrence
 +
 +Special thanks to Marko Makela, Olaf Seibert, and the rest of the cbm-hackers
 +for their many otherwise unacknowledged contributions.
 +
 +Legal disclaimer:
 + 1) If you screw it up it's your own damn fault!  
 + 2) If you use someone's stuff without permission you're a dork!
 +
 +For information on the mailing list, ftp and web sites, send some email
 +to chacking-info@jbrain.com.
 +
 +About the authors:
 +
 +Pasi 'Albert' Ojala is a 29 year old software engineer, currently
 +working at a VLSI design company on a RISC DSP core C compiler.
 +Around 1984 a friend introduced him to the VIC-20, and a couple
 +of years later he bought a 64+1541 to replace a broken Spectrum48K.
 +He began writing his own BBS, using ML routines for speed, and
 +later wrote a series of demos under the Pu-239 label.  In addition
 +to pucrunch and his many C=Hacking articles, Pasi was written an Amiga
 +1581 filesystem, a graphics conversion package, a C64 burstloader, and a 
 +number of demos.  He is currently uses his 64 for hobbyist pursuits, and
 +is contemplating multipart demos for the 64 and the VIC-20, in addition
 +to future C=Hacking articles.  Pasi is also a huge Babylon-5 fan, and
 +has a B5 quote page at http://www.cs.tut.fi/~albert/Quotes/B5-quotes.html
 +
 +Richard Cini is a 31 year old senior loan underwriter who first became
 +involved with Commodore 8-bits in 1981, when his parents bought him a
 +VIC-20 as a birthday present.  Mostly he used it for general BASIC
 +programming, with some ML later on, for projects such as controlling
 +the lawn sprinkler system, and for a text-to-speech synthesyzer.  All 
 +his CBM stuff is packed up right now, along with his other "classic" 
 +computers, including a PDP11/34 and a KIM-1.  In addition to collecting
 +old computers Richard enjoys gardening, golf, and recently has gotten
 +interested in robotics.  As to the C= community, he feels that it
 +is unique in being fiercely loyal without being evangelical, unlike
 +some other communities, while being extremely creative in making the 
 +best use out of the 64.
 +
 +Robin Harbron is a 26 year old internet tech support at a local
 +independent phone company.  He first got involved with C= 8-bits
 +in 1980, playing with school PETs, and in 1983 his parents convinced
 +him to spend the extra money on a C64 instead of getting a VIC-20.
 +Like most of us he played a lot of games, typed in games out of
 +magazines, and tried to write his own games.  Now he writes demos,
 +dabbles with Internet stuff, writes C= magazine articles, and, yes,
 +plays games.  He is currently working on a few demos and a few games,
 +as well as the "in-progress-but-sometimes-stalled-for-a-real-long-time-
 +until-inspiration-hits-again Internet stuff" He is also working on
 +raising a family, and enjoys music (particularly playing bass and guitar), 
 +church, ice hockey and cricket, and classic video games.
 +
 +
 +................................... Jiffies ..................................
 +
 +
 +0 REM SHIFT-L
 +by the cbm.hackers
 +
 + Everybody knows the old REM shift-L trick in BASIC 2.0, which
 +generates a syntax error upon listing.  But why does it work?  The
 +answer turns out to be quite interesting.
 + Normally, when the BASIC interpreter tokenizes a line it strips 
 +out characters with the high bit set.  One exception is characters within
 +quotes; the other is characters after REM.  In those cases, characters
 +are embedded literally into the program line.
 + Now, BASIC tokens all have the high bit set.  When LIST
 +encounters a character with the high bit set, it checks whether
 +it is in quote mode.  If it is, the character is outputted as normal.
 +If not, the character is treated as a token, which is expanded by
 +QPLOP (located at $A717).  The part of QPLOP which prints keywords looks 
 +like this:
 +
 +:LOOP1   DEX              ;Traverse the keyword table
 +         BEQ :PLOOP
 +:LOOP2   INY              ;read a keyword
 +         LDA RESLST,Y
 +         BPL :LOOP2
 +         BMI :LOOP1
 +:PLOOP   INY              ;Print out the keyword
 +         LDA RESLST,Y
 +         BMI LISTENT1     ;Exit if on last char
 +         JSR $AB47        ;Print char, AND #$FF
 +         BNE :PLOOP
 +
 +The keyword strings in RESLST all stored dextral character inverted
 +(the last char has the high bit set), and the above code just moves 
 +forward through the table until it has counted out .X keywords.  At
 +that point, :PLOOP prints out the next keyword to the screen, and
 +hops back into LIST.
 +
 + Shift-L is character code 204, or $CC.  When LIST sees this
 +inside of a REM, it sees the high bit set and de-tokenizes it.
 +As it turns out, though, the last token is $CB, which is keyword GO
 +(so that GO TO works).  It also turns out that RESLST, the list of
 +BASIC keywords, uses 255 characters.  The 256th character is zero
 +(value zero, not character zero).
 + So, the above code goes through the list, and then prints
 +out token $CC, the first character of which is a null.  This zero
 +is sent to $AB47.  $AB47 sends it to JSR $FFD2 (which does nothing
 +with the character), performs an AND #$FF, and exits.  But that makes 
 +the BNE :PLOOP branch _not_ get taken, and the code erroneously moves 
 +forwards into...  the code which executes the FOR statement!
 + And the first thing FOR does is look for a valid variable.
 +When you LIST a program, the character immediately following the
 +LIST is a statement terminator (a colon : or else an end of line null).
 +LET (which is called by FOR) reads this character, decides it's an
 +invalid variable name, and generates a ?SYNTAX  ERROR.
 + Because QPLOP uses absolute addressing (LDA RESLST,Y), .Y
 +can wrap around through 255 to traverse the list again.  This is
 +why shift-M shift-N etc. all generate valid keywords.  Only shift-L
 +will force an error, and it is all due to the zero in the keyword
 +table.
 + Similar things can happen in other BASICs.  In BASIC 4.0,
 +token $DB does the trick.  In BASIC 1.0, $CB ought to do it.
 +The problem seems to have been fixed in BASIC 7.0; at least the
 +trick doesn't seem to work on a 128.
 +
 + Finally, like most things on the 64, embedding tokens into
 +REM statements can naturally be put to some creative use.  For example,
 +RUN once ran a contest where readers submitted stories and riddles
 +and such, which were read by LISTing the program.  They were very clever
 +and entertaining, and I close this summary with the one I've remembered 
 +since high school:
 +
 +10 REM WHAT'S AN APPLECOSTA?
 +20 REM {C=-V}T A {INST CTRL-0}E
 +
 +
 +............................... The C=Hallenge ...............................
 +
 +Wait until next time!
 +
 +
 +
 +................................ Side Hacking ................................
 +
 + SuperCPU software repair
 + ---------------------------> by S. L. Judd
 +
 + One of the feature articles in this issue deals with NTSC/PAL
 +fixing.  But have you ever thought about SCPU fixing?  You know how
 +it goes: you have that program that could really benefit from
 +the speed boost, but doesn't work, and usually because of some silly
 +little thing.
 + Well, it really bugs me to have programs not like my nice
 +hardware for dumb reasons, so I decided I would try my hand at fixing 
 +up some programs.  The one that really did it for me was the game 
 +"Stunt Car Racer" -- I had never played it before, but after getting 
 +ahold of it it was clear that here was a game that would be just great 
 +with a SuperCPU.  I had never done something like this before, but it 
 +seemed a doable problem and so I jumped in head first, and this article
 +sums up my inexpert experience to date.
 +
 + By the way, stuntcar-scpu is totally cool :).
 +
 + To date I have fixed up just three games: Stunt Car Racer, Rescue
 +on Fractalus, and Stellar 7.  My goal was really to "CMD-fix" these programs,
 +to make them run off of my FD-2000 as well as my SCPU.  Although these are 
 +all games, the techniques should apply equally well to application programs
 +with a bad attitude.  Before discussing the fixes, it is probably worthwhile
 +to discuss a few generalities.
 +
 + I also note that programmers who don't have a SuperCPU might find
 +some of this information helpful in designing their programs to work with
 +SCPUs.
 +
 + Finally, my fixes are available in the Fridge.
 +
 +Tools and Process
 +-----------------
 +
 +The tools I used were:
 +
 +  o Action Replay
 +  o Wits
 +  o Paper for taking notes (backs of receipts/envelopes work)
 +
 +I think this is all that is necessary, although a good sector editor
 +can come in handy for certain things.
 +
 +After trying a number of different approaches to the problem, the process
 +I've settled on goes roughly like the following:
 +
 + - Have an idea of what will need fixing
 + - Familiarize yourself with the program
 + - Track down the things that need fixing
 + - Figure out free areas of memory
 + - Apply patches, and test
 +
 + Most programs work in more or less the same way: there are
 +some initialization routines, there's a main loop, and there's an 
 +interrupt routine or series of routines.  The interrupts are easy to 
 +find, via the vectors at either $FFFA or at $0314 and friends.  The 
 +initialization routine can be tougher, but can be deduced from 
 +the loader or decompressor; also, some programs point the NMI vector to 
 +the reset code, so that RESTORE restarts the program.  Finding the
 +things that need fixing usually involves freezing the program at the
 +appropriate time, and doing a little disassembly.  Sometimes a hunt for
 +things like LDA $DC01 is helpful, too.  Figuring out free areas of
 +memory is easy, by either getting a good feel for the program, or
 +filling some target memory with a fill byte and then checking it
 +later, to see if it was overwritten.  Once the patch works on the 64,
 +all that remains is to test it on the SCPU, and it's all done!
 +
 +Diagnosis
 +---------
 +
 + It seems to me that, at the fundamental level, the SCPU is different 
 +from a stock machine in three basic ways: it is a 65816, it runs at 20MHz, 
 +and it has hardware registers/different configurations.  There are also 
 +some strange and mysterious problems that can arise.
 +
 + All possible opcodes are defined on the 65816, which means that
 +"illegal" or quasi-opcodes will not work correctly.  On the 65xx chips, the 
 +quasi-opcodes aren't real opcodes -- they are like little holes in the cpu, 
 +and things going through those holes fall through different parts of the 
 +normal opcode circuitry.  Although used by very few programs, a number of 
 +copy protection schemes make use of them, so sometimes the program works fine
 +with a SCPU but the copy protection makes it choke -- how very annoying 
 +(example: EA's Lords of Conquest).  Naturally, disk-based protection methods 
 +mean it won't work on an FD-2000, either.
 +
 + Running at 20Mhz makes all sorts of problems.  Any kind of software
 +loop will run too fast -- delay loops, countdown loops, input busy-loops,
 +etc.  Also main program loops, so that the game runs unplayably fast
 +(most 3D games never had to worry about being too fast).  It can also
 +lead to flickering screens, as we shall see later, and the "play" of some 
 +games is designed with 1Mhz in mind -- velocities, accelerations, etc.  
 +What looks smooth at the low frame rate might look poor at the high, as we 
 +shall also see later.  Finally, fastloaders invariably fail at 20Mhz,
 +like any other code using software-based timing.
 +
 + The SuperCPU also has a series of configuration registers located
 +at $D07x and $D0Bx, which determine things like software speed and VIC
 +optimization modes (which areas of memory are mirrored/copied to the C64'
 +RAM).  Note also that enabling hardware registers rearranges $E000 ROM 
 +routines.  Although it is possible for programs to accidentally reconfigure
 +the SCPU, it is awfully unlikely, since the enable register, which switches
 +the hardware registers in, is sandwiched between disable registers:
 +
 + $D07D Hardware register disable
 + $D07E Enable hardware registers
 + $D07F Hardware register disable
 +
 +Strangely enough, though, different hardware configurations can sometimes 
 +cause problems.  For example, newer (v2) SCPUs allow selective mirroring of 
 +the stack and zero page, and by default have that mirroring turned OFF.  
 +For some totally unknown reason, this caused major problems with an early 
 +attempt of mine to fix Stunt Car Racer -- I am told that the old version 
 +would slow down to just double-speed, flicker terribly, and more.  Turning 
 +mirroring back on apparently fixes up the problem.  (I have an older SCPU, 
 +and hence did not have this problem).  So before going after a big fix, it 
 +is worthwhile to invest a few minutes in trying different configurations.
 +
 + Finally, there are other strange problems that can arise.  For
 +example, I have two 128s: one is a flat 128, one a 128D.  With my 128D, 
 +if $D030 is set then the SCPU sometimes -- but not always -- freaks out 
 +and locks up.  The flat 128 does not have this problem.  One reason this 
 +is important is that many decompressors INC $D030 to enable 2MHz mode.
 +A simple BIT ($2C) fixes this problem up, but the point is that the SCPU has 
 +to interact with the computer, so perhaps that interaction can lead to 
 +problems in obscure cases.
 +
 + Now, if the goal is to CMD-fix the program, there may be a few
 +disk-related things that may need fixing.  In addition to stripping out
 +(or possibly fixing up) any fastloaders, most programs annoyingly assume
 +drive #8 is the only drive in town.  Also, if the program uses a track-based 
 +loader (instead of a file-based loader), then that will need to fixed up
 +as well, and any disk-based copy protection will have to be removed.
 +
 + There's one other thing to consider, before you fix: is the
 +program really busted?  For example, if you've tried a chess program
 +with the SCPU, chances are that you saw no speed improvement.  Why
 +not?  It turns out that most chess programs use a timer-based search
 +algorithm -- changing the playing strength changes the amount of
 +time the program spends searching, and not the depth of the search.
 +(The reason is to make the gameplay flow a little better -- otherwise
 +you have very slow play at the beginning, when there are many more
 +moves to consider).  So although it might look like it isn't working
 +right with the SCPU, it is actually working quite well.
 +
 + And that pretty much covers the basic ideas.  The first program
 +I fixed up was Stunt Car Racer.
 +
 +Stunt Car Racer
 +---------------
 +
 + Stunt Car Racer, in case you don't know, is a 3D driving game,
 +and quite fun.  It is also too fast, unplayably fast, at 20MHz.  Therefore, 
 +it needs to be slowed down!  
 + My first plan... well, suffice to say that most of my original
 +plans were doomed to failure, either from being a bad idea, or from
 +poor implementation.  It is clear enough that some sort of delay is
 +needed, though, in the main loop, or perhaps by intercepting the joystick
 +reading routine.
 + The program has a main loop and an interrupt loop as well.
 +The interrupt handles the display and other things, and all of the
 +game calculations are done in the main loop, which flows like
 +
 + Do some calculations
 + Draw buffer 1
 + Swap buffers
 + Do some calculations
 + Draw buffer 2
 + Swap buffers
 + JMP loop
 +
 +One of my first thoughts was to intercept the joystick I/O, which is
 +easy to find by hunting for LDA $DC01 (or DC00, whichever joystick
 +is used).  The patch failed, and possibly because I didn't check that 
 +the memory was safe, and possibly because it was in the interrupt routine
 +(I simply don't remember).
 + Before patching, it is very important to make sure that the
 +patch will survive, and not interfere with the program, so it is
 +very important to find an area of memory that is not used by the
 +program.  It took me a little while to figure this out!  Finding
 +unused memory was pretty easy -- I just filled the suspect areas with
 +a fill byte, ran the program, and checked that memory.  Mapping out the 
 +memory areas also aids in saving the file, as un-needed areas don't
 +need to be saved, or can be cleared out to aid compression.
 + The first free area of memory I found was at $C000.  It turns
 +out that this is a sprite, though, and so put some garbage on the
 +screen.  The second I tried was $8000, which worked great in practice
 +mode but got overwritten in competition mode -- always test your
 +patches thoroughly!  (I had only tested in practice mode).  Finally,
 +I found a few little spots in low memory that survived, and placed the 
 +patch there.  The program does a whole lot of memory moving, and uses 
 +nearly all memory.  I also left some initialization code at $8000, since
 +it only needed to be run once, at the beginning (to turn on mirroring 
 +in v2 SCPUs).
 + Recall that the main loop has two parts -- one for buffer 1, and 
 +one for buffer 2.  The trick is to find some code that is common to both 
 +sections, like a subroutine call:
 +
 + JSR SomeRoutine
 + Draw buffer 1
 + JSR SomeRoutine
 + Draw buffer 2
 +
 +The patch routine I used was a simple delay loop, redirected from those
 +two JSRs:
 +
 + LDX #$FF
 + CPX $D012
 + BNE *-5
 + DEX
 + CPX #$FC
 + BNE *-10
 + JMP SomeRoutine
 +
 +Of course, this will also slow the program down at 1Mhz; later on I became
 +smarter about my patches, but this one works pretty well.
 + To save the game and patches, I simply froze it from AR.  Just
 +saving from the monitor generally failed; the initialization routine
 +doesn't initialize all I/O settings.  Part of the freezing process
 +involves RLE compression, so if you freeze it is a good idea to
 +fill all unused portions of memory -- temporary areas, bitmaps, etc.
 +Another thing to do is to set a freeze point at the init routine,
 +and then JMP there from the monitor.  By clearing the screen, you
 +won't have to look at all the usual freezer ugliness, and at this
 +point freezing isn't any different than saving from the ML monitor
 +and RLE-packing the file.  Once saved, I tested a few times from the
 +64 side, to make sure things worked right.
 +
 + Whether freezing or saving from the monitor, if the file size
 +is larger than 202 blocks or so, it can't be loaded on the SCPU without
 +a special loader -- unless you compress it first.  I naturally recommend
 +using pu-crunch for that purpose, but if you want to do it on the 64
 +then I recommend using ABCrunch, which works well with the SCPU and
 +gives about as good compression as you can get without an REU.
 +
 + The result was stuntcar-scpu, which is *awfully* fun when fixed.
 +
 +
 +Rescue on Fractalus
 +-------------------
 +
 + Next on my list was Rescue on Fractalus, an older (and quite cool) 
 +Lucasfilm game that just didn't cut it in the 64 conversion, for a number
 +of reasons (that perhaps could have been avoided).  There are at least two
 +versions of the game, one of which doesn't even work on a 128 (good 'ol $D030),
 +but I have the older version, which does work.
 +
 + With a SuperCPU, though, there are a number of problems.  The display
 +flickers terribly.  The gameplay is smooth and not at all too fast -- in fact,
 +it is too slow.  Specifically, the velocities and turning rates and such do
 +not give a convincing illusion of speed or excitement.  The game is copy-
 +protected and uses a track-based fastloader, loaded from disk via B-E, which
 +also saves the high scores to disk.  Clearly, this one is a bigger job: the 
 +display is too fast, the game constants need adjusting, and the highscore code
 +needs to be replaced by some kernal calls.
 +
 + The structure of this code is a little different.  The main loop
 +handles the (double-buffered) display -- it does all the calculations and 
 +draws to the two buffers.  The multi-part interrupt loop does the rest -- 
 +it swaps buffers, changes the display in different parts of the screen,
 +reads the joystick, and performs the game updates which change your
 +position and direction.  It also handles enemies such as saucers, but
 +doesn't handle the bunkers which fire at you from the mountains (the main
 +loop takes care of those).
 + What does all this mean?  First, that the game can be a good ten
 +steps ahead of the screen, which makes things like targeting very
 +difficult.  Second, that the bunkers almost never fire at you at 1MHz
 +(they go crazy at 20).  Third, that things like velocity and turning
 +rate are rather low, because advancing or turning too quickly would
 +get the game way out of sync (unfortunately, they are still too fast
 +for 1MHz, making targeting difficult and movement clunky).  On the
 +other hand, having the movement in the interrupt is the reason that
 +the game does not become unplayably fast at 20MHz, and means that
 +something besides a delay loop is needed.
 + The interrupt swaps buffers, but the main loop draws them,
 +and because it draws so quickly it can start clearing and drawing to 
 +the visible buffer.  To make sure this was what I was seeing, I reversed
 +the buffer swap code in the interrupt, so that the drawing buffer was
 +always on-screen.  Sure enough, that's what the 20Mhz version looked
 +like.
 + It turned out to be pretty easy to force the main loop to wait
 +on the interrupt.  Although I messed around (unsuccessfully) with
 +intercepting the interrupt loop, the buffer swap code actually
 +modifies a zero-page variable upon swapping.  So all the main loop
 +has to do is wait on that variable before charging ahead.  I may have
 +made it wait for two frames, because it made the game play a little
 +better.
 +
 + Now, how to find the velocity and turn code?  Well it takes
 +a keypress to change the velocity, so by hunting for LDA $DC01, and
 +tracing back, the routine can be found; at the very least the
 +affected variables may be found, and hunted for.  For example, if
 +the result is stored in $D0, then you can search for LDA $D0.  The
 +point is to locate the keypress processing code.  From there, a little
 +trial and error (setting freeze points and pressing the velocity key)
 +locates the piece of code which deals with changing the velocity, and 
 +in particular which variable corresponds to velocity.  Finally, from 
 +there it just takes another hunt for LDA velocity, ADC velocity, etc.
 +to figure out where the code for updating position and direction is.
 + In this case, I was pretty sure I had found it, as it went
 +something like
 +
 + LDA velocity
 + LSR
 + LSR
 + ADC #$20
 +
 +and this was added to the position.  To check that this was the code,
 +I just changed the ADC, or removed an LSR, to see that the speed changed.
 +The code for turning left and right and moving up and down was similar,
 +and again after a little trial and error it was clear what code did
 +what.  Again, it wasn't necessary to totally understand how these
 +routines worked exactly -- just the general idea of them, in this case
 +to see that a multiple of the velocity was used to change the position
 +and orientation of the player.
 + So, to fix it up, I just changed that multiple -- probably I
 +NOPed out an LSR above, to basically double the speed, and changed the 
 +turning rates similarly.  This took a little experimentation, as it
 +not only needed to be playably fast, but also couldn't overflow at
 +high speeds, etc.
 +
 + But once that was working, all that remained was the highscore
 +table.  Finding the table location was pretty easy -- I just got a high
 +score, and while entering my name froze the program, and figured out
 +what got stored where.  From there it was pretty easy to figure out
 +what was saved to disk.  From the original loader, I also knew where
 +the highscores needed to be loaded to initially (the highscore table
 +gets copied around a lot -- it doesn't just stay at that one location).
 +Figuring out the exact number of bytes to save took a little bit of
 +effort (saving either too many or too few bytes screws it up), but
 +from there it was clear what memory needed to be saved.
 + So all that remained was to add the usual SETLFS etc. kernal
 +calls, right?  Wrong.  The program uses all the usual kernal variables
 +(from $90-$C0) for its own purposes.  Also recall that I wanted the
 +program to work with device 9, etc.  To get around this, I did two
 +things.  First, when the program first starts, I save some of the
 +relevant variables to an unused part of memory -- in particular, I
 +save the current drive number.  Second, before saving the highscore
 +file, I actually copy all zero page variables from $90-$C2 or so
 +to a temporary location, and then copy them back after saving.
 +That way there are no worries about altering important locations.
 + Finding memory for the load/save patch was easy -- I just used
 +the area which was previously used for the fastload load/save code.
 +There was enough for the necessary code as well as temporary space
 +for saving the zero page variables.
 +
 + Finally, I changed some text from Rescue on Fractalus to
 +Behind Jaggi Lines, to distinguish it from the original, and that
 +was that.  Works great!  And is now more playable and challenging;
 +in short, more the game it always should have been.
 +
 +Stellar 7
 +---------
 +
 + Finally, I tried my hand at Stellar 7.  Stellar 7 had several
 +problems.  At the main screen, a delay loop tosses you to the mission
 +screen after a while, if no keys are pressed.  This is a software loop,
 +and so passes very quickly.  The game itself is too fast, so some sort
 +of delay is needed.  The mission display is also too fast, and has
 +software delay loops, so that needs fixing.  Finally, the game uses 
 +kernal calls for loading and saving, but is attached to drive #8;
 +also, my version was split into a bunch of files, and I wanted to
 +cut the number of files down.
 +
 + Well, by this time it was all pretty straightforward.  From
 +the loader, it was easy to figure out which files went where.  The
 +mission and main displays were loaded in when needed, and swapped
 +into unused parts of memory when not, so I loaded them in and
 +adjusted the swap variable accordingly -- this left just the highscore
 +and seven level files.
 +
 + Finding the delay loops was easy -- I just went to the relevant
 +sections of code, froze, and took a look at the loops.  There were your
 +basic
 +
 +:LOOP
 + LDA $D4 ;Check for keypress
 + BMI :key
 + DEX
 + BNE :LOOP
 + DEY
 + BNE :LOOP
 + DEC counter
 + BNE :LOOP
 +:key LDX #$00
 + ...
 +
 +Luckily, all routines were pretty much the same as the above.  The
 +interrupt routine is in the $0314 vector, and the same routine is
 +used during gameplay.  
 + So the patch is very easy at this point.  First, change the
 +IRQ code which does a JMP $EA7B to JMP $CE00
 +
 +. CE00  $EE INC $CFFF
 +. CE03  $4C JMP $EA7B
 +
 +To fix up the keypress routines, the idea is to change the LDA $D0
 +into a JSR patch.  How to substitute 3 bytes for 2 bytes?  The
 +trick is to place the LDX #$00 into the patch routine:
 +
 +. CE06  $20 JSR $CE15 ;Wait for $CFFF
 +. CE09  $A5 LDA $D4
 +. CE0B  $10 BPL $CE11
 +. CE0D  $A2 LDX #$00 ;If key pressed, then LDX #$00
 +. CE0F  $29 AND #$FF
 +. CE11  $60 RTS
 +
 +The actual delay is accomplished by waiting on $CFFF:
 +
 +. CE15  $AD LDA $CFFF
 +. CE18  $C9 CMP #$04
 +. CE1A  $90 BCC $CE15
 +. CE1C  $A9 LDA #$00
 +. CE1E  $8D STA $CFFF
 +. CE21  $60 RTS
 +
 +As you can see, I waited a (default) of 4 frames.  The patch in the
 +game/mission rendering routine works similarly -- I just patched
 +the rendering code to basically JSR $CE15.  I also decided to
 +try something new: let the user be able to change that CMP #$04
 +to make things faster or slower, to suit their tastes.  The keyscan
 +values were pretty easy to figure out, so this just required a little 
 +patch to check for the "+" and "-" keys, and change location $CE19
 +accordingly.
 +
 + Well, that about sums it up.  Perhaps if you do some fixing,
 +you might send me a little email describing your own experiences?
 +
 +.......
 +....
 +..
 +.                                    C=H #17
 +
 +::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
 +
 +An Optimizing Hybrid LZ77 RLE Data Compression Program, aka
 +Improving Compression Ratio for Low-Resource Decompression
 +===========================================================
 +by Pasi Ojala <albert@cs.tut.fi>
 +
 +Short:
 +
 +Pucrunch is a Hybrid LZ77 and RLE compressor, uses an Elias Gamma Code for
 +lengths, mixture of Gamma Code and linear for LZ77 offset, and ranked RLE
 +bytes indexed by the same Gamma Code.  Uses no extra memory in decompression.
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Introduction
 +------------
 +
 +Since I started writing demos for the C64 in 1989 I have always wanted to
 +program a compression program.  I had a lot of ideas but never had the
 +time, urge or knowledge to create one.  In retrospect, most of the ideas I
 +had then were simply bogus ("magic function theory" as Mark Nelson nicely
 +puts it).  But years passed, I gathered more knowledge and finally got an
 +irresistible urge to finally realize my dream.
 +
 +The nice thing about the delay is that I don't need to write the actual
 +compression program to run on a C64 anymore.  I can write it in portable
 +ANSI-C code and just program it to create files that would uncompress
 +themselves when run on a C64.  Running the compression program outside of
 +the target system provides at least the following advantages.
 +  * I can use portable ANSI-C code.  The compression program can be
 +    compiled to run on a Unix box, Amiga, PC etc.  And I have all the
 +    tools to debug the program and gather profiling information to see
 +    why it is so slow :-)
 +  * The program runs much faster than on C64.  If it is still slow, there
 +    is always multitasking to allow me to do something else while I'm
 +    compressing a file.
 +  * There is 'enough' memory available.  I can use all the memory I
 +    possibly need and use every trick possible to increase the compression
 +    ratio as long as the decompression remains possible on a C64.
 +  * Large files can be compressed as easily as shorter files.  Most C64
 +    compressors can't handle files larger than around 52-54 kilobytes
 +    (210-220 disk blocks).
 +  * Cross-development is easier because you don't have to transfer a
 +    file into C64 just to compress it.
 +
 +
 +Memory Refresh and Terms for Compression
 +----------------------------------------
 +
 +Statistical compression
 +       Uses the uneven probability distribution of the source symbols
 +       to shorten the average code length.  Huffman code and arithmetic
 +       code belong to this group.  By giving a short code to symbols
 +       occurring most often, the number of bits needed to represent
 +       the symbols decreases.  Think of the Morse code for example:  the
 +       characters you need more often have shorter codes and it takes
 +       less time to send the message.
 +
 +Dictionary compression
 +       Replaces repeating strings in the source with shorter
 +       representations.  These may be indices to an actual dictionary
 +       (Lempel-Ziv 78) or pointers to previous occurrences (Lempel-Ziv
 +       77).  As long as it takes fewer bits to represent the reference
 +       than the string itself, we get compression.  LZ78 is a lot like
 +       the way BASIC substitutes tokens for keywords:  one-byte tokens
 +       expand to whole words like PRINT# LZ77 replaces repeated
 +       strings with (length,offset) pairs, thus the string VICIICI can
 +       be encoded as VICI(3,3) -- the repeated occurrence of the
 +       string ICI is replaced by a reference.
 +
 +Run-length encoding
 +       Replaces repeating symbols with a single occurrence of the
 +       symbol and a repeat count.  For example assembly compilers have
 +       a .zero keyword or equivalent to fill a number of bytes with
 +       zero without needing to list them all in the source code.
 +
 +Variable-length code
 +       Any code where the length of the code is not explicitly known
 +       but changes depending on the bit values.  Some kind of end
 +       marker or length count must be provided to make a code a prefix
 +       code (uniquely decodable).  Compare with ASCII (or Latin-1) text,
 +       where you know you get the next letter by reading a full byte from 
 +       the input.  A variable-length code requires you to read part of the 
 +       data to know how many bits to read next.
 +
 +Universal codes
 +       Universal codes are used to encode integer numbers without the
 +       need to know the maximum value.  Smaller integer values usually
 +       get shorter codes.  Different universal codes are optimal for
 +       different distributions of the values.  Universal codes include
 +       Elias Gamma and Delta codes, Fibonacci code, and Golomb and
 +       Rice codes.
 +
 +Lossless compression
 +       Lossless compression algorithms are able to exactly reproduce
 +       the original contents unlike lossy compression, which omits
 +       details that are not important or perceivable by human sensory
 +       system.  This article only talks about lossless compression.
 +
 +My goal in the pucrunch project was to create a compression system in which
 +the decompressor would use minimal resources (both memory and processing
 +power) and still have the best possible compression ratio.  A nice bonus
 +would be if it outperformed every other compression program available.
 +These understandingly opposite requirements (minimal resources and good
 +compression ratio) rule out most of the state-of-the-art compression
 +algorithms and in effect only leave RLE and LZ77 to be considered.  Another
 +goal was to learn something about data compression and that goal at least
 +has been satisfied.
 +
 +I started by developing a byte-aligned LZ77+RLE compressor/decompressor and
 +then added a Huffman backend to it.  The Huffman tree took 384 bytes and
 +the code that decoded the tree into an internal representation took 100
 +bytes.  I found out that while the Huffman code gained about 8% in my
 +40-kilobyte test files, the gain was reduced to only about 3% after
 +accounting the extra code and the Huffman tree.
 +
 +Then I started a more detailed analysis of the LZ77 offset and length
 +values and the RLE values and concluded that I would get better compression
 +by using a variable-length code.  I used a simple variable-length code and
 +scratched the Huffman backend code, as it didn't increase the compression
 +ratio anymore.  This version became pucrunch.
 +
 +Pucrunch does not use byte-aligned data, and is a bit slower than the
 +byte-aligned version because of this, but is much faster than the original
 +version with the Huffman backend attached.  And pucrunch still does very
 +well compression-wise.  In fact, it does very well indeed, beating even
 +LhA, Zip, and GZip in some cases.  But let's not get too much ahead of
 +ourselves.
 +
 +To get an improvement to the compression ratio for LZ77, we have only a few
 +options left.  We can improve on the encoding of literal bytes (bytes that
 +are not compressed), we can reduce the number of literal bytes we need to
 +encode, and shorten the encoding of RLE and LZ77.  In the algorithm
 +presented here all these improvement areas are addressed both collectively
 +(one change affects more than one area) and one at a time.
 +
 + 1. By using a variable-length code we can gain compression for even
 +    2-byte LZ77 matches, which in turn reduces the number of literal
 +    bytes we need to encode.  Most LZ77-variants require 3-byte matches
 +    to get any compression because they use so many bits to identify
 +    the length and offset values, thus making the code longer than the
 +    original bytes would've taken.
 + 2. By using a new literal byte tagging system which distinguishes
 +    uncompressed and compressed data efficiently we can reduce number
 +    of extra bits needed to make this distinction (the encoding
 +    overhead for literal bytes).  This is especially important for
 +    files that do not compress well.
 + 3. By using RLE in addition to LZ77 we can shorten the encoding for
 +    long byte run sequences and at the same time set a convenient
 +    upper limit to LZ77 match length.  The upper limit performs two
 +    functions:
 +       + we only need to encode integers in a specific range
 +       + we only need to search strings shorter than this limit (if we
 +         find a string long enough, we can stop there)
 +    Short byte runs are compressed either using RLE or LZ77, whichever
 +    gets the best results.
 + 4. By doing statistical compression (more frequent symbols get
 +    shorter representations) on the RLE bytes (in this case symbol
 +    ranking) we can gain compression for even 2-byte run lengths,
 +    which in turn reduces the number of literal bytes we need to
 +    encode.
 + 5. By carefully selecting which string matches and/or run lengths to
 +    use we can take advantage of the variable-length code.  It may be
 +    advantageous to compress a string as two shorter matches instead
 +    of one long match and a bunch of literal bytes, and it can be
 +    better to compress a string as a literal byte and a long match
 +    instead of two shorter matches.
 +
 +This document consists of several parts, which are:
 +  * C64 Considerations - Some words about the target system
 +  * Escape codes - A new tagging system for literal bytes
 +  * File format - What are the primaries that are output
 +  * Graph search - How to squeeze every byte out of this method
 +  * String match - An evolution of how to speed up the LZ77 search
 +  * Some results on the target system files
 +  * Results on the Calgary Corpus Test Suite
 +  * The Decompression routine - 6510 code with commentary
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Commodore 64 Considerations
 +---------------------------
 +
 +Our target environment (Commodore 64) imposes some restrictions which we
 +have to take into consideration when designing the ideal compression
 +system.  A system with a 1-MHz 3-register 8-bit processor and 64 kilobytes
 +of memory certainly imposes a great challenge, and thus also a great sense
 +of achievement for good results.
 +
 +First, we would like it to be able to decompress as big a program as
 +possible.  This in turn requires that the decompression code is located in
 +low memory (most programs that we want to compress start at address 2049)
 +and is as short as possible.  Also, the decompression code must not use any
 +extra memory or only very small amounts of it.  Extra care must be taken to
 +make certain that the compressed data is not overwritten during the
 +decompression before it has been read.
 +
 +Secondly, my number one personal requirement is that the basic end address
 +must be correctly set by the decompressor so that the program can be
 +optionally saved in uncompressed form after decompression (although the
 +current decompression code requires that you say "clr" before saving).
 +This also requires that the decompression code is system-friendly, i.e.
 +does not change KERNAL or BASIC variables or other structures.  Also, the
 +decompressor shouldn't rely on file size or load end address pointers,
 +because these may be corrupted by e.g.  X-modem file transfer protocol
 +(padding bytes may be added).
 +
 +When these requirements are combined, there is not much selection in where
 +in the memory we can put the decompression code.  There are some locations
 +among the first 256 addresses (zeropage) that can be used, the (currently)
 +unused part of the processor stack (0x100..0x1ff), the system input buffer
 +(0x200..0x258) and the tape I/O buffer plus some unused bytes (0x334-0x3ff).
 +The screen memory (0x400..0x7ff) can also be used if necessary.  If we can 
 +do without the screen memory and the tape buffer, we can potentially 
 +decompress files that are located from 0x258 to 0xffff.
 +
 +The third major requirement is that the decompression should be relatively
 +fast.  After 10 seconds the user begins to wonder if the program has crashed 
 +or if it is doing anything, even if there is some feedback like border color
 +flashing.  This means that the arithmetic used should be mostly 8- or 9-bit
 +(instead of full 16 bits) and there should be very little of it per each
 +decompressed byte.  Processor- and memory-intensive algorithms like
 +arithmetic coding and prediction by partial matching (PPM) are pretty much
 +out of the question, and that is saying it mildly.  LZ77 seems the only
 +practical alternative.  Still, run-length encoding handles long byte runs
 +better than LZ77 and can have a bigger length limit.  If we can easily
 +incorporate RLE and LZ77 into the same algorithm, we should get the best
 +features from both.
 +
 +A part of the decompressor efficiency depends on the format of the
 +compressed data.  Byte-aligned codes, where everything is aligned into byte
 +boundaries, can be accessed very quickly; non-byte-aligned variable length
 +codes are much slower to handle, but provide better compression.  Note that
 +byte-aligned codes can still have other data sizes than 8.  For example you
 +can use 4 bits for LZ77 length and 12 bits for LZ77 offset, which preserves
 +the byte alignment.
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +The New Tagging System
 +----------------------
 +
 +I call the different types of information my compression algorithm outputs
 +primaries.  The primaries in this compression algorithm are:
 +  * literal (uncompressed) bytes and escape sequences,
 +  * LZ77 (length,offset)-pairs,
 +  * RLE (length,byte)-pairs, and
 +  * EOF (end of file marker).
 +
 +Literal bytes are those bytes that cannot be represented by shorter codes, 
 +unlike a part of previously seen data (LZ77), or a part of a longer
 +sequence of the same byte (RLE).
 +
 +Most compression programs handle the selection between compressed data and
 +literal bytes in a straightforward way by using a prefix bit.  If the bit
 +is 0, the following data is a literal byte (uncompressed).  If the bit is
 +1, the following data is compressed.  However, this presents the problem
 +that non-compressible data will be expanded from the original 8 bits to 9
 +bits per byte, i.e. by 12.5 %.  If the data isn't very compressible, this
 +overhead consumes all the little savings you may have had using LZ77 or
 +RLE.
 +
 +Some other data compression algorithms use a value (using variable-length
 +code) that indicates the number of literal bytes that follow, but this is
 +really analogous to a prefix bit, because 1-byte uncompressed data is very
 +common for modestly compressible files.  So, using a prefix bit may seem
 +like a good idea, but we may be able to do even better.  Let's see what we
 +can come up with.  My idea was to somehow use the data itself to mark
 +compressed and uncompressed data and thus not need any prefix bits.
 +
 +Let's assume that 75% of the symbols generated are literal bytes.  In this
 +case it seems viable to allocate shorter codes for literal bytes, because
 +they are more common than compressed data.  This distribution (75% are
 +literal bytes) suggests that we should use 2 bits to determine whether the
 +data is compressed or a literal byte.  One of the combinations indicates
 +compressed data, and three of the combinations indicate a literal byte.  At
 +the same time those three values divide the literal bytes into three
 +distinct groups.  But how do we make the connection between which of the
 +three bit patters we have and what are the literal byte values?
 +
 +The simplest way is to use a direct mapping.  We use two bits (let them be
 +the two most-significant bits) _from the literal bytes themselves_ to
 +indicate compressed data.  This way no actual prefix bits are needed.  We
 +maintain an escape code (which doesn't need to be static), which is
 +compared to the bits, and if they match, compressed data follows.  If the
 +bits do not match, the rest of the literal byte follows.  In this way the
 +literal bytes do not expand at all if their most significant bits do not
 +match the escape code, and fewer bits are needed to represent the literal
 +bytes.
 +
 +Whenever those bits in a literal byte would match the escape code, an
 +escape sequence is generated.  Otherwise we could not represent those
 +literal bytes which actually start like the escape code (the top bits
 +match).  This escape sequence contains the offending data and a new escape
 +code.  This escape sequence looks like
 +
 +     # of escape bits    (escape code)
 +                       (escape mode select)
 +     # of escape bits    (new escape bits)
 +     8-# of escape bits  (rest of the byte)
 +     = 8 + 3 + # of escape bits
 +     = 13 for 2-bit escapes, i.e. expands the literal byte by 5 bits.
 +
 +Read further to see how we can take advantage of the changing escape code.
 +
 +You may also remember that in the run-length encoding presented in the
 +previous article two successive equal bytes are used to indicate compressed
 +data (escape condition) and all other bytes are literal bytes.  A similar
 +technique is used in some C64 packers (RLE) and crunchers (LZ77), the only
 +difference is that the escape condition is indicated by a fixed byte value.
 +My tag system is in fact an extension to this.  Instead of a full byte, I
 +use only a few bits.
 +
 +We assumed an even distribution of the values and two escape bits, so 1/4
 +of the values have the same two most significant bits as the escape code.
 +I call this probability that a literal byte has to be escaped the "hit rate".
 +Thus, literal bytes expand in average 25% of the time by 5 bits, making the
 +average length 25% * 13 + 75% * 8 = 9.25.  Not surprising, this is longer
 +than using one bit to tag the literal bytes.  However, there is one thing
 +we haven't considered yet.  The escape sequence has the possibility to
 +change the escape code.  Using this feature to its optimum (escape
 +optimization), the average 25% hit rate becomes the -maximum- hit rate.
 +
 +Also, because the distribution of the literal byte values is seldom flat 
 +(some values are more common than others) and there is locality (different 
 +parts of the file only contain some of the possible values), from which we 
 +can also benefit, the actual hit rate is always much smaller than that.  
 +Empirical studies on some test files show that for 2-bit escape codes the 
 +actual realized hit rate is only 1.8-6.4%, while the theoretical maximum 
 +is the already mentioned 25%.
 +
 +Previously we assumed the distribution of 75% of literal bytes and 25% of
 +compressed data (other primaries).  This prompted us to select 2 escape
 +bits.  For other distributions (differently compressible files, not
 +necessarily better or worse) some other number of escape bits may be more
 +suitable.  The compressor tries different number of escape bits and select
 +the value which gives the best overall results.  The following table
 +summarizes the hit rates on the test files for different number of escape
 +bits.
 +
 +   1-bit   2-bit   3-bit   4-bit   File
 +   50.0%   25.0%   12.5%   6.250%  Maximum
 +   25.3%    2.5%    0.3%   0.090%  ivanova.bin
 +   26.5%    2.4%    0.8%   0.063%  sheridan.bin
 +   20.7%    1.8%    0.2%   0.041%  delenn.bin
 +   26.5%    6.4%    2.5%   0.712%  bs.bin
 +    9.06    8.32    8.15   8.050   bits/Byte for bs.bin
 +
 +As can be seen from the table, the realized hit rates are dramatically
 +smaller than the theoretical maximum values.  A thought might occur that we
 +should always select 4-bit (or longer) escapes, because it reduces the hit
 +rate and presents the minimum overhead for literal bytes.  Unfortunately
 +increasing the number of escape bits also increases the code length of the
 +compressed data.  So, it is a matter of finding the optimum setting.
 +
 +If there are very few literal bytes compared to other primaries, 1-bit
 +escape or no escape at all gives very short codes to compressed data, but
 +causes more literal bytes to be escaped, which means 4 bits extra for each
 +escaped byte (with 1-bit escapes).  If the majority of primaries are
 +literal bytes, for example a 6-bit escape code causes most of the literal
 +bytes to be output as 8-bit codes (no expansion), but makes the other
 +primaries 6 bits longer.  Currently the compressor automatically selects
 +the best number of escape bits, but this can be overridden by the user with
 +the -e option.
 +
 +The cases in the example with 1-bit escape code validates the original
 +suggestion:  use a prefix bit.  A simple prefix bit would produce better
 +results on three of the previous test files (although only slightly).  For
 +delenn.bin (1 vs 0.828) the escape system works better.  On the other hand,
 +1-bit escape code is not selected for any of the files, because 2-bit
 +escape gives better overall results.
 +
 +-Note:- for 7-bit ASCII text files, where the top bit is always 0 (like
 +most of the Calgary Corpus files), the hit rate is 0% for even 1-bit
 +escapes.  Thus, literal bytes do not expand at all.  This is equivalent to
 +using a prefix bit and 7-bit literals, but does not need separate algorithm
 +to detect and handle 7-bit literals.
 +
 +For Calgary Corpus files the number of tag bits per primary (counting the
 +escape sequences and other overhead) ranges from as low as 0.46 (book1) to
 +1.07 (geo) and 1.09 (pic).  These two files (geo and pic) are the only ones
 +in the suite where a simple prefix bit would be better than the escape
 +system.  The average is 0.74 tag bits per primary.
 +
 +In Canterbury Corpus the tag bits per primary ranges from 0.44
 +(plrabn12.txt) to 1.09 (ptt5), which is the only one above 0.85 (sum).
 +The average is 0.61 tag bits per primary.
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Primaries Used for Compression
 +------------------------------
 +
 +The compressor uses the previously described escape-bit system while
 +generating its output.  I call the different groups of bits that are
 +generated primaries, whether it is the correct term or not.  You are
 +welcome to suggest a better term for them.  The primaries in this
 +compression algorithm are:  literal byte (and escape sequence), LZ77
 +(length,offset)-pair, RLE (length, byte)-pair, and EOF (end of file
 +marker).
 +
 +If the top bits of a literal byte do not match the escape code, the byte is
 +output as-is.  If the bits match, an escape sequence is generated, with the
 +new escape code.  Other primaries start with the escape code.
 +
 +The Elias Gamma Code is used extensively.  This code consists of two parts:
 +a unary code (a one-bit preceded by zero-bits) and a binary code part.  The
 +first part tells the decoder how many bits are used for the binary code
 +part.  Being a universal code, it produces shorter codes for small integers
 +and longer codes for larger integers.  Because we expect we need to encode
 +a lot of small integers (there are more short string matches and shorter
 +equal byte runs than long ones), this reduces the total number of bits
 +needed.  See the previous article for a more in-depth delve into
 +statistical compression and universal codes.  To understand this article,
 +you only need to keep in mind that small integer value equals short code.
 +The following discusses the encoding of the primaries.
 +
 +The most frequent compressed data is LZ77.  The length of the match is
 +output in Elias Gamma code, with "0" meaning the length of 2, "100" length
 +of 3, "101" length of 4 and so on.  If the length is not 2, a LZ77 offset
 +value follows.  This offset takes 9 to 22 bits.  If the length is 2, the
 +next bit defines whether this is LZ77 or RLE/Escape.  If the bit is 0, an
 +8-bit LZ77 offset value follows.  (Note that this restricts the offset for
 +2-byte matches to 1..256.) If the bit is 1, the next bit decides between
 +escape (0) and RLE (1).
 +
 +The code for an escape sequence is thus e..e010n..ne....e, where E is the
 +byte, and N is the new escape code.  Example:
 +  * We are using 2-bit escapes
 +  * The current escape code is "11"
 +  * We need to encode a byte 0xca == 0b11001010
 +  * The escape code and the byte high bits match (both are "11")
 +  * We output the current escape code "11"
 +  * We output the escaped identification "010"
 +  * We output the new escape bits, for example "10" (depends on escape
 +    optimization)
 +  * We output the rest of the escaped byte "001010"
 +  * So, we have output the string "1101010001010"
 +
 +When the decompressor receives this string of bits, it finds that the first
 +two bits match with the escape code, it finds the escape identification
 +("010") and then gets the new escape, the rest of the original byte and
 +combines it with the old escape code to get a whole byte.
 +
 +The end of file condition is encoded to the LZ77 offset and the RLE is
 +subdivided into long and short versions.  Read further, and you get a
 +better idea about why this kind of encoding is selected.
 +
 +When I studied the distribution of the length values (LZ77 and short RLE
 +lengths), I noticed that the smaller the value, the more occurrences.
 +The following table shows an example of length value distribution.
 +
 +         LZLEN   S-RLE
 +  2       1975     477
 +  3-4     1480     330
 +  5-8      492     166
 +  9-16     125      57
 +  17-32     31      33
 +  33-64      8      15
 +
 +The first column gives a range of values.  The first entry has a single
 +value (2), the second two values (3 and 4), and so on.  The second column
 +shows how many times the different LZ77 match lengths are used, the last
 +column shows how many times short RLE lengths are used.  The distribution
 +of the values gives a hint of how to most efficiently encode the values.
 +We can see from the table for example that values 2-4 are used 3455 times,
 +while values 5-64 are used only 656 times.  The more common values need to
 +get shorter codes, while the less-used ones can be longer.
 +
 +Because in each "magnitude" there are approximately half as many values
 +than in the preceding one, it almost immediately occurred to me that the
 +optimal way to encode the length values (decremented by one) is:
 +
 +  Value      Encoding       Range     Gained
 +  0000000    not possible
 +  0000001    0              1         -6 bits
 +  000001x    10x            2-3       -4 bits
 +  00001xx    110xx          4-7       -2 bits
 +  0001xxx    1110xxx        8-15      +0 bits
 +  001xxxx    11110xxxx      16-31     +2 bits
 +  01xxxxx    111110xxxxx    32-63     +4 bits
 +  1xxxxxx    111111xxxxxx   64-127    +5 bits
 +
 +The first column gives the binary code of the original value (with x
 +denoting 0 or 1, xx 0..3, xxx 0..7 and so on), the second column gives the
 +encoding of the value(s).  The third column lists the original value range
 +in decimal notation.
 +
 +The last column summarizes the difference between this code and a 7-bit
 +binary code.  Using the previous encoding for the length distribution
 +presented reduces the number of bits used compared to a direct binary
 +representation considerably.  Later I found out that this encoding in fact
 +is Elias Gamma Code, only the assignment of 0- and 1-bits in the prefix is
 +reversed, and in this version the length is limited.  Currently the maximum
 +value is selectable between 64 and 256.
 +
 +So, to recap, this version of the Gamma code can encode numbers from 1 to
 +255 (1 to 127 in the example).  LZ77 and RLE lengths that are used start
 +from 2, because that is the shortest length that gives us any compression.
 +These length values are first decremented by one, thus length 2 becomes
 +"0", and for example length 64 becomes "11111011111".
 +
 +The distribution of the LZ77 offset values (pointer to a previous
 +occurrence of a string) is not at all similar to the length distribution.
 +Admittedly, the distribution isn't exactly flat, but it also isn't as
 +radical as the length value distribution either.  I decided to encode the
 +lower 8 bits (automatically selected or user-selectable between 8 and 12
 +bits in the current version) of the offset as-is (i.e.  binary code) and
 +the upper part with my version of the Elias Gamma Code.  However, 2-byte
 +matches always have an 8-bit offset value.  The reason for this is
 +discussed shortly.
 +
 +Because the upper part can contain the value 0 (so that we can represent
 +offsets from 0 to 255 with a 8-bit lower part), and the code can't directly
 +represent zero, the upper part of the LZ77 offset is incremented by one
 +before encoding (unlike the length values which are decremented by one).
 +Also, one code is reserved for an end of file (EOF) symbol.  This restricts
 +the offset value somewhat, but the loss in compression is negligible.
 +
 +With the previous encoding 2-byte LZ77 matches would only gain 4 bits (with
 +2-bit escapes) for each offset from 1 to 256, and 2 bits for each offset
 +from 257 to 768.  In the first case 9 bits would be used to represent the
 +offset (one bit for gamma code representing the high part 0, and 8 bits for
 +the low part of the offset), in the latter case 11 bits are used, because
 +each "magnitude" of values in the Gamma code consumes two more bits than
 +the previous one.
 +
 +The first case (offset 1..256) is much more frequent than the second case,
 +because it saves more bits, and also because the symbol source statistics
 +(whatever they are) guarantee 2-byte matches in recent history (much better
 +chance than for 3-byte matches, for example).  If we restrict the offset
 +for a 2-byte LZ77 match to 8 bits (1..256), we don't lose so much
 +compression at all, but instead we could shorten the code by one bit.  This
 +one bit comes from the fact that before we had to use one bit to make the
 +selection "8-bit or longer" Because we only have "8-bit" now, we don't
 +need that select bit anymore.
 +
 +Or, we can use that select bit to a new purpose to select whether this code
 +really is LZ77 or something else.  Compared to the older encoding (which
 +I'm not detailing here, for clarity's sake.  This is already much too
 +complicated to follow, and only slightly easier to describe) the codes for
 +escape sequence, RLE and End of File are still the same length, but the
 +code for LZ77 has been shortened by one bit.  Because LZ77 is the most
 +frequently used primary, this presents a saving that more than compensates
 +for the loss of 2-byte LZ77 matches with offsets 257..768 (which we can no
 +longer represent, because we fixed the offset for 2-byte matches to use
 +exactly 8 bits).
 +
 +Run length encoding is also a bit revised.  I found out that a lot of bits
 +can be gained by using the same length encoding for RLE as for LZ77.  On
 +the other hand, we still should be able to represent long repeat counts as
 +that's where RLE is most efficient.  I decided to split RLE into two modes:
 +  * short RLE for short (e.g. 2..128) equal byte strings
 +  * long RLE for long equal byte strings
 +
 +The Long RLE selection is encoded into the Short RLE code.  Short RLE only
 +uses half of its coding space, i.e.  if the maximum value for the gamma
 +code is 127, short RLE uses only values 1..63.  Larger values switches the
 +decoder into Long RLE mode and more bits are read to complete the run
 +length value.
 +
 +For further compression in RLE we rank all the used RLE bytes (the values
 +that are repeated in RLE) in the decreasing probability order.  The values
 +are put into a table, and only the table indices are output.  The indices
 +are also encoded using a variable length code (the same gamma code,
 +surprise..), which uses less bits for smaller integer values.  As there are
 +more RLE's with smaller indices, the average code length decreases.  In
 +decompression we simply get the gamma code value and then use the value as
 +an index into the table to get the value to repeat.
 +
 +Instead of reserving full 256 bytes for the table we only put the top 31
 +RLE bytes into the table.  Normally this is enough.  If there happens to be
 +a byte run with a value not in the table we use a similar technique as for
 +the short/long RLE selection.  If the table index is larger than 31, it
 +means we don't have the value in the table.  We use the values 32..63 to
 +select the 'escaped' mode and simultaneously send the 5 most significant
 +bits of the value (there are 32 distinct values in the range 32..63).  The
 +rest 3 bits of the byte are sent separately.
 +
 +If you are more than confused, forget everything I said in this chapter and
 +look at the decompression pseudo-code later in this article.
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Graph Search - Selecting Primaries
 +----------------------------------
 +
 +In free-parse methods there are several ways to divide the file into parts,
 +each of which is equally valid but not necessary equally efficient in terms
 +of compression ratio.
 +
 +     "i just saw justin adjusting his sting"
 +
 +     "i just saw", (-9,4), "in ad", (-9,6), "g his", (-25,2), (-10,4)
 +     "i just saw", (-9,4), "in ad", (-9,6), "g his ", (-10,5)
 +
 +The latter two lines show how the sentence could be encoded using literal
 +bytes and (offset, length) pairs.  As you can see, we have two different
 +encodings for a single string and they are both valid, i.e.  they will
 +produce the same string after decompression.  This is what free-parse is:
 +there are several possible ways to divide the input into parts.  If we are
 +clever, we will of course select the encoding that produces the shortest
 +compressed version.  But how do we find this shortest version?  How does
 +the data compressor decide which primary to generate in each step?
 +
 +The most efficient way the file can be divided is determined by a sort of a
 +graph-search algorithm, which finds the shortest possible route from the
 +start of the file to the end of the file.  Well, actually the algorithm
 +proceeds from the end of the file to the beginning for efficiency reasons,
 +but the result is the same anyway:  the path that minimizes the bits
 +emitted is determined and remembered.  If the parameters (number of escape
 +bits or the variable length codes or their parameters) are changed, the
 +graph search must be re-executed.
 +
 +     "i just saw justin adjusting his sting"
 +                 \___/    \_____/    \_|___/
 +                  13       15        11 13
 +                                      \____/
 +                                       15
 +
 +Think of the string as separate characters.  You can jump to the next
 +character by paying 8 bits to do so (not shown in the figure), unless the
 +top bits of the character match with the escape code (in which case you
 +need more bits to send the character "escaped").  If the history buffer
 +contains a string that matches a string starting at the current character
 +you can jump over the string by paying as many bits as representing the
 +LZ77 (offset,length)-pair takes (including escape bits), in this example
 +from 11 to 15 bits.  And the same applies if you have RLE starting at the
 +character.  Then you just find the least-expensive way to get from the
 +start of the file to the end and you have found the optimal encoding.  In
 +this case the last characters " sting" would be optimally encoded with
 +8(literal " ") + 15("sting") = 23 instead of 11(" s") + 13("ting") = 24
 +bits.
 +
 +The algorithm can be written either cleverly or not-so.  We can take a real
 +short-cut compared to a full-blown graph search because we can/need to only
 +go forwards in the file:  we can simply start from the end!  Our accounting
 +information which is updated when we pass each location in the data
 +consists of three values:
 + 1. the minimum bits from this location to the end of file.
 + 2. the mode (literal, LZ77 or RLE) to use to get that minimum
 + 3. the "jump" length for LZ77 and RLE
 +
 +For each location we try to jump forward (to a location we already
 +processed) one location, LZ77 match length locations (if a match exists),
 +or RLE length locations (if equal bytes follow) and select the shortest
 +route, update the tables accordingly.  In addition, if we have a LZ77 or
 +RLE length of for example 18, we also check jumps 17, 16, 15, ...  This
 +gives a little extra compression.  Because we are doing the "tree traverse"
 +starting from the "leaves", we only need to visit/process each location
 +once.  Nothing located after the current location can't change, so there is
 +never any need to update a location.
 +
 +To be able to find the minimal path, the algorithm needs the length of the
 +RLE (the number of the identical bytes following) and the maximum LZ77
 +length/offset (an identical string appearing earlier in the file) for each
 +byte/location in the file.  This is the most time-consuming -and-
 +memory-consuming part of the compression.  I have used several methods to
 +make the search faster.  See String Match Speedup later in this
 +article.  Fortunately these searches can be done first, and the actual
 +optimization can use the cached values.
 +
 +Then what is the rationale behind this optimization?  It works because you
 +are not forced to take every compression opportunity, but select the best
 +ones.  The compression community calls this "lazy coding" or "non-greedy"
 +selection.  You may want to emit a literal byte even if there is a 2-byte
 +LZ77 match, because in the next position in the file you may have a longer
 +match.  This is actually more complicated than that, but just take my word
 +for it that there is a difference.  Not a very big difference, and only
 +significant for variable-length code, but it is there and I was after every
 +last bit of compression, remember.
 +
 +Note that the decision-making between primaries is quite simple if a
 +fixed-length code is used.  A one-step lookahead is enough to guarantee
 +optimal parsing.  If there is a more advantageous match in the next
 +location, we output a literal byte and that longer match instead of the
 +shorter match.  I don't have time or space here to go very deeply on that,
 +but the main reason is that in fixed-length code it doesn't matter whether
 +you represent a part of data as two matches of lengths 2 and 8 or as
 +matches of lengths 3 and 7 or as any other possible combination (if matches
 +of those lengths exist).  This is not true for a variable-length code
 +and/or a statistical compression backend.  Different match lengths and
 +offsets no longer generate equal-length codes.
 +
 +Note also that most LZ77 compression algorithms need at least 3-byte match
 +to break even, i.e.  not expanding the data.  This is not surprising when
 +you stop to think about it.  To gain something from 2-byte matches you need
 +to encode the LZ77 match into 15 bits.  This is very little.  A generic
 +LZ77 compressor would use one bit to select between a literal and LZ77, 12
 +bits for moderate offset, and you have 2 bits left for match length.  I
 +imagine the rationale to exclude 2-byte matches also include "the potential
 +savings percentage for 2-byte matches is insignificant" Pucrunch gets
 +around this by using the tag system and Elias Gamma Code, and does indeed
 +gain bits from even 2-byte matches.
 +
 +After we have decided on what primaries to output, we still have to make
 +sure we get the best results from the literal tag system.  Escape
 +optimization handles this.  In this stage we know which parts of the data
 +are emitted as literal bytes and we can select the minimal path from the
 +first literal byte to the last in the same way we optimized the primaries.
 +Literal bytes that match the escape code generate an escape sequence, thus
 +using more bits than unescaped literal bytes, and we need to minimize these
 +occurrences.
 +
 +For each literal byte there is a corresponding new escape code which
 +minimizes the path to the end of the file.  If the literal byte's high bits
 +match the current escape code, this new escape code is used next.  The
 +escape optimization routine proceeds from the end of the file to the
 +beginning like the graph search, but it proceeds linearly and is thus much
 +faster.
 +
 +I already noted that the new literal byte tagging system exploits the
 +locality in the literal byte values.  If there is no correlation between
 +the bytes, the tagging system does not do well at all.  Most of the time,
 +however, the system works very well, performing 50% better than the
 +prefix-bit approach.
 +
 +The escape optimization routine is currently very fast.  A little
 +algorithmic magic removed a lot of code from the original version.  A fast
 +escape optimization routine is quite advantageous, because the number of
 +escape bits can now vary from 0 (uncompressed bytes always escaped) to 8
 +and we need to run the routine again if we change the number of escape bits
 +used to select the optimal escape code changes.
 +
 +Because escaped literal bytes actually expand the data, we need a safety
 +area, or otherwise the compressed data may get overwritten by the
 +decompressed data before we have used it.  Some extra bytes need to be
 +reserved for the end of file marker.  The compression routine finds out how
 +many bytes we need for safety buffer by keeping track of the difference
 +between input and output sizes while creating the compressed file.
 +
 +            $1000 .. $2000
 +            |OOOOOOOO|           O=original file
 +
 +        $801 ..
 +        |D|CCCCC|                C=compressed data (D=decompressor)
 +
 + $f7..      $1000     $2010
 + |D|            |CCCCC|          Before decompression starts
 +            ^    ^
 +            W    R               W=write pointer, R=read pointer
 +
 +If the original file is located at $1000-$1fff, and the calculated safety
 +area is 16 bytes, the compressed version will be copied by the
 +decompression routine higher in memory so that the last byte is at $200f.
 +In this way, the minimum amount of other memory is overwritten by the
 +decompression.  If the safety are would exceed the top of memory, we need a
 +wrap buffer.  This is handled automatically by the compressor.  The read
 +pointer wraps from the end of memory to the wrap buffer, allowing the
 +original file to extend up to the end of the memory, all the way to $ffff.
 +You can get the compression program to tell you which memory areas it uses
 +by specifying the "-s" option.  Normally the safety buffer needed is less
 +than a dozen bytes.
 +
 +To sum things up, Pucrunch operates in several steps:
 + 1. Find RLE and LZ77 data, pre-select RLE byte table
 + 2. Graph search, i.e.  which primaries to use
 + 3. Primaries/Literal bytes ratio decides how many escape bits to use
 + 4. Escape optimization, which escape codes to use
 + 5. Update RLE ranks and the RLE byte table
 + 6. Determine the safety area size and output the file.
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +String Match Speedup
 +--------------------
 +
 +To be able to select the most efficient combination of primaries we of
 +course first need to find out what kind of primaries are available for
 +selection.  If the file doesn't have repeated bytes, we can't use RLE.  If
 +the file doesn't have repeating byte strings, we can't use LZ77.  This
 +string matching is the most time-consuming operation in LZ77 compression
 +simply because of the amount of the comparison operations needed.  Any
 +improvement in the match algorithm can decrease the compression time
 +considerably.  Pucrunch is a living proof on that.
 +
 +The RLE search is straightforward and fast:  loop from the current position
 +(P) forwards in the file counting each step until a different-valued byte
 +is found or the end of the file is reached.  This count can then be used as
 +the RLE byte count (if the graph search decides to use RLE).  The code can
 +also be optimized to initialize counts for all locations that belonged to
 +the RLE, because by definition there are only one-valued bytes in each one.
 +Let us mark the current file position by P.
 +
 + unsigned char *a = indata + P, val = *a++;
 + int top = inlen - P;
 + int rlelen = 1;
 +
 + /* Loop for the whole RLE */
 + while(rlelen<top && *a++ == val)
 +     rlelen++;
 +
 + for(i=0;i<rlelen-1;i++)
 +     rle[P+i] = rlelen-i;
 +
 +With LZ77 we can't use the same technique as for RLE (i.e.  using the
 +information about current match to skip subsequent file locations to speed
 +up the search).  For LZ77 we need to find the longest possible, and
 +-nearest- possible, string that matches the bytes starting from the current
 +location.  The nearer the match, the less bits are needed to represent the
 +offset from the current position.
 +
 +Naively, we could start comparing the strings starting from P-1 and P,
 +remembering the length of the matching part and then doing the same at P-2
 +and P, P-3 and P, ..  P-j and P (j is the maximum search offset).  The
 +longest match and its location (offset from the current position) are then
 +remembered and initialized.  If we find a match longer or equal than the
 +maximum length we can actually use, we can stop the search there.  (The
 +code used to represent the length values may have an upper limit.)
 +
 +This may be the first implementation that comes to your (and my) mind, and
 +might not seem so bad at first.  In reality, it is a very slow way to do
 +the search: the -Brute Force- method.  It could take somewhere about (n^3)
 +byte compares to process a file of the length n (a mathematically inclined
 +person would probably give a better estimate).  However, using the already
 +determined RLE value to our advantage permits us to rule out the worst-case
 +projection, which happens when all bytes are the same value.  We only
 +search LZ77 matches if the current file position has shorter RLE sequence
 +than the maximum LZ77 copy length.
 +
 +The first thing I did to improve the speed is to remember the position
 +where each byte has last been seen.  A simple 256-entry table handles that.
 +Using this table, the search can directly start from the first potential
 +match, and we don't need to search for it byte-by-byte anymore.  The table
 +is continually updated when we move toward to the end of the file.
 +
 +That didn't give much of an improvement, but then I increased the table to
 +256*256 entries, making it possible to locate the latest occurrence of any
 +byte -pair- instead.  The table indexed with the byte values and the table
 +contents directly gives the position in file where these two bytes were
 +last seen.  Because the shortest possible string that would offer any
 +compression (for my encoding of LZ77) is two bytes long, this byte-pair
 +history is very suitable indeed.  Also, the first (shortest possible, i.e.
 +2-byte) match is found directly from the byte-pair history.  This gave a
 +moderate 30% decrease in compression time for one of my test files (from 28
 +minutes to 17 minutes on a 25 MHz 68030).
 +
 +The second idea was to quickly discard the strings that had no chance of
 +being longer matches than the one already found.  A one-byte hash value
 +(sort of a checksum here, it is never used to index a hash table in this
 +algorithm, but I rather use "hash value" than "checksum") is calculated
 +from each three bytes of data.  The values are calculated once and put into
 +a table, so we only need two memory fetches to know if two 3-byte strings
 +are different.  If the hash values are different, at least one of the data
 +bytes differ.  If the hash values are equal, we have to compare the
 +original bytes.  The hash values of the strategic positions of the strings
 +to compare are then ..  compared.  This strategic position is the location
 +two bytes earlier than the longest match so far.  If the hash values
 +differ, there is no chance that the match is longer than the current one.
 +It may be not even be as long, because one of the two earlier bytes may be
 +different.  If the hash values are equal, the brute-force byte-by-byte
 +compare has to be done.  However, the hash value check already discards a
 +huge number of candidates and more than generously pays back its own memory
 +references.  Using the hash values the compression time shortens by 50%
 +(from 17 minutes to 8 minutes).
 +
 +Okay, the byte-pair table tells us where the latest occurrence of any byte
 +pair is located.  Still, for the latest occurrence before -that- one we
 +have to do a brute force search.  The next improvement was to use the
 +byte-pair table to generate a linked list of the byte pairs with the same
 +value.  In fact, this linked list can be trivially represented as a table,
 +using the same indexing as the file positions.  To locate the previous
 +occurrence of a 2-byte string starting at location P, look at backSkip[P].
 +
 + /* Update the two-byte history & backSkip */
 + if(P+1<inlen)
 + {
 +     int index = (indata[P]<<8) | indata[P+1];
 +
 +     backSkip[P] = lastPair[index];
 +     lastPair[index] = P+1;
 + }
 +
 +Actually the values in the table are one bigger than the real table
 +indices.  This is because the values are of type unsigned short (can only
 +represent non-negative values), and I wanted zero to mean "not occurred".
 +
 +This table makes the search of the next (previous) location to consider
 +much faster, because it is a single table reference.  The compression time
 +was reduced from 6 minutes to 1 minute 10 seconds.  Quite an improvement
 +from the original 28 minutes!
 +
 +     backSkip[]   lastPair[]
 + ___  _______  ____
 +    \/       \/    \
 + ...JOVE.....JOKA..JOKER
 +    ^        ^     ^
 +    |        |     |
 +    next         position
 +             current match (3)
 +    C        B     A
 +
 +In this example we are looking at the string "JOKER" at location A.  Using
 +the lastPair[] table (with the index "JO", the byte values at the current
 +location A) we can jump directly to the latest match at B, which is "JO", 2
 +bytes long.  The hash values for the string at B ("JOK") and at A ("JOK")
 +are compared.  Because they are equal, we have a potential longer match (3
 +bytes), and the strings "JOKE.." and "JOKA.." are compared.  A match of
 +length 3 is found (the 4th byte differs).  The backSkip[] table with the
 +index B gives the previous location where the 2-byte string "JO" can be
 +found, i.e.  C.  The hash value for the strategic position of the string in
 +the current position A ("OKE") is then compared to the hash value of the
 +corresponding position in the next potential match starting at C ("OVE").
 +They don't match, so the string starting at C ("JOVE..") can't include a
 +longer match than the current longest match at B.
 +
 +There is also another trick that takes advantage of the already determined
 +RLE lengths.  If the RLE lengths for the positions to compare don't match,
 +we can directly skip to the next potential match.  Note that the RLE bytes
 +(the data bytes) are the same, and need not be compared, because the first
 +byte (two bytes) are always equal on both positions (our backSkip[] table
 +guarantees that).  The RLE length value can also be used to skip the start
 +of the strings when comparing them.
 +
 +Another improvement to the search code made it dramatically faster than
 +before on highly redundant files (such as pic from the Calgary Corpus
 +Suite, which was the Achilles' heel until then).  Basically the new search
 +method just skips over the RLE part (if any) in the search position and then
 +checks if the located position has equal number (and value) of RLE bytes
 +before it.
 +
 +backSkip[]      lastPair[]
 +     _____  ________
 +          \/        \
 +       ...AB.....A..ABCD    rle[p] # of A's, B is something else
 +          ^      ^  ^
 +          |      |  |
 +          i      p  p+rle[p]-1
 +
 +The algorithm searches for a two-byte string which starts at p + rle[p]-1,
 +i.e.  the last rle byte ('A') and the non-matching one ('B').  When it
 +finds such location (simple lastPair[] or backSkip[] lookup), it checks if
 +the rle in the compare position (i-(rle[p]-1)) is long enough (i.e.  the
 +same number of A's before the B in both places).  If there are, the normal
 +hash value check is performed on the strings and if it succeeds, the
 +brute-force byte-compare is done.
 +
 +The rationale behind this idea is quite simple.  There are dramatically
 +less matches for "AB" than for "AA", so we get a huge speedup with this
 +approach.  We are still guaranteed to find the most recent longest match
 +there is.
 +
 +Note that a compression method similar to RLE can be realized using just
 +LZ77.  You just emit the first byte as a literal byte, and output a LZ77
 +code with offset 1 and the original RLE length minus 1.  You can thus
 +consider RLE as a special case, which offers tighter encoding of the
 +necessary information.  Also, as my LZ77 limits the copy size to 64/128/256
 +bytes, a RLE version providing lengths up to 32 kilobytes is a big
 +improvement, even if the code for it is somewhat longer.
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +The Decompression Routine
 +-------------------------
 +
 +Any lossless compression program is totally useless unless there exists a
 +decompression program which takes in the compressed file and -- using only
 +that information -- generates the original file exactly.  In this case the
 +decompression program must run on C64's 6510 microprocessor, which had its
 +impact on the algorithm development also.  Regardless of the algorithm,
 +there are several requirements that the decompression code must satisfy:
 + 1. Correctness - the decompression must behave accurately to
 +    guarantee lossless decompression
 + 2. Memory usage - the less memory is used the better
 + 3. Speed - fast decompression is preferred to slower one
 +
 +The latter two requirements can be and are complementary.  A somewhat
 +faster decompression for the same algorithm is possible if more memory can
 +be used (although in this case the difference is quite small).  In any case
 +the correctness of the result is the most important thing.
 +
 +A short pseudo-code of the decompression algorithm follows before I go to
 +the actual C64 decompression code.
 +
 +     copy the decompression code to low memory
 +     copy the compressed data forward in memory so that it isn't
 +       overwritten before we have read it (setup safety & wrap buffers)
 +     setup source and destination pointers
 +     initialize RLE byte code table, the number of escape bits etc.
 +     set initial escape code
 +     do forever
 +         get the number of escape bits "bits"
 +         if "bits" do not match with the escape code
 +             read more bits to complete a byte and output it
 +         else
 +             get Elias Gamma Code "value" and add 1 to it
 +             if "value" is 2
 +                 get 1 bit
 +                 if bit is 0
 +                     it is 2-byte LZ77
 +                     get 8 bits for "offset"
 +                     copy 2 bytes from "offset" bytes before current
 +                         output position into current output position
 +                 else
 +                     get 1 bit
 +                     if bit is 0
 +                         it is an escaped literal byte
 +                         get new escape code
 +                         get more bits to complete a byte with the
 +                             current escape code and output it
 +                         use the new escape code
 +                     else
 +                         it is RLE
 +                         get Elias Gamma Code "length"
 +                         if "length" larger or equal than half the maximum
 +                             it is long RLE
 +                             get more bits to complete a byte "lo"
 +                             get Elias Gamma Code "hi", subtract 1
 +                             combine "lo" and "hi" into "length"
 +                         endif
 +                         get Elias Gamma Code "index"
 +                         if "index" is larger than 31
 +                             get 3 more bits to complete "byte"
 +                         else
 +                             get "byte" from RLE byte code table from
 +                                 index "index"
 +                         endif
 +                         copy "byte" to the output "length" times
 +                     endif
 +                 endif
 +             else
 +                 it is LZ77
 +                 get Elias Gamma Code "hi" and subtract 1 from it
 +                 if "hi" is the maximum value - 1
 +                     end decompression and start program
 +                 endif
 +                 get 8..12 bits "lo" (depending on settings)
 +                 combine "hi" and "lo" into "offset"
 +                 copy "value" number of bytes from "offset" bytes before
 +                     current output position into current output position
 +             endif
 +         endif
 +     end do
 +
 +The following routine is the pucrunch decompression code.  The code runs on
 +the C64 or C128's C64-mode and a modified version is used for Vic20 and
 +C16/Plus4.  It can be compiled by at least DASM V2.12.04.  Note that the
 +compressor automatically attaches this code to the packet and sets the
 +different parameters to match the compressed data.  I will insert
 +additional commentary between strategic code points in addition to the
 +comments that are already in the code.
 +
 +Note that at this point it is only possible to make the decompression code
 +shorter by removing features.  At least I think that it is now so.  If I'm
 +wrong, feel free to point it out to me.  Tim Rogers <timr@eurodltd.co.uk>
 +did manage to snip off 2 bytes, thanks!  However, there are some features
 +you may consider unnecessary.  The code can be shortened by:
 +  * No basic end address set: 8 bytes
 +  * No 2 MHz mode set/reset: 6 bytes
 +  * No wrap option: 12 bytes
 +
 +Actually, if the wrap option is not used, the compressor automatically
 +selects the shorter decompression code (only for the C64 version).
 +
 +        processor 6502
 +
 +BASEND  EQU $2d         ; start of basic variables (updated at EOF)
 +LZPOS   EQU $2d         ; temporary, BASEND *MUST* *BE* *UPDATED* at EOF
 +
 +bitstr  EQU $f7         ; Hint the value beforehand
 +xstore  EQU $c3         ; tape load temp
 +
 +WRAPBUF EQU $004b       ; 'wrap' buffer, 22 bytes ($02a7 for 89 bytes)
 +
 +        ORG $0801
 +        DC.B $0b,8,$ef,       ; '239 SYS2061'
 +        DC.B $9e,$32,$30,$36
 +        DC.B $31,0,0,0
 +
 +        sei             ; disable interrupts
 +        inc $d030       ; or "bit $d030" if 2MHz mode is not enabled
 +        inc 1           ; Select ALL-RAM configuration
 +
 +        ldx #0          ;** parameter - # of overlap bytes-1 off $ffff
 +overlap lda $aaaa,    ;** parameter start of off-end bytes
 +        sta WRAPBUF,  ; Copy to wrap/safety buffer
 +        dex
 +        bpl overlap
 +
 +        ldx #block200-end-block200+1    ; $54   ($59 max)
 +packlp  lda block200-1,x
 +        sta block200--1,x
 +        dex
 +        bne packlp
 +
 +        ldx #block-stack-end-block-stack+1      ; $b3   (stack! ~$e8 max)
 +packlp2 lda block-stack-1,x
 +        dc.b $9d                ; sta $nnnn,x
 +        dc.w block-stack--1     ; (ZP addressing only addresses ZP!)
 +        dex
 +        bne packlp2
 +
 +        ldy #$aa        ;** parameter SIZE high + 1 (max 255 extra bytes)
 +cploop  dex             ; ldx #$ff on the first round
 +        lda $aaaa,    ;** parameter DATAEND-0x100
 +        sta $ff00,    ;** parameter ORIG LEN-0x100+ reserved bytes
 +        txa             ;cpx #0
 +        bne cploop
 +        dec cploop+6
 +        dec cploop+3
 +        dey
 +        bne cploop
 +        jmp main
 +
 +The first part of the code contains a sys command for the basic
 +interpreter, two loops that copy the decompression code to zeropage/stack
 +($f7-$1aa) and to the system input buffer ($200-$253).  The latter code
 +segment contains byte, bit and Gamma Code input routines and the RLE byte
 +code table, the former code segment contains the rest.
 +
 +This code also copies the compressed data forward in memory so that it
 +won't be overwritten by the decompressed data before we have had a change
 +to read it.  The decompression starts at the beginning and proceeds upwards
 +in both the compressed and decompressed data.  A safety area is calculated
 +by the compression routine.  It finds out how many bytes we need for
 +temporary data expansion, i.e.  for escaped bytes.  The wrap buffer is used
 +for files that extend upto the end of memory, and would otherwise overwrite
 +the compressed data with decompressed data before it has been read.
 +
 +This code fragment is not used during the decompression itself.  In fact
 +the code will normally be overwritten when the actual decompression starts.
 +
 +The very start of the next code block is located inside the zero page and
 +the rest fills the lowest portion of the microprocessor stack.  The zero
 +page is used to make the references to different variables shorter and
 +faster.  Also, the variables don't take extra code to initialize, because
 +they are copied with the same copy loop as the rest of the code.
 +
 +
 +block-stack
 +#rorg $f7       ; $f7 - ~$1e0
 +block-stack-
 +
 +bitstr  dc.b $80        ; ZP    $80 == Empty
 +esc     dc.b $00        ; ** parameter (saves a byte when here)
 +
 +OUTPOS = *+1            ; ZP
 +putch   sta $aaaa       ; ** parameter
 +        inc OUTPOS      ; ZP
 +        bne 0$          ; Note: beq 0$; rts; 0$: inc OUTPOS+1;rts would be
 +; $0100                 ;       faster, but 1 byte longer
 +        inc OUTPOS+1    ; ZP
 +0$      rts
 +
 +putch is the subroutine that is used to output the decompressed bytes.  In
 +this case the bytes are written to memory.  Because the subroutine call
 +itself takes 12 cycles (6 for jsr and another 6 for rts), and the routine
 +is called a lot of times during the decompression, the routine itself
 +should be as fast as possible.  This is achieved by removing the need to
 +save any registers.  This is done by using an absolute addressing mode
 +instead of indirect indexed or absolute indexed addressing (sta $aaaa
 +instead of sta ($zz),y or sta $aa00,y).  With indexed addressing you would
 +need to save+clear+restore the index register value in the routine.
 +
 +Further improvement in code size and execution speed is done by storing the
 +instruction that does the absolute addressing to zero page.  When the
 +memory address is incremented we can use zero-page addressing for it too.
 +On the other hand, the most time is spent in the bit input routine so
 +further optimization of this routine is not feasible.
 +
 +
 +newesc  ldy esc         ; remember the old code (top bits for escaped byte)
 +        ldx #2          ; ** PARAMETER
 +        jsr getchkf     ; get & save the new escape code
 +        sta esc
 +        tya             ; pre-set the bits
 +        ; Fall through and get the rest of the bits.
 +noesc   ldx #6          ; ** PARAMETER
 +        jsr getchkf
 +        jsr putch       ; output the escaped/normal byte
 +        ; Fall through and check the escape bits again
 +main    ldy #0          ; Reset to a defined state
 +        tya             ; A = 0
 +        ldx #2          ; ** PARAMETER
 +        jsr getchkf     ; X=2 -> X=0
 +        cmp esc
 +        bne noesc       ; Not the escape code -> get the rest of the byte
 +        ; Fall through to packed code
 +
 +The decompression code is first entered in main.  It first clears the
 +accumulator and the Y register and then gets the escape bits (if any are
 +used) from the input stream.  If they don't match with the current escape
 +code, we get more bits to complete a byte and then output the result.  If
 +the escape bits match, we have to do further checks to see what to do.
 +
 +        jsr getval      ; X = 0
 +        sta xstore      ; save the length for a later time
 +        cmp #1          ; LEN == 2 ?
 +        bne lz77        ; LEN != 2      -> LZ77
 +        tya             ; A = 0
 +        jsr get1bit     ; X = 0
 +        lsr             ; bit -> C, A = 0
 +        bcc lz77-2      ; A=0 -> LZPOS+1
 +        ;***FALL THRU***
 +
 +We first get the Elias Gamma Code value (or actually my independently
 +developed version).  If it says the LZ77 match length is greater than 2, it
 +means a LZ77 code and we jump to the proper routine.  Remember that the
 +lengths are decremented before encoding, so the code value 1 means the
 +length is 2.  If the length is two, we get a bit to decide if we have LZ77
 +or something else.  We have to clear the accumulator, because get1bit does
 +not do that automatically.
 +
 +If the bit we got (shifted to carry to clear the accumulator) was zero, it
 +is LZ77 with an 8-bit offset.  If the bit was one, we get another bit which
 +decides between RLE and an escaped byte.  A zero-bit means an escaped byte
 +and the routine that is called also changes the escape bits to a new value.
 +A one-bit means either a short or long RLE.
 +
 +        ; e..e01
 +        jsr get1bit     ; X = 0
 +        lsr             ; bit -> C, A = 0
 +        bcc newesc      ; e..e010
 +        ;***FALL THRU***
 +
 +        ; e..e011
 +srle    iny             ; Y is 1 bigger than MSB loops
 +        jsr getval      ; Y is 1, get len, X = 0
 +        sta xstore      ; Save length LSB
 +        cmp #64         ; ** PARAMETER 63-64 -> C clear, 64-64 -> C set..
 +        bcc chrcode     ; short RLE, get bytecode
 +
 +longrle ldx #2          ; ** PARAMETER  111111xxxxxx
 +        jsr getbits     ; get 3/2/1 more bits to get a full byte, X = 0
 +        sta xstore      ; Save length LSB
 +
 +        jsr getval      ; length MSB, X = 0
 +        tay             ; Y is 1 bigger than MSB loops
 +
 +The short RLE only uses half (or actually 1 value less than a half) of the
 +gamma code range.  Larger values switches us into long RLE mode.  Because
 +there are several values, we already know some bits of the length value.
 +Depending on the gamma code maximum value we need to get from one to three
 +bits more to assemble a full byte, which is then used as the less
 +significant part for the run length count.  The upper part is encoded using
 +the same gamma code we are using everywhere.  This limits the run length to
 +16 kilobytes for the smallest maximum value (-m5) and to the full 64
 +kilobytes for the largest value (-m7).
 +
 +Additional compression for RLE is gained using a table for the 31
 +top-ranking RLE bytes.  We get an index from the input.  If it is from 1 to
 +31, we use it to index the table.  If the value is larger, the lower 5 bits
 +of the value gives us the 5 most significant bits of the byte to repeat.
 +In this case we read 3 additional bits to complete the byte.
 +
 +
 +chrcode jsr getval      ; Byte Code, X = 0
 +        tax             ; this is executed most of the time anyway
 +        lda table-1,  ; Saves one jump if done here (loses one txa)
 +
 +        cpx #32         ; 31-32 -> C clear, 32-32 -> C set..
 +        bcc 1$          ; 1..31 -> the byte to repeat is in A
 +
 +        ; Not ranks 1..31, -> 111110xxxxx (32..64), get byte..
 +        txa             ; get back the value (5 valid bits)
 +        jsr get3bit     ; get 3 more bits to get a full byte, X = 0
 +
 +1$      ldx xstore      ; get length LSB
 +        inx             ; adjust for cpx#$ff;bne -> bne
 +dorle   jsr putch
 +        dex
 +        bne dorle       ; xstore 0..255 -> 1..256
 +        deym
 +        bne dorle       ; Y was 1 bigger than wanted originally
 +mainbeq beq main        ; reverse condition -> jump always
 +
 +After deciding the repeat count and decoding the value to repeat we simply
 +have to output the value enough times.  The X register holds the lower part
 +and the Y register holds the upper part of the count.  The X register value
 +is first incremented by one to change the code sequence dex ; cpx #$ff ;
 +bne dorle into simply dex ; bne dorle.  This may seem strange, but it saves
 +one byte in the decompression code and two clock cycles for each byte that
 +is outputted.  It's almost a ten percent improvement.  :-)
 +
 +The next code fragment is the LZ77 decode routine and it is used in the
 +file parts that do not have equal byte runs (and even in some that have).
 +The routine simply gets an offset value and copies a sequence of bytes from
 +the already decompressed portion to the current output position.
 +
 +
 +lz77    jsr getval      ; X=0 -> X=0
 +        cmp #127        ; ** PARAMETER  Clears carry (is maximum value)
 +        beq eof         ; EOF
 +
 +        sbc #0          ; C is clear -> subtract 1  (1..126 -> 0..125)
 +        ldx #0          ; ** PARAMETER (more bits to get)
 +        jsr getchkf     ; clears Carry, X=0 -> X=0
 +
 +lz77-2  sta LZPOS+1     ; offset MSB
 +        ldx #8
 +        jsr getbits     ; clears Carry, X=8 -> X=0
 +                        ; Note: Already eor:ed in the compressor..
 +        ;eor #255       ; offset LSB 2's complement -1 (i.e. -X = ~X+1)
 +        adc OUTPOS      ; -offset -1 + curpos (C is clear)
 +        sta LZPOS
 +
 +        lda OUTPOS+1
 +        sbc LZPOS+1     ; takes C into account
 +        sta LZPOS+1     ; copy X+1 number of chars from LZPOS to OUTPOS
 +        ;ldy #0         ; Y was 0 originally, we don't change it
 +
 +        ldx xstore      ; LZLEN
 +        inx             ; adjust for cpx#$ff;bne -> bne
 +lzloop  lda (LZPOS),y
 +        jsr putch
 +        iny             ; Y does not wrap because X=0..255 and Y initially 0
 +        dex
 +        bne lzloop      ; X loops, (256,1..255)
 +        beq mainbeq     ; jump through another beq (-1 byte, +3 cycles)
 +
 +There are two entry-points to the LZ77 decode routine.  The first one
 +(lz77) is for copy lengths bigger than 2.  The second entry point (lz77-2)
 +is for the length of 2 (8-bit offset value).
 +
 +
 +        ; EOF
 +eof     lda #$37        ; ** could be a PARAMETER
 +        sta 1
 +        dec $d030       ; or "bit $d030" if 2MHz mode is not enabled
 +        lda OUTPOS      ; Set the basic prg end address
 +        sta BASEND
 +        lda OUTPOS+1
 +        sta BASEND+1
 +        cli             ; ** could be a PARAMETER
 +        jmp $aaaa       ; ** PARAMETER
 +#rend
 +block-stack-end
 +
 +Some kind of a end of file marker is necessary for all variable-length
 +codes.  Otherwise we could not be certain when to stop decoding.  Sometimes
 +the byte count of the original file is used instead, but here a special EOF
 +condition is more convenient.  If the high part of a LZ77 offset is the
 +maximum gamma code value, we have reached the end of file and must stop
 +decoding.  The end of file code turns on BASIC and KERNEL, turns off 2 MHz
 +mode (for C128) and updates the basic end addresses before allowing
 +interrupts and jumping to the program start address.
 +
 +The next code fragment is put into the system input buffer.  The routines
 +are for getting bits from the encoded message (getbits) and decoding the
 +Elias Gamma Code (getval).  The table at the end contains the ranked RLE
 +bytes.  The compressor automatically decreases the table size if not all of
 +the values are used.
 +
 +
 +block200
 +#rorg   $200    ; $200-$258
 +block200-
 +
 +getnew  pha             ; 1 Byte/3 cycles
 +INPOS = *+1
 +        lda $aaaa       ;** parameter
 +        rol             ; Shift in C=1 (last bit marker)
 +        sta bitstr      ; bitstr initial value = $80 == empty
 +        inc INPOS       ; Does not change C!
 +        bne 0$
 +        inc INPOS+1     ; Does not change C!
 +        bne 0$
 +        ; This code does not change C!
 +        lda #WRAPBUF    ; Wrap from $ffff->$0000 -> WRAPBUF
 +        sta INPOS
 +0$      pla             ; 1 Byte/4 cycles
 +        rts
 +
 +
 +; getval : Gets a 'static huffman coded' value
 +; ** Scratches X, returns the value in A **
 +getval  inx             ; X must be 0 when called!
 +        txa             ; set the top bit (value is 1..255)
 +0$      asl bitstr
 +        bne 1$
 +        jsr getnew
 +1$      bcc getchk      ; got 0-bit
 +        inx
 +        cpx #7          ; ** parameter
 +        bne 0$
 +        beq getchk      ; inverse condition -> jump always
 +
 +; getbits: Gets X bits from the stream
 +; ** Scratches X, returns the value in A **
 +get1bit inx             ;2
 +getbits asl bitstr
 +        bne 1$
 +        jsr getnew
 +1$      rol             ;2
 +getchk  dex             ;             more bits to get ?
 +getchkf bne getbits     ;2/3
 +        clc             ;             return carry cleared
 +        rts             ;6+6
 +
 +
 +table   dc.b 0,0,0,0,0,0,0
 +        dc.b 0,0,0,0,0,0,0,0
 +        dc.b 0,0,0,0,0,0,0,0
 +        dc.b 0,0,0,0,0,0,0,0
 +
 +#rend
 +block200-end
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Target Application Compression Tests
 +------------------------------------
 +
 +The following data compression tests are made on my four C64 test files:
 +   bs.bin is a demo part, about 50% code and 50% graphics data
 +   delenn.bin is a BFLI picture with a viewer, a lot of dithering
 +   sheridan.bin is a BFLI picture with a viewer, dithering, black areas
 +   ivanova.bin is a BFLI picture with a viewer, dithering, larger black areas
 +
 +   Packer                 Size     Left    Comment
 +   ===============================================
 +   bs.bin                 41537
 +   -----------------------------------------------
 +   ByteBonker 1.5         27326   65.8%    Mode 4
 +   Cruelcrunch 2.2        27136   65.3%    Mode 1
 +   The AB Cruncher        27020   65.1%
 +   ByteBoiler (REU)       26745   64.4%
 +   RLE + ByteBoiler (REU) 26654   64.2%
 +   PuCrunch               26415   63.6%    -m5
 +   ===============================================
 +   delenn.bin             47105
 +   -----------------------------------------------
 +   The AB Cruncher        N/A       N/   Crashes
 +   ByteBonker 1.5         21029   44.6%    Mode 3
 +   Cruelcrunch 2.2        20672   43.9%    Mode 1
 +   ByteBoiler (REU)       20371   43.2%
 +   RLE + ByteBoiler (REU) 19838   42.1%
 +   PuCrunch               19734   41.9%    -p2
 +   ===============================================
 +   sheridan.bin           47105
 +   -----------------------------------------------
 +   ByteBonker 1.5         13661   29.0%    Mode 3
 +   Cruelcrunch 2.2        13595   28.9%    Mode H
 +   The AB Cruncher        13534   28.7%
 +   ByteBoiler (REU)       13308   28.3%
 +   PuCrunch               12526   26.6%    -p2
 +   RLE + ByteBoiler (REU) 12478   26.5%
 +   ===============================================
 +   ivanova.bin            47105
 +   -----------------------------------------------
 +   ByteBonker 1.5         11016   23.4%    Mode 1
 +   Cruelcrunch 2.2        10883   23.1%    Mode H
 +   The AB Cruncher        10743   22.8%
 +   ByteBoiler (REU)       10550   22.4%
 +   PuCrunch                9844   20.9%    -p2
 +   RLE + ByteBoiler (REU)  9813   20.8%
 +   LhA                     9543   20.3%    Decompressor not included
 +   gzip -9                 9474   20.1%    Decompressor not included
 +   -----------------------------------------------
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Calgary Corpus Suite
 +--------------------
 +
 +The original compressor only allows files upto 63 kB.  To be able to
 +compare my algorithm to others I modified the compressor to allow bigger
 +files.  I then got some reference results using the Calgary Corpus test
 +suite.
 +
 +Note that the decompression code is included in the compressed files,
 +although it is not valid for files over 63k (compressed or uncompressed
 +size).  About 34 bytes are decompression parameters, the rest (approx.  300
 +bytes) is 6510 machine language.  Kolmogorov complexity, anyone ?:-)
 +
 +To tell you the truth, the results surprised me, because the compression
 +algorithm -IS- developed for a very special case in mind.  It only has a
 +fixed code for LZ77/RLE lengths, not even a static one (fixed != static !=
 +adaptive)!  Also, it does not use arithmetic code (or Huffman) to compress
 +the literal bytes.  Because most of the big files are ASCII text, this
 +somewhat handicaps my compressor, although the new tagging system is very
 +happy with 7-bit ASCII input.  Also, decompression is relatively fast, and
 +uses no extra memory.
 +
 +I'm getting relatively near LhA, and shorter than LhA for 8 files (300-byte
 +decompressor included!), and relatively near or shorter than LhA in other
 +cases if the decompressor is removed.
 +
 +The table contains the file name (file), compression options (options), the
 +original file size (in) and the compressed file size (out) in bytes,
 +average number of bits used to encode one byte (b/B), remaining size
 +(ratio) and the reduction (gained), and the time used for compression.  For
 +comparison, the last three columns show the compressed sizes for LhA, Zip
 +and GZip (with the -9 option), respectively.
 +
 +FreeBSD epsilon3.vlsi.fi PentiumPro® 200MHz
 +Estimated decompression on a C64 (1MHz 6510) 6:47       LhA    Zip GZip-9
 +file   options    in     out  b/B  ratio gained time    out    out    out
 +=========================================================================
 +bib    -p4    111261   35457 2.55 31.87% 68.13%  8.3  40740  35041  34900
 +book1  -p4    768771  318919 3.32 41.49% 58.51% 65.1 339074 313352 312281
 +book2  -p4    610856  208627 2.74 34.16% 65.84% 43.5 228442 206663 206158
 +geo    -p2    102400   72812 5.69 71.11% 28.89% 11.4  68574  68471  68414
 +news   -p3    377109  144566 3.07 38.34% 61.66% 15.2 155084 144817 144400
 +obj1   -m6     21504   10750 4.00 50.00% 50.00%  0.1  10310  10300  10320
 +obj2          246814   83046 2.70 33.65% 66.35% 13.5  84981  81608  81087
 +paper1 -p2     53161   19536 2.94 36.75% 63.25%  1.5  19676  18552  18543
 +paper2 -p3     82199   30676 2.99 37.32% 62.68%  4.3  32096  29728  29667
 +paper3 -p2     46526   19234 3.31 41.35% 58.65%  1.4  18949  18072  18074
 +paper4 -p1 -m5 13286    6095 3.68 45.88% 54.12%  0.2   5558   5511   5534
 +paper5 -p1 -m5 11954    5494 3.68 45.96% 54.04%  0.1   4990   4970   4995
 +paper6 -p2     38105   14159 2.98 37.16% 62.84%  0.8  13814  13207  13213
 +pic    -p1    513216   57835 0.91 11.27% 88.73% 23.2  52221  56420  52381
 +progc  -p1     39611   14221 2.88 35.91% 64.09%  0.7  13941  13251  13261
 +progl  -p1     71646   17038 1.91 23.79% 76.21%  3.8  16914  16249  16164
 +progp          49379   11820 1.92 23.94% 76.06%  1.3  11507  11222  11186
 +trans  -p2     93695   19511 1.67 20.83% 79.17%  3.7  22578  18961  18862
 +-------------------------------------------------------------------------
 +total        3251493 1089796 2.68 33.52% 66.48% 3:18
 +
 +
 +Canterbury Corpus Suite
 +-----------------------
 +
 +The following shows the results on the Canterbury corpus.  Again, I am
 +quite pleased with the results.  For example, pucrunch beats GZip -9 for
 +lcet10.txt if you remove the decompression code.
 +
 +FreeBSD epsilon3.vlsi.fi PentiumPro® 200MHz
 +Estimated decompression on a C64 (1MHz 6510) 6:00        LhA    Zip GZip-9
 +file        opt     in    out  b/B  ratio gained time    out    out    out
 +==========================================================================
 +alice29.txt -p4 152089  55103 2.90 36.24% 63.76% 11.3  59160  54525  54191
 +ptt5        -p1 513216  57835 0.91 11.27% 88.73% 23.2  52272  56526  52382
 +fields.c         11150   3505 2.52 31.44% 68.56%  0.1   3180   3230   3136
 +kennedy.xls    1029744 265887 2.07 25.83% 74.17%  571 198354 206869 209733
 +sum              38240  13334 2.79 34.87% 65.13%  0.6  14016  13006  12772
 +lcet10.txt  -p4 426754 144585 2.72 33.89% 66.11% 30.8 159689 144974 144429
 +plrabn12.txt-p4 481861 199134 3.31 41.33% 58.67% 43.6 210132 195299 194277
 +cp.html     -p1  24603   8679 2.83 35.28% 64.72%  0.4   8402   8085   7981
 +grammar.lsp -m5   3721   1591 3.43 42.76% 57.24%  0.0   1280   1336   1246
 +xargs.1     -m5   4227   2117 4.01 50.09% 49.91%  0.0   1790   1842   1756
 +asyoulik.txt-p4 125179  50594 3.24 40.42% 59.58%  7.5  52377  49042  48829
 +--------------------------------------------------------------------------
 +total          2810784 802364 2.28 28.55% 71.45% 11:29
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Conclusions
 +-----------
 +
 +In this article I have presented a compression program which creates
 +compressed executable files for C64, VIC20 and Plus4/C16.  The compression
 +can be performed on Amiga, MS-DOS/Win machine or any other machine with a
 +C-compiler.  A powerful machine allows asymmetric compression:  a lot of
 +resources can be used to compress the data while needing minimal resources
 +for decompression. This was one of the design requirements.
 +
 +Two original ideas were presented:  a new literal byte tagging system and
 +an algorithm using hybrid RLE and LZ77.  Also, a detailed explanation of
 +the LZ77 string match routine and the optima parsing scheme was presented.
 +
 +The compression ratio and decompression speed is comparable to other
 +compression programs for Commodore 8-bit computers.
 +
 +But what are then the real advantages of pucrunch compared to traditional
 +C64 compression programs in addition to that you can now compress VIC20 and
 +Plus4/C16 programs?  Because I'm lousy at praising my own work, I let you
 +see some actual user comments.  I have edited the correspondence a little,
 +but I hope he doesn't mind.  My comments are marked with an asterisk.
 +Maybe Steve has something to add also?
 +
 +
 +---8<----8<----8<----8<----8<----8<----8<----8<----8<----8<----8<----8<---
 +
 +A big advantage is that pucrunch does RLE and LZ in one pass.  For demos I
 +only used a cruncher and did my own RLE routines as it is somewhat annoying
 +to use an external program for this.  These programs require some memory
 +and ZP-addresses like the cruncher does.  So it can easily happen that the
 +decruncher or depacker interfere with your demo-part, if you didn't know
 +what memory is used by the depacker.  At least you have more restrictions
 +to care about.  With pucrunch you can do RLE and LZ without having too much
 +of these restrictions.
 +
 +* Right, and because pucrunch is designed that way from the start, it can
 +* get better results with one-pass RLE and LZ than doing them separately.
 +* On the other hand it more or less requires that you _don't_ RLE-pack the
 +* file first..
 +
 +This is true, we also found that out.  We did a part for our demo which had
 +some tables using only the low-nybble.  Also the bitmap had to be filled
 +with a specific pattern.  We did some small routines to shorten the part,
 +but as we tried pucrunch, this became obsolete.  From 59xxx bytes to 12xxx
 +or 50 blocks, with our own RLE and a different cruncher we got 60 blks!
 +Not bad at all ;)
 +
 +Not to mention that you have the complete and commented source-code for the
 +decruncher, so that you can easily change it to your own needs.  And it's
 +not only very flexible, it is also very powerful.  In general pucrunch does
 +a better job than ByteBoiler+Sledgehammer.
 +
 +In addition to that pucrunch is of course much faster than crunchers on my
 +C64, this has not only to do with my 486/66 and the use of an HDD.  See, I
 +use a cross-assembler-system, and with pucrunch I don't have to transfer
 +the assembled code to my 64, crunch it, and transfer it back to my pc.
 +Now, it's just a simple command-line and here we go...  And not only I can
 +do this, my friend who has an amiga uses pucrunch as well.  This is the
 +first time we use the same cruncher, since I used to take ByteBoiler, but
 +my friend didn't have a REU so he had to try another cruncher.
 +
 +So, if I try to make a conclusion:  It's fast, powerful and extremly
 +flexible (thanks to the source-code).
 +
 +---8<----8<----8<----8<----8<----8<----8<----8<----8<----8<----8<----8<---
 +
 +Just for your info...
 +
 +We won the demo-competition at the Interjam'98 and everything that was
 +crunched ran through the hands of pucrunch...  Of course, you have been
 +mentioned in the credits.  If you want to take a look, search for
 +KNOOPS/DREAMS, which should be on the ftp-servers in some time.
 +So, again, THANKS!  :)
 +
 +       Ninja/DREAMS
 +
 +---8<----8<----8<----8<----8<----8<----8<----8<----8<----8<----8<----8<---
 +
 +
 +So, what can I possibly hope to add to that, right?:-)
 +
 +If you have any comments, questions, article suggestions or just a general
 +hello brewing in your mind, send me mail or visit my homepage.
 +
 +See you all again in the next issue!
 +
 +-Pasi
 +
 +
 +--------------------------------------------------------------------------
 +
 +
 +Appendix: The Log Book
 +----------------------
 +
 +5.3.1997
 +       Tried reverse LZ, i.e.  mirrored history buffer.  Gained some
 +       bytes, but its not really worth it, i.e.  the compress time
 +       increases hugely and the decompressor gets bigger.
 +
 +6.3.1997
 +       Tried to have a code to use the last LZ copy position (offset
 +       added to the lastly used LZ copy position).  On bs.run I gained
 +       57 bytes, but in fact the net gain was only 2 bytes
 +       (decompressor becomes ~25 bytes longer, and the lengthening of
 +       the long rle codes takes away the rest 30).
 +
 +10.3.1997
 +       Discovered that my representation of integers 1-63 is in fact
 +       an Elias Gamma Code.  Tried Fibonacci code instead, but it was
 +       much worse (~500 bytes on bs.run, ~300 bytes on delenn.run)
 +       without even counting the expansion of the decompression code.
 +
 +12.3.1997
 +       'huffman' coded RLE byte -> ~70 bytes gain for bs.run.  The RLE
 +       bytes used are ranked, and top 15 are put into a table, which
 +       is indexed by a Elias Gamma Code.  Other RLE bytes get a prefix
 +       "1111".
 +
 +15.3.1997
 +       The number of escape bits used is again selectable.  Using only
 +       one escape bit for delenn.run gains ~150 bytes.  If #-option is
 +       not selected, automatically selects the number of escape bits
 +       (is a bit slow).
 +
 +16.3.1997
 +       Changed some arrays to short.  17 x inlen + 64kB memory used.
 +       opt-escape() only needs two 16-element arrays now and is
 +       slightly faster.
 +
 +31.3.1997
 +       Tried to use BASIC ROM as a codebook, but the results were not
 +       so good.  For mostly-graphics files there are no long matches ->
 +       no net gain, for mostly-code files the file itself gives a
 +       better codebook..  Not to mention that using the BASIC ROM as a
 +       codebook is not 100% compatible.
 +
 +1.4.1997
 +       Tried maxlen 128, but it only gained 17 bytes on ivanova.run,
 +       and lost ~15 byte on bs.run.  This also increased the LZPOS
 +       maximum value from ~16k to ~32k, but it also had little effect.
 +
 +2.4.1997
 +       Changed to coding so that LZ77 has the priority.  2-byte LZ
 +       matches are coded in a special way without big loss in
 +       efficiency, and codes also RLE/Escape.
 +
 +5.4.1997
 +       Tried histogram normalization on LZLEN, but it really did not
 +       gain much of anything, not even counting the mapping table from
 +       index to value that is needed.
 +
 +11.4.1997
 +       8..14 bit LZPOS base part.  Automatic selection.  Some more bytes
 +       are gained if the proper selection is done before the LZ/RLELEN
 +       optimization.  However, it can't really be done automatically
 +       before that, because it is a recursive process and the original
 +       LZ/RLE lengths are lost in the first optimization..
 +
 +22.4.1997
 +       Found a way to speed up the almost pathological cases by using
 +       the RLE table to skip the matching beginnings.
 +
 +2.5.1997
 +       Switched to maximum length of 128 to get better results on the
 +       Calgary Corpus test suite.
 +
 +25.5.1997
 +       Made the maximum length adjustable.  -m5, -m6, and -m7 select
 +       64, 128 and 256 respectively.  The decompression code now allows
 +       escape bits from 0 to 8.
 +
 +1.6.1997
 +       Optimized the escape optimization routine.  It now takes almost
 +       no time at all.  It used a whole lot of time on large escape bit
 +       values before.  The speedup came from a couple of generic data
 +       structure optimizations and loop removals by informal
 +       deductions.
 +
 +3.6.1997
 +       Figured out another, better way to speed up the pathological
 +       cases.  Reduced the run time to a fraction of the original time.
 +       All 64k files are compressed under one minute on my 25 MHz
 +       68030.  pic from the Calgary Corpus Suite is now compressed in
 +       19 seconds instead of 7 minutes (200 MHz Pentium w/ FreeBSD).
 +       Compression of ivanova.run (one of my problem cases) was
 +       reduced from about 15 minutes to 47 seconds.  The compression of
 +       bs.run has been reduced from 28 minutes (the first version) to
 +       24 seconds.  An excellent example of how the changes in the
 +       algorithm level gives the most impressive speedups.
 +
 +6.6.1997
 +       Changed the command line switches to use the standard approach.
 +
 +11.6.1997
 +       Now determines the number of bytes needed for temporary data
 +       expansion (i.e.  escaped bytes).  Warns if there is not enough
 +       memory to allow successful decompression on a C64.
 +
 +       Also, now it's possible to decompress the files compressed with
 +       the program (must be the same version).  (-u)
 +
 +17.6.1997
 +       Only checks the lengths that are power of two's in
 +       OptimizeLength(), because it does not seem to be any (much)
 +       worse than checking every length.  (Smaller than found maximum
 +       lengths are checked because they may result in a shorter file.)
 +       This version (compiled with optimizations on) only spends 27
 +       seconds on ivanova.run.
 +
 +19.6.1997
 +       Removed 4 bytes from the decrunch code (begins to be quite
 +       tight now unless some features are removed) and simultaneously
 +       removed a not-yet-occurred hidden bug.
 +
 +23.6.1997
 +       Checked the theoretical gain from using the lastly outputted
 +       byte (conditional probabilities) to set the probabilities for
 +       normal/LZ77/RLE selection.  The number of bits needed to code
 +       the selection is from 0.0 to 1.58, but even using arithmetic
 +       code to encode it, the original escape system is only 82 bits
 +       worse (ivanova.run), 7881/7963 bits total.  The former figure is
 +       calculated from the entropy, the latter includes
 +       LZ77/RLE/escape select bits and actual escapes.
 +
 +18.7.1997
 +       In LZ77 match we now check if a longer match (further away)
 +       really gains more bits.  Increase in match length can make the
 +       code 2 bits longer.  Increase in match offset can make the code
 +       even longer (2 bits for each magnitude).  Also, if LZPOS low
 +       part is longer than 8, the extra bits make the code longer if
 +       the length becomes longer than two.
 +
 +       ivanova -5 bytes, sheridan -14, delenn -26, bs -29
 +
 +       When generating the output rescans the LZ77 matches.  This is
 +       because the optimization can shorten the matches and a shorter
 +       match may be found much nearer than the original longer match.
 +       Because longer offsets usually use more bits than shorter ones,
 +       we get some bits off for each match of this kind.  Actually, the
 +       rescan should be done in OptimizeLength() to get the most out
 +       of it, but it is too much work right now (and would make the
 +       optimize even slower).
 +
 +29.8.1997
 +       4 bytes removed from the decrunch code.  I have to thank Tim
 +       Rogers (timr@eurodltd.co.uk) for helping with 2 of them.
 +
 +12.9.1997
 +       Because SuperCPU doesn't work correctly with inc/dec $d030, I
 +       made the 2 MHz user-selectable and off by default.  (-f)
 +
 +13.9.1997
 +       Today I found out that most of my fast string matching
 +       algorithm matches the one developed by [Fenwick and Gutmann,
 +       1994]*.  It's quite frustrating to see that you are not a genius
 +       after all and someone else has had the same idea.  :-) However,
 +       using the RLE table to help still seems to be an original idea,
 +       which helps immensely on the worst cases.  I still haven't read
 +       their paper on this, so I'll just have to get it and see..
 +
 +       * [Fenwick and Gutmann, 1994].  P.M.  Fenwick and P.C.  Gutmann,
 +       "Fast LZ77 String Matching", Dept of Computer Science, The
 +       University of Auckland, Tech Report 102, Sep 1994
 +
 +14.9.1997
 +       The new decompression code can decompress files from $258 to
 +       $ffff (or actually all the way upto $1002d :-).  The drawback
 +       is:  the decompression code became 17 bytes longer.  However, the
 +       old decompression code is used if the wrap option is not
 +       needed.
 +
 +16.9.1997
 +       The backSkip table can now be fixed size (64 kWord) instead of
 +       growing enormous for "BIG" files.  Unfortunately, if the
 +       fixed-size table is used, the LZ77 rescan is impractical (well,
 +       just a little slow, as we would need to recreate the backSkip
 +       table again).  On the other hand the rescan did not gain so many
 +       bytes in the first place (percentage).  The define BACKSKIP-FULL
 +       enables the old behavior (default).  Note also, that for smaller
 +       files than 64kB (the primary target files) the default consumes
 +       less memory.
 +
 +       The hash value compare that is used to discard impossible
 +       matches does not help much.  Although it halves the number of
 +       strings to consider (compared to a direct one-byte compare),
 +       speedwise the difference is negligible.  I suppose a mismatch is
 +       found very quickly when the strings are compared starting from
 +       the third charater (the two first characters are equal, because
 +       we have a full hash table).  According to one test file, on
 +       average 3.8 byte-compares are done for each potential match.  A
 +       define HASH-COMPARE enables (default) the hash version of the
 +       compare, in which case "inlen" bytes more memory is used.
 +
 +       After removing the hash compare my algorithm quite closely
 +       follows the [Fenwick and Gutmann, 1994] fast string matching
 +       algorithm (except the RLE trick).  (Although I *still* haven't
 +       read it.)
 +
 +       14 x inlen + 256 kB of memory is used (with no HASH-COMPARE and
 +       without BACKSKIP-FULL).
 +
 +18.9.1997
 +       One byte removed from the decompression code (both versions).
 +
 +30.12.1997
 +       Only records longer matches if they compress better than
 +       shorter ones.  I.e.  a match of length N at offset L can be
 +       better than a match of length N+1 at 4*L.  The old comparison
 +       was "better or equal" (">=").  The new comparison "better" (">")
 +       gives better results on all Calgary Corpus files except "geo",
 +       which loses 101 bytes (0.14% of the compressed size).
 +
 +       An extra check/rescan for 2-byte matches in OptimizeLength()
 +       increased the compression ratio for "geo" considerably, back to
 +       the original and better.  It seems to help for the other files
 +       also.  Unfortunately this only works with the full backskip
 +       table (BACKSKIP-FULL defined).
 +
 +21.2.1998
 +       Compression/Decompression for VIC20 and C16/+4 incorporated
 +       into the same program.
 +
 +16.3.1998
 +       Removed two bytes from the decompression codes.
 +
 +17.8.1998
 +       There was a small bug in pucrunch which caused the location
 +       $2c30 to be decremented (dec $2c30 instead of bit $d030) when
 +       run without the -f option.  The source is fixed and executables
 +       are now updated.
 +
 +--------------------------------------------------------------------------
 +
 +References
 +
 +   1. http://www.cs.tut.fi/~albert/
 +   2. http://www.cs.tut.fi/~albert/Dev/
 +   2. http://www.cs.tut.fi/~albert/Dev/pucrunch/
 +
 +.......
 +....
 +..
 +.                                    C=H #17
 +
 +::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
 +
 +VIC-20 Kernal ROM Disassembly Project
 +Richard Cini
 +
 +Introduction
 + In order to put this project into perspective, a little personal 
 +history is needed. I received my first Commodore as a gift from my parents 
 +back in 1982. I used Commodore PETs in the school's computer lab, and 
 +Radio Shack Model I's in the local R/S store. It was nice to have one 
 +of my own to hack on, though.  Back then, most of my work was with the 
 +built-in BASIC interpreter. My claim to fame (to my family, at least) was 
 +a BASIC/machine language mailing list management program, and an allophone 
 +speech synthesizer hardware-software hack. Both worked well, which surprised
 +my mother, who claims that nothing I ever built worked right.  As I grew-up, 
 +my computer-of-choice changed, but I never lost my love for the VIC. It is 
 +small, easy to program, has a very capable processor (by 1980's standards) 
 +and decent I/O capability. It's peripherals were varied, if not quirky 
 +(take the 1515 printer, for example), but at least everything worked well 
 +together.  
 + Now, fast forward to 1994. Commodore International failed, 
 +crippled by years of a weak product strategy, squandered opportunities 
 +and the market's increased focus on mainstream PC-compatible or Macintosh 
 +machines as productivity tools. After Commodore's failure, I decided that 
 +I wanted to try to purchase the Commodore 8-bit intellectual property, 
 +including the rights to the Kernal and BASIC source code, primarily for 
 +preservation purposes. One of my hobbies is collecting and preserving 
 +obsolete and unsupported computers, accessories, documentation, etc. 
 + Since Commodore's bankruptcy attorney would not return my calls 
 +(no surprise there), I embarked on decompiling the Kernal. This project, 
 +although time consuming and rewarding from an informational perspective 
 +was not truly trail-blazing. Many before me probably decompiled parts of 
 +the Kernal in order to gain some understanding as it related to another 
 +project. However, in my research, I don't recall ever seeing complete 
 +recompileable source code. Memory and ROM maps, yes; source code, no. 
 + Marko Makela manages a great Commodore web site that contains lots 
 +of useful information, including these memory and ROM maps. These provided 
 +the starting point for my work. See http://www.hut.fi/misc/cbm/docs/ for 
 +this and much more information.  What I would like to accomplish in a 
 +series of articles is to explain the process and to discuss specific 
 +Kernal routines that may be of interest to C=Hacking readers. Also, where 
 +appropriate, I will make comparisons with the other Commodore machines 
 +that were the contemporaries of the VIC, the C64 and the PET, specifically. 
 + One might ask, "Why is this project different from all of the other 
 +resources already available?" In short, here's why:
 +
 +1. The end result is a fully modifiable and compilable source file.
 +2. Only the VIC memory map and ROM location map are available 
 + *because* to date everyone has focused on the C64 as it is the 
 + more functional (and hence, more popular) Commodore of the era. 
 + The same goes for the PET, too.
 +3. A far as I know, there was no "Mapping the VIC" written, because 
 + of #2, above.
 +4. Because of #3, the fact that I had some spare time, and that I 
 + love my VIC (although I don't use it as much these days), I felt 
 + that I had to do it.
 +
 +Brief VIC-20 History
 +--------------------
 +Although I'd like to provide a complete history lesson on the VIC-20, many 
 +others before me have done a better job. The March 1985 issue of the 
 +IEEE Spectrum has an article, as does Marko's web site. See 
 +http://www.hut.fi/misc/cbm/docs/peddle.english.html for a great article on 
 +Chuck Peddle, the well-known creator of the 6502 microprocessor. Nonetheless,
 +I will provide a Readers' Digest version of the history of the VIC.
 + In the late-70s, engineers in the Advanced Systems Design Group 
 +(ASDG) at Commodore created a multi-function video/sound interface chip, 
 +the 6560 (a.k.a., the VIC). Al Charpentier ran the LSI section of the ASDG,
 +and was the lead in designing the VIC-I, and later, the VIC-II. The ASDG was
 +the old MOS Semiconductor operation that Commodore bought in the mid-70s.
 +The 6560 supported complete composite color video, 3-voice plus white noise 
 +sound, a volume control, two analog-to-digital converters that supported 
 +the use of a game paddle or joystick, and a light pen interface. 
 +Feature-rich as it was, no manufacturer wanted to commit a product line to 
 +it. Since Commodore could not find anyone to buy the chip, they decided to 
 +build a computer that featured the chip. Hence, the VIC-20 was born. Al'
 +buddy, Bob Yannes, was a senior systems designer at Commodore who developed
 +the VIC-20 (and later, the C64) prototype. The VIC was Commodore's first 
 +color computer, and the first designed for home use.  
 +
 +Relationships with other Commodore Products
 +-------------------------------------------
 + The structure of the VIC-20 ROM parallels those of Commodore'
 +other machines of that era, the PET and the C64. All three machines share 
 +the concept of a standard, public, API accessed through a jump table 
 +located in the last page of the system ROM.
 + There's also another striking similarity, which comes somewhat as 
 +a surprise to this writer, but intuitively makes sense. The C64 and VIC 
 +Kernal ROMs are nearly identically laid-out and contain a lot of common 
 +code. The C64 ROM of course contains certain modifications relating to 
 +its unique hardware and capabilities, but otherwise is the same. Since 
 +the machines are so similar in design (the same engineer designed them),
 +the similarity of the code isn't surprising. This recycling appears to 
 +have been a cost-effective way to develop a new computer in record time. 
 +
 +The Process
 +----------- 
 +I believe that the reverse engineering process for the purpose of creating 
 +source code that produces binary-identical object code, is fairly standard: 
 +know thy hardware, get the object code, turn object code into assembly code, 
 +give everything names, test compile, fix errors, re-compile and call it done.
 +However, I'm certain that C=Hacking readers have reverse engineering methods
 +which differ from mine. I'd be interested in hearing them, as I'm always 
 +looking for a better way to do things.  I started with an image of the ROM 
 +from my VIC (although a ROM image from funet would work) and cranked it 
 +through a disassembler (I used SuperMon). Since I wasn't too up on 
 +transferring data from the VIC to the PC, I used a brute-force method: 
 +scanning disassembler listings into TIFF files and running them through 
 +an OCR program. This produced plain-text files for me to work with.  Then, 
 +I used various available information on the Web and in books (such as "VIC 
 +Revealed", "The Commodore Innerspace Anthology", "Mapping the 64")
 +to break the code into subroutines. I inserted meaningful memory and 
 +program location labels, taking names from all of the above sources. 
 +My assembler allowed me to create conventional data and code "segments",
 +so I took the time to create a "real" data segment that mirrored the 
 +VIC memory map. These segments are not to be confused with the segments 
 +supported under the various PeeCee memory models. I used TASM 3.1, a 
 +shareware 8-bit table-based assembler by Squak Valley Software of 
 +Issaquah, WA. TASM supports the 6502, 6800/05/11, 8048/51/85/96, Z80 and 
 +TMS7000/32010/32025 processors.
 +
 +Next, I read the code and added comments as I went along. I do this on a 
 +routine-by-routine basis, as time permits, but always beginning at the 
 +first instruction after POR. Finally, I did a recompilation and compared 
 +the recompiled output with the ROM image to make sure that no errors were 
 +introduced in the source code creation process. I wasn't so lucky 
 +the first time around :-). I like to make gross checks first: ROM image 
 +size, location of well-known routines (such as the jump table at $FF85, 
 +the POR vector at $FD22, and the individual jump table routines). 
 +This helps to narrow down the location of any errors.
 +
 +Once I was satisfied that the disassembly was right, I created ROM image to 
 +be burned into a test EPROM. The ROMs used in the VIC are 2364 
 +mask-programmed ROMs. 2364s are a 24-pin 8k x 8bit ROM device, and the 
 +closest commonly available EPROM is the 2764 EPROM, a 28-pin 8k x 8bit 
 +device. Since the 2364s have four fewer pins (reflecting its non-
 +programmability), an adapter board needs to be built. A piece of perf board
 +and two 28-pin wire-wrap DIP socket should do the trick.
 + If all checks-out, the source is then ready for modification.
 +
 +Issues and Considerations
 +-------------------------
 + There is one important thing that I discovered while hacking the 
 +Kernal -- there is no wasted space in the Kernal ROM as it presently exists.
 +Actually, the Kernal occupies 1,279 bytes less than 8k, beginning at 
 +$E500 (and consequently, the BASIC ROM overhangs the $E000 boundary by 
 +1,279 bytes). The Kernal developers maximized the 8k space, so any Kernal 
 +hack will have to use jumps to a patch area elsewhere in the processor 
 +address space. For example, let's say that I wanted to add BASIC 4.0 disk 
 +commands to the VIC Kernal by hacking it (recognizing that I could have 
 +used the easier wedge method). I could place jumps in the Kernal ROM to 
 +locations within my own non-autostart ROM located at $A000.  The other 
 +important consideration is backward compatibility. Certain programs may rely 
 +on the specific location of code within the Kernal ROM. For example, a 
 +game ROM may make direct calls to the internal Plot routine, as opposed 
 +to using the jump table at the end of the Kernal ROM (saving a few 
 +processor ticks in the process). Shifting code around would relocate that 
 +code, breaking that program.
 +
 +General Hardware Information
 +----------------------------
 +The Microprocessor
 +Manufactured by MOS and second-sourced from Rockwell Semiconductors, the stock 
 +6502 is an 8-bit, 1MHz NMOS-process processor. It supports 56 instructions 
 +in 13 addressing modes (although six are combinations of the seven basic 
 +modes), three processor registers (.A, .X, and .Y), stack pointer, and a 
 +condition code (flags) register. The 6502 supports both maskable and 
 +non-maskable interrupts with fixed vectors at the top of its 64k address 
 +space.
 +
 +I/O Processors
 + VIC-20 I/O is managed by two memory-mapped I/O processors, the 
 +6522 versatile interface adapter (VIA). The I/O region occupies the 
 +4k-address space beginning at $9000.  The VIAs manage the keyboard, 
 +joystick, light pen, cassette deck, the IEEE serial interface and the 
 +user port. Each 6522 has 16 bi-directional I/O lines, four handshaking 
 +lines, two 8-bit shift registers and two clock generators (capable of 
 +generating free-running or triggered pulses). One of these clocks is 
 +responsible for RTC, RS-232, IEEE, and cassette tape timing. Of the eight 
 +handshaking lines, two are free for general use, while the other six are 
 +used for the IEEE serial port, the RESTORE key, and cassette control. 
 +24-bits of the total 32-bits of I/O are used for keyboard scanning and 
 +joystick, light pen, and serial inputs. Truly available to the user is four 
 +handshaking lines and 8-bits of I/O.
 +
 +Video Interface
 +The VIC-20 video interface is managed by the 6560/6561 VIC chip. The 
 +VIC screen is organized in 22 columns by 24 rows in text mode and 
 +176 by 192 pixels in "graphics" mode. Graphics mode is synthesized by 
 +mapping the character generator ROM to RAM and modifying the character 
 +glyphs.  The on-chip video sync generator is capable of generating video 
 +in NTSC (6560) or PAL (6561) formats in 16 colors. The VIC also contains 
 +three programmable tone generators, a white noise source, volume control,
 +two A/D converters (for game paddle interfacing), a light pen input, screen
 +centering, and independent control over background, foreground, and border 
 +colors.  The 6560/6561 performs its own DMA to separate 4-bit video RAM 
 +and 8-bit character generator ROM. The address buss is a private 2MHz buss,
 +which is not shared with the 1MHz microprocessor buss. Shared ROM access 
 +is performed during the processor Phase 1 clock.
 +
 +Memory Map
 + Space limitations prohibit listing the complete VIC-20 memory map, 
 +but an abridged version may be helpful:
 +
 +HEX Offset DESCRIPTION
 +
 +0000-00FF Zero page: Kernal and BASIC system areas
 +0100-01FF    Page 1: tape error log area, processor stack
 +0200-02FF    Page 2: BASIC input buffer, file and device address tables,
 + keyboard and screen vars, RS232 vars
 +0300-03FF    Page 3: BASIC vectors, processor register storage, Kernal 
 + vectors cassette buffer area
 +0400-0FFF Pages 4-15: 3k expansion area
 +1000-1DFF User Basic area (unexpanded VIC)
 +1E00-1FFF Screen memory (unexpanded VIC)
 +2000-3FFF 8K expansion RAM/ROM block 1
 +4000-5FFF 8K expansion RAM/ROM block 2
 +6000-7FFF 8K expansion RAM/ROM block 3
 +NOTE: When additional memory is added to block 1, 2 or 3,
 +the Kernal relocates the following things for BASIC:
 +1000-11FF Screen memory
 +1200-? User Basic area
 +9400-95FF Color RAM
 +8000-8FFF 4K Character generator ROM
 +8000-83FF Upper case and graphics
 +8400-87FF Reversed upper case and graphics
 +8800-8BFF Upper and lower case
 +8C00-8FFF Reversed upper and lower case
 +9000-93FF I/O Block 0
 +9000-900F VIC chip registers
 +9110-911F 6522 VIA#1 registers
 +9120-912F 6522 VIA#2 registers
 +9400-95FF location of COLOR RAM with additional RAM at blk 1
 +9600-97FF Normal location of COLOR RAM
 +9800-9BFF I/O Block 2
 +9C00-9FFF I/O Block 3
 +A000-BFFF 8K block for expansion ROM (autostart ROM)
 +C000-DFFF 8K BASIC ROM
 +E000-FFFF 8K Kernal ROM
 +
 +Kernal Functions
 +----------------
 +
 +System Startup
 + Let's first take a look at how a VIC-20 boots. The process is 
 +substantially similar for the C64 and the PET (through the commonality 
 +of the microprocessor upon which each machine is based), although the 
 +locations of various routines differs, as does the memory and I/O map.
 +When power is first applied to the microprocessor, the RESET pin is held 
 +low by a 555 timer for a period long enough for the power supply and clock 
 +generator to stabilize. The 6502 utilizes the last six bytes of the address 
 +space to store three critical vectors: the NMI, RESET, and IRQ vectors, 
 +respectively. On power-up, the PC (program counter) is initialized to the 
 +address stored at location $FFFC and execution begins at that location 
 +(the first column in the source code represents the program line number):
 + 
 +6495   FFFA ;=================================================
 +6496   FFFA ; - Power-on and hardware vectors
 +6497   FFFA ;
 +6498   FFFA A9 FE        .dw NMI ;non-maskable interrupt
 +6499   FFFC 22 FD        .dw RESET ;POR
 +6500   FFFE 72 FF        .dw IRQ ;IRQ processor
 +
 +Execution begins at $FD22, the POR (power-on reset) vector:
 +
 +5971   FD22  ;#################################################
 +5972   FD22  ; Power-on RESET entry
 +5973   FD22  ;#################################################
 +5974   FD22             RESET
 +5975   FD22 A2 FF        LDX #$FF
 +5976   FD24 78          SEI ;kill interrupts
 +5977   FD25 9A          TXS ;set stack top
 +5978   FD26 D8          CLD
 +5979   FD27 20 3F FD    JSR SCNROM ;check for autostart ROM
 +5980   FD2A D0 03        BNE SKIPA0 ;not there, skip ROM init
 +5981   FD2C             
 +5982   FD2C 6C 00 A0    JMP (A0BASE) ;jump to ROM init if present
 +5983   FD2F             
 +5984   FD2F             SKIPA0
 +5985   FD2F 20 8D FD    JSR RAMTAS ;test RAM
 +5986   FD32 20 52 FD    JSR IRESTR ;init work memory
 +5987   FD35 20 F9 FD    JSR IOINIT ;setup hardware
 +5988   FD38 20 18 E5    JSR CINT1 ;init video
 +5989   FD3B 58          CLI ;re-enable interrupts
 +5990   FD3C 6C 00 C0    JMP (BENTER) ;enter BASIC
 +
 + The startup routines setup the processor stack, check for the 
 +existence of an autostart ROM. Autostart ROMs are located in the $A000 
 +block and have a five-byte signature (A0CBM) at offset $04. If the 
 +signature is found, the Kernal jumps to the A0ROM initialization routine 
 +pointed to by offset $00 of the autostart ROM.
 + If no signature is found, the Kernal initialization continues by 
 +testing the RAM, initializing the system variables, system hardware, and 
 +the screen. Finally, the Kernal transfers control to the BASIC 
 +initialization entry point at $C000.
 +
 +Routine SCNROM
 + The first routine called from the POR code is the SCNROM routine. 
 +This routine looks for the special 5-byte signature that indicates the 
 +presence of an autostart ROM located in the $A segment.
 +
 +5992   FD3F  ;====================================================
 +5993   FD3F  ; SCNROM - Scan ROM areas for Autostart ROM signature
 +5994   FD3F  ;
 +5995   FD3F             SCNROM
 +5996   FD3F A2 05        LDX #$05 ;5 chars to compare
 +5997   FD41             
 +5998   FD41             SCNLOOP
 +5999   FD41 BD 4C FD    LDA SCANEX,X ;start at end of signature
 +6000   FD44 DD 03 A0    CMP A0BASE+3,X ;compare to ROM sig area
 +6001   FD47 D0 03        BNE SCANEX ;no match, exit loop
 +6002   FD49             
 +6003   FD49 CA          DEX ;match; check next char
 +6004   FD4A D0 F5        BNE SCNLOOP ;loop
 +6005   FD4C             
 +6006   FD4C             SCANEX
 +6007   FD4C 60          RTS ;return; Z=0 if no match
 +6008   FD4D             ;
 +6009   FD4D             ; ROMSIG - Autostart ROM signature
 +6010   FD4D             ;
 +6011   FD4D             ROMSIG
 +6012   FD4D 4130C3C2CD  .db "A0", $C3, $C2, $CD  ;A0CBM
 +
 +Routine RAMTAS
 + The RAMTAS routine is the second subroutine in the initialization 
 +process. It clears the first three pages of RAM, then searches for expansion
 +memory. If any is found, the screen memory, color memory, and start of 
 +BASIC RAM pointers are adjusted to their documented alternates.
 +
 +6058   FD8D  ;===================================================
 +6059   FD8D  ; RAMTAS - Initialize system contents
 +6060   FD8D  ;
 +6061   FD8D             RAMTAS
 +6062   FD8D A9 00        LDA #$00 ;zero regs .A and .X
 +6063   FD8F AA          TAX
 +6064   FD90             
 +6065   FD90             RAMTSLP1 ;clear system memory areas
 +6066   FD90 95 00        STA USRPOK,X ;zero page
 +6067   FD92 9D 00 02    STA BUF,X ;clear page 2
 +6068   FD95 9D 00 03    STA ERRVPT,X ;clear page 3
 +6069   FD98 E8          INX
 +6070   FD99 D0 F5        BNE RAMTSLP1 ;loop till done
 +6071   FD9B             
 +6072   FD9B A2 3C        LDX #$3C ;setup cassette buffer
 +6073   FD9D A0 03        LDY #$03 ;area to $033c
 +6074   FD9F 86 B2        STX TAPE1
 +6075   FDA1 84 B3        STY TAPE1+1
 +6076   FDA3 85 C1        STA STAL ;clear I/O start address…
 +6077   FDA5 85 97        STA REGSAV ;…register save
 +6078   FDA7 8D 81 02    STA OSSTAR ;…and start of OS memory ptr
 +6079   FDAA A8          TAY ; .Y=0
 +6080   FDAB A9 04        LDA #$04 ;check RAM from $0400
 +6081   FDAD 85 C2        STA STAL+1 ;set I/O start to page 3
 +6082   FDAF             
 +6083   FDAF             RAMTASLP2
 +6084   FDAF E6 C1        INC STAL ;increment LSB
 +6085   FDB1 D0 02        BNE RAMTAS1 ;not done with page, cont.
 +6086   FDB3             
 +6087   FDB3 E6 C2        INC STAL+1 ;inc. to new page
 +6088   FDB5             
 +6089   FDB5             RAMTAS1
 +6090   FDB5 20 91 FE    JSR MEMTST ;test RAM
 +6091   FDB8 A5 97        LDA REGSAV
 +6092   FDBA F0 22        BEQ RAMTAS3
 +6093   FDBC B0 F1        BCS RAMTASLP2 ;next address
 +6094   FDBE             
 +6095   FDBE A4 C2        LDY STAL+1 ;done testing,get RAM top MSB…
 +6096   FDC0 A6 C1        LDX STAL ;…and LSB
 +6097   FDC2 C0 20        CPY #$20 ; top at $2000
 +6098   FDC4 90 25        BCC I6561LP ;page below $2000, halt
 +6099   FDC6             
 +6100   FDC6 C0 21        CPY #$21 ;RAM at $2000?
 +6101   FDC8 B0 08        BCS RAMTAS2 ;yes, set params
 +6102   FDCA             
 +6103   FDCA A0 1E        LDY #$1E ;$1E00
 +6104   FDCC 8C 88 02    STY HIPAGE
 +6105   FDCF             
 +6106   FDCF             RAMTAS1A
 +6107   FDCF 4C 7B FE    JMP STOTOP ;CLC and set RAM top
 +6108   FDD2             
 +6109   FDD2             RAMTAS2
 +6110   FDD2 A9 12        LDA #$12 ;With exp. RAM, BASIC starts
 +6111   FDD4 8D 82 02    STA OSSTAR+1 ;at $1200…
 +6112   FDD7 A9 10        LDA #$10 ;…and screen starts at $1000
 +6113   FDD9 8D 88 02    STA HIPAGE
 +6114   FDDC D0 F1        BNE RAMTAS1A ;set top of RAM and exit
 +6115   FDDE             
 +6116   FDDE             RAMTAS3
 +6117   FDDE 90 CF        BCC RAMTASLP2 ;loop to next address
 +6118   FDE0             
 +6119   FDE0 A5 C2        LDA STAL+1 ;get MSB of I/O start
 +6120   FDE2 8D 82 02    STA OSSTAR+1 ;save as start of OS
 +6121   FDE5 85 97        STA REGSAV ;save copy
 +6122   FDE7 C9 11        CMP #$11 ;page $11
 +6123   FDE9             
 +6124   FDE9             RATS3
 +6125   FDE9 90 C4        BCC RAMTASLP2
 +6126   FDEB             
 +6127   FDEB             I6561LP
 +6128   FDEB 20 C3 E5    JSR V6561I-2 ;$E5C3 init VIC regs
 +6129   FDEE 4C EB FD    JMP I6561LP
 +
 +This routine actually tests the RAM, and is called during the memory 
 +search loop at $FDB5. It uses a simple walking-bit pattern to test for 
 +memory defects:
 +
 +6271   FE91  ;===================================================
 +6272   FE91  ; MEMTST - Test memory
 +6273   FE91  ; .Y is index in page
 +6274   FE91             MEMTST
 +6275   FE91 B1 C1        LDA (STAL),Y ;get address
 +6276   FE93 AA          TAX ;save .A
 +6277   FE94 A9 55        LDA #%01010101 ;set pattern
 +6278   FE96 91 C1        STA (STAL),Y ;save it…
 +6279   FE98 D1 C1        CMP (STAL),Y ;…and compare
 +6280   FE9A D0 08        BNE MEMTS1 ;not equal
 +6281   FE9C              ;pattern compares OK
 +6282   FE9C 6A          ROR A ;%10101010 invert pattern
 +6283   FE9D 91 C1        STA (STAL),Y ;save it…
 +6284   FE9F D1 C1        CMP (STAL),Y ;…and compare
 +6285   FEA1 D0 01        BNE MEMTS1 ;not equal
 +6286   FEA3 A9          .db $A9 ;LDA #$18 for OK, $55 or $AA
 +6287   FEA4              ; for failed pattern
 +6288   FEA4             MEMTS1
 +6289   FEA4 18          CLC ;CLC only on error
 +6290   FEA5 8A          TXA ;restore previous .A
 +6291   FEA6 91 C1        STA (STAL), Y ;save it
 +6292   FEA8 60          RTS
 +
 + The RAMTAS routine also calls STOTOP to save the top of RAM pointer:
 +
 +6241   FE73  ;==================================================
 +6242   FE73  ; IMEMTP - Set/read top of memory (internal)
 +6243   FE73  ; On entry, SEC to read, .X/.Y is LSB/MSB
 +6244   FE73  ;           CLC to set, .X/.Y is LSB/MSB
 +6245   FE73  ;
 +6246   FE73             IMEMTP
 +6247   FE73 90 06        BCC STOTOP ;set or read?
 +6248   FE75 AE 83 02    LDX OSTOP ;get top of memory
 +6249   FE78 AC 84 02    LDY OSTOP+1
 +6250   FE7B             
 +6251   FE7B             STOTOP
 +6252   FE7B 8E 83 02    STX OSTOP ;set top of memory
 +6253   FE7E 8C 84 02    STY OSTOP+1
 +6254   FE81 60          RTS
 +
 +Routine IRESTR 
 + This routine loads (or re-loads) the default Kernal vectors upon 
 +POR or Run-Stop/Restore sequences. The default vectors that are loaded 
 +include the links to IRQ, NMI, Open, Close, Channel In, Channel Out, 
 +Clear Channels, Character In, Character Out, Scan Stop Key, Get Keyboard 
 +Character, Close All, Load and Save routines within the Kernal ROM.
 +
 +6014   FD52  ;====================================================
 +6015   FD52  ; IRESTR - Restore KERNAL hardware vectors (internal)
 +6016   FD52  ; Called during POR and NMI sequences.
 +6017   FD52  ;
 +6018   FD52             IRESTR
 +6019   FD52 A2 EA        LDX #$EA ;FIXUP2;#$6D points to list of 
 +6020   FD54 A0 EA        LDY #$EA ;FIXUP2+1;#$FD $FD6D KERNAL vecs
 +6021   FD56 18          CLC
 +6022   FD57             ;
 +6023   FD57             ; IVECTR - Change vectors for user
 +6024   FD57             ; On entry, SEC= read vector to .X/.Y LSB/MSB
 +6025   FD57             ;           CLC= set vector from .X/.Y LSB/MSB
 +6026   FD57             ;
 +6027   FD57             IVECTR
 +6028   FD57 86 C3        STX MEMUSS ;save vector to temp
 +6029   FD59 84 C4        STY MEMUSS+1
 +6030   FD5B A0 1F        LDY #$1F ;# of bytes to move
 +6031   FD5D  
 +6032   FD5D             VECLOOP
 +6033   FD5D B9 B6 02    LDA IRQVP,Y ;get old vector address
 +6034   FD60 B0 02        BCS VECSK ;branch on CY=1/read
 +6035   FD62             
 +6036   FD62 B1 C3        LDA (MEMUSS),Y ;get new vector address
 +6037   FD64             
 +6038   FD64             VECSK
 +6039   FD64 91 C3        STA (MEMUSS),Y ;save new address to temp
 +6040   FD66 99 B6 02    STA IRQVP,Y ;and to vector area
 +6041   FD69 88          DEY ;go to next one
 +6042   FD6A 10 F1        BPL VECLOOP ;loop
 +6043   FD6C 60          RTS
 +6044   FD6D  
 +6045   FD6D             ;
 +6046   FD6D             ;KERNAL Vectors
 +6047   FD6D             ;
 +6048   FD6D             KNRLSV
 +6053   FD6D BFEAD2FEADFE .dw IRQVEC, WARMST, LNKNMI, IOPEN
 +6053   FD73 0AF4
 +6054   FD75 4AF3C7F209F3 .dw ICLOSE, ICHKIN, ICHKOT, ICLRCH
 +6054   FD7B F3F3
 +6055   FD7D 0EF27AF270F7 .dw ICHRIN, ICHROT, ISTOP,  IGETIN
 +6055   FD83 F5F1
 +6056   FD85 EFF3D2FE49F5 .dw ICLALL, WARMST, LNKLOD, LNKSAV
 +6056   FD8B 85F6
 +
 +Routine IOINIT
 + This routine initializes the VIAs. Lots of bit twiddling goes on 
 +here to set-up the various ports. This routine also starts the system 
 +IRQ timer.
 +
 +6138   FDF9  ;===================================================
 +6139   FDF9  ; IOINIT - Initialize I/O registers
 +6140   FDF9  ;
 +6141   FDF9             IOINIT
 +6142   FDF9 A9 7F        LDA #%01111111 ;disable HW interrupts
 +6143   FDFB 8D 1E 91    STA D1IER ;interrupt enable reg VIA1
 +6144   FDFE 8D 2E 91    STA D2IER ;interrupt enable reg VIA2
 +
 +6145   FE01 A9 40        LDA #%01000000 ;Sets tmr1/VIA2 to free-
 + ;running; used for IRQ
 +6146   FE03 8D 2B 91    STA D2ACR ;VIA2 aux ctrl reg
 +
 +6147   FE06 A9 40        LDA #%01000000 ;same for tmr1/VIA1. Used for
 + ; RS-232 timing
 +6148   FE08 8D 1B 91    STA D1ACR ;VIA1 aux ctrl reg
 +
 +6149   FE0B A9 FE        LDA #%11111110 ;sets CA1/2, CB1/2 modes
 + ; CA2/CB2 manual H, CB1 pos
 + ; trig. CA1 negative trig.
 + ;CA1=Restore
 + ;CA2=cassette motor
 + ;CB1=user port
 + ;CB2=user port
 +6150   FE0D 8D 1C 91    STA D1PCR ;VIA1 periph ctrl reg
 +
 +6151   FE10 A9 DE        LDA #%11011110 ;sets CA1/2, CB1/2 modes
 + ; CB2 manual L, CB1 pos
 + ; trig. CA1 negative trig.
 + ; CA2 manual H
 + ;CA1=cassette read
 + ;CA2=*SCLK
 + ;CB1=*SRQIN
 + ;CB2=*SDATAOUT
 +6152   FE12 8D 2C 91    STA D2PCR ;VIA2 periph ctrl reg
 +
 +6153   FE15 A2 00        LDX #$00 ;DDR all bits IN
 +6154   FE17 8E 12 91    STX D1DDRB ;VIA1/B data dir reg
 +
 +6155   FE1A A2 FF        LDX #%11111111 ;DDR all bits OUT
 +6156   FE1C 8E 22 91    STX D2DDRB ;VIA2/B data dir reg
 +
 +6157   FE1F A2 00        LDX #$00 ;DDR all bits IN
 +6158   FE21 8E 23 91    STX D2DDRA ;VIA2/A data dir reg
 +
 +6159   FE24 A2 80        LDX #%10000000 ;BIT7=OUT, BITS6-0 IN
 +6160   FE26 8E 13 91    STX D1DDRA ;VIA1/A data dir reg
 +
 +6161   FE29 A2 00        LDX #$00
 +6162   FE2B 8E 1F 91    STX D1ORAH ;VIA1 output reg A MSB
 +
 +6163   FE2E 20 84 EF    JSR SCLK1 ;set IEEE clock line=1
 +
 +6164   FE31 A9 82        LDA #%10000010 ;enable IER CA1/VIA1 RESTOR
 +6165   FE33 8D 1E 91    STA D1IER ;VIA1 IER BIT7=1
 +
 +6166   FE36 20 8D EF    JSR SCLK0 ;set IEEE clock line=0
 +6167   FE39             ;
 +6168   FE39             ; ENABTM - Enable timers
 +6169   FE39             ;
 +6170   FE39             ENABTM
 +6171   FE39 A9 C0        LDA #%11000000 ;enable tmr1/VIA2 (IRQ)
 +6172   FE3B 8D 2E 91    STA D2IER ;VIA2 IER BIT7-6=1
 +
 +6173   FE3E A9 89        LDA #%10001001 ;$89 IRQ tic divisor LSB
 +6174   FE40 8D 24 91    STA D2TM1L ;VIA2 tmr1 LSB
 +
 +6175   FE43 A9 42        LDA #%01000010 ;$42 IRQ tic divisor MSB
 +6176   FE45 8D 25 91    STA D2TM1L+1 ;VIA2 tmr1 MSB
 +6177   FE48 60          RTS
 +
 +Routine CINT1
 + This final routine initializes the character generator, sets the 
 +initial screen colors, clears the screen and "homes" the cursor, and 
 +updates screen and cursor pointers.
 +
 +1349   E518  ;==================================================
 +1350   E518  ; CINT1 - Initialize I/O
 +1351   E518  ;
 +1352   E518   
 +1353   E518             ;
 +1354   E518             ;Screen reset
 +1355   E518             ;
 +1356   E518             CINT1
 +1357   E518 20 BB E5    JSR IODEF1 ;set deflt I/O and init VIC
 +1358   E51B AD 88 02    LDA HIPAGE ;get screen memory page
 +1359   E51E 29 FD        AND #%11111101 ;$FD MS nibble is ChrROM and
 +1360   E520 0A          ASL A ;LS nibble is ChrRAM
 +1361   E521 0A          ASL A
 +1362   E522 09 80        ORA #%10000000 ;$80
 +1363   E524 8D 05 90    STA VRSTRT ;set chargen ROM to $8000
 +1364   E527 AD 88 02    LDA HIPAGE ;get screen mem page
 +1365   E52A 29 02        AND #%00000010 ;$02 check for screen RAM at 
 +1366   E52C F0 08        BEQ CINT1A ;$E536 $1E page
 +1367   E52E             
 +1368   E52E A9 80        LDA #%10000000 ;$80 screen RAM is at $10 page
 +1369   E530 0D 02 90    ORA VRCOLS ;set Bit7
 +1370   E533 8D 02 90    STA VRCOLS
 +1371   E536             
 +1372   E536             CINT1A
 +1373   E536 A9 00        LDA #$00
 +1374   E538 8D 91 02    STA SHMODE ;enable shift-C=
 +1375   E53B 85 CF        STA BLNON ;start at no blink
 +1376   E53D             
 +1377   E53D A9 EA        LDA #$EA ;FIXUP1+34;#$DC
 +1378   E53F 8D 8F 02    STA FCEVAL
 +1379   E542 A9 EA        LDA #$EA ;FIXUP1+35;#$EB
 +1380   E544 8D 90 02    STA FCEVAL+1 ;shift mode evaluation
 +1381   E547             
 +1382   E547 A9 0A        LDA #$0A
 +1383   E549 8D 89 02    STA KBMAXL ;key buffer=16
 +1384   E54C 8D 8C 02    STA KRPTDL ;repeat delay=16ms
 +1385   E54F A9 06        LDA #$06
 +1386   E551 8D 86 02    STA CLCODE ;color=6(blue)
 +1387   E554 A9 04        LDA #$04
 +1388   E556 8D 8B 02    STA KRPTSP ;repeat speed
 +1389   E559 A9 0C        LDA #$0C
 +1390   E55B 85 CD        STA BLNCT ;blink timer=12ms
 +1391   E55D 85 CC        STA BLNSW ;set for solid cursor
 +1392   E55F             ;
 +1393   E55F             ; Clear screen
 +1394   E55F             ;
 +1395   E55F             CLRSCN
 +1396   E55F AD 88 02    LDA HIPAGE ;mem page for screen RAM
 +1397   E562 09 80        ORA #%10000000 ;$80
 +1398   E564 A8          TAY
 +1399   E565 A9 00        LDA #$00
 +1400   E567 AA          TAX
 +1401   E568             
 +1402   E568             CLRLP1
 +1403   E568 94 D9        STY SLLTBL,X ;address of screen line
 +1404   E56A 18          CLC
 +1405   E56B 69 16        ADC #$16 ;add 22
 +1406   E56D 90 01        BCC CLRSC1
 +1407   E56F             
 +1408   E56F C8          INY
 +1409   E570             
 +1410   E570             CLRSC1
 +1411   E570 E8          INX
 +1412   E571 E0 18        CPX #$18 ;all rows done?
 +1413   E573 D0 F3        BNE CLRLP1
 +1414   E575             
 +1415   E575 A9 FF        LDA #$FF
 +1416   E577 95 D9        STA SLLTBL,X
 +1417   E579 A2 16        LDX #$16
 +1418   E57B             
 +1419   E57B             CLRLP2
 +1420   E57B 20 8D EA    JSR CLRLIN ;clear line
 +1421   E57E CA          DEX
 +1422   E57F 10 FA        BPL CLRLP2
 +1423   E581             ;
 +1424   E581             ; "Home" cursor
 +1425   E581             ;
 +1426   E581             HOME
 +1427   E581 A0 00        LDY #$00
 +1428   E583 84 D3        STY CSRIDX ;set column to 0
 +1429   E585 84 D6        STY CURROW ;and row to 0, too
 +1430   E587             ;
 +1431   E587             ; Set screen pointers
 +1432   E587             ;
 +1433   E587             SCNPTR
 +1434   E587 A6 D6        LDX CURROW
 +1435   E589 A5 D3        LDA CSRIDX
 +1436   E58B             
 +1437   E58B             SCNPLP
 +1438   E58B B4 D9        LDY SLLTBL,X
 +1439   E58D 30 08        BMI SCNPT1
 +1440   E58F             
 +1441   E58F 18          CLC
 +1442   E590 69 16        ADC #$16
 +1443   E592 85 D3        STA CSRIDX
 +1444   E594 CA          DEX
 +1445   E595 10 F4        BPL SCNPLP
 +1446   E597             
 +1447   E597             SCNPT1
 +1448   E597 B5 D9        LDA SLLTBL,X
 +1449   E599 29 03        AND #$03
 +1450   E59B 0D 88 02    ORA HIPAGE
 +1451   E59E 85 D2        STA LINPTR+1
 +1452   E5A0 BD FD ED    LDA LBSCAD,X
 +1453   E5A3 85 D1        STA LINPTR
 +1454   E5A5 A9 15        LDA #$15
 +1455   E5A7 E8          INX
 +1456   E5A8             
 +1457   E5A8             SCNLP1
 +1458   E5A8 B4 D9        LDY SLLTBL,X
 +1459   E5AA 30 06        BMI SCNEXIT
 +1460   E5AC             
 +1461   E5AC 18          CLC
 +1462   E5AD 69 16        ADC #$16
 +1463   E5AF E8          INX
 +1464   E5B0 10 F6        BPL SCNLP1
 +1465   E5B2             
 +1466   E5B2             SCNEXIT
 +1467   E5B2 85 D5        STA LINLEN
 +1468   E5B4 60          RTS ; return to init routine
 +
 + CINT1 calls one routine, IODEF1, which resets the default input 
 +and output devices to the keyboard and screen, respectively, and then 
 +resets the VIC chip's registers to their default. The one interesting 
 +thing to note is the PANIC entry at $E5B5. The Kernal does not call the 
 +PANIC entry! The Kernal bypasses the extra JSR by calling the IODEF1 code 
 +directly. Not that there is any magic in the PANIC entry; it only calls 
 +the IODEF1 code and homes the cursor.  I haven't yet examined the 
 +BASIC ROM, so it is possible that BASIC calls or vectors the PANIC entry.
 +
 +1404   E5B5 ;================================================
 +1405   E5B5 ; PANIC - Set I/O defaults (unused entry point??)
 +1406   E5B5 ;
 +1407   E5B5             PANIC
 +1408   E5B5 20 BB E5    JSR IODEF1 ;reset devices and VIC regs
 +1409   E5B8 4C 81 E5    JMP HOME ;home cursor
 +1410   E5BB           ;
 +1411   E5BB           ; Real PANIC entry; reset default devices
 +1412   E5BB           ;
 +1413   E5BB             IODEF1
 +1414   E5BB A9 03        LDA #$03
 +1415   E5BD 85 9A        STA OUTDEV ;reset output to screen
 +1416   E5BF A9 00        LDA #$00
 +1417   E5C1 85 99        STA INDEV ;reset input to kbrd
 +1418   E5C3             ;
 +1419   E5C3             ; Initialize 6561 VIC
 +1420   E5C3             ;
 +1421   E5C3 A2 10        LDX #$10 ;move 16 VIC registers
 +1422   E5C5             
 +1423   E5C5             
 +1424   E5C5             V6561I
 +1425   E5C5 BD E3 ED    LDA VICSUP-1,X ;start at end of tbl
 +1426   E5C8 9D FF 8F    STA $8FFF,X ;start at end of regs
 +1427   E5CB CA          DEX ;decrement index
 +1428   E5CC D0 F7        BNE V6561I ;do next register
 +1429   E5CE             
 +1430   E5CE 60          RTS
 +
 +2789   EDE4             ;
 +2790   EDE4             ;VIC chip video control constants
 +2791   EDE4             ;
 +2792   EDE4             VICSUP
 +2793   EDE4 .db $05 ;bit7 interlace, 6-0 HCenter
 +.db $19 ;VCenter
 +.db $16 ;bit7=video address, 6-0 #rcols
 +.db $2E ;bit6-1=#rows, bit0=8x8 or 16x8 chars
 +.db $00 ;current TV raster beam line
 +.db $C0 ;bit0-3 start of char memory
 + ;bit4-7 is rest of video address
 +;BITS 3,2,1,0 CM starting address
 +;             HEX   DEC
 +;0000   ROM  8000  32768 *default
 +;0001        8400  33792
 +;0010        8800  34816
 +;0011        8C00  35840
 +;1000   RAM  0000  0000
 +;1001        xxxx  }
 +;1010        xxxx  }unavail.
 +;1011        xxxx  }
 +;1100        1000  4096
 +;1101        1400  5120
 +;1110        1800  6144
 +;1111        1C00  7168
 +.db $00 ;Hpos of light pen
 +.db $00 ;Vpos of light pen
 +2794   EDEC .db $00 ;Digitized value of paddle X
 +.db $00 ;Digitized value of paddle Y
 +.db $00 ;Frequency for oscillator 1 (low)
 +.db $00 ;Frequency for oscillator 2 (medium)
 +.db $00 ;Frequency for oscillator 3 (high)
 +.db $00 ;Frequency of noise source
 +.db $00 ; bit0-3 sets volume of all sound
 +; bit4-7 are auxiliary color information
 +.db $1B ;Screen and border color register
 +; bits 4-7 select background color
 +; bits 0-2 select border color
 +; bit 3 selects inverted or normal mode
 +
 +Conclusion
 + Next time, we'll examine more routines and answer any questions 
 +that you may have.
 +
 +.......
 +....
 +..
 +.                                    C=H #17
 +
 +::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
 +
 +NTSC-PAL fixing, part 1
 +===============
 +Russel Reed <rreed@egypt.org>, Robin Harbron <macbeth@tbaytel.net>, S. Judd
 +
 +Introduction
 +============
 +
 + Just about everyone knows that there are differences between
 +NTSC and PAL machines.  Most people are also familiar with at least a 
 +few of the technical issues, such as extra raster lines, and know that
 +these differences can cause certain types of programs to fail, in particular
 +games and demos.  But how does one actually go about fixing one of
 +these programs?  It is that with which this series of articles is
 +concerned.
 +  "Fixing" has been a job which a number of 64 hackers have taken on, 
 +in order to enjoy programs written in another country.  Some of the major
 +game companies imported software from other countries and sometimes had
 +to reprogram the software so it would run correctly.  Fixing is not
 +always a simple task, but there are some techniques and strategies which
 +are useful in most cases.  There are only a few different classes of
 +problems overall.
 +
 + We decided to approach this problem in a novel way: a pair of
 +yay-hoos (Robin and Steve) would place themselves under the tutelage
 +of an experienced fixer (Russ, a.k.a. Decomp/Style), fix up a program,
 +and write up the results and experiences.  The first step was deciding
 +on which program (or programs) to fix.  It had to first of all be
 +fixable!  Since time is always in short supply it couldn't be a big, 
 +complicated project.  And finally, since we were just getting our fixing
 +feet wet, the actual fixing job needed to be fairly straightforward (so 
 +the big custom track-loading demo will have to wait for a future article).
 + But demos are the natural fixing candidate, and after viewing 
 +several different ones, and examining the code to see what would need 
 +fixing, we finally decided on the demo "Slow Ideas", written by a couple
 +of crazy Finns way back in 1989.  It's a cool demo, was challenging and
 +fun to fix, and turned out to be pedagogically a good choice.  It's
 +two pages, and each page had a number of effects in need of fixing.
 +These pages, and the practical side of fixing, will be discussed in
 +some detail below, but first we need to review the differences between
 +PAL and NTSC, and discuss the implications of those differences, and
 +how they manifest themselves in programs.
 +
 +
 +NTSC/PAL Differences
 +====================
 +
 + There is really just one primary difference between NTSC and PAL 
 +machines: the graphics, which means VIC.  But since VIC generates the
 +machine clock cycles, that means the computers run at different speeds.
 +And since they run at different speeds, the CIA timers run at different
 +speeds, the SIDs run at different speeds, and the CPUs run at different
 +speeds.  So just having a slightly different graphics format affects
 +nearly every aspect of the machine's operation.
 +
 +VIC and graphics
 +----------------
 +
 + The PAL television standard is different from the NTSC standard.
 +The primary difference is actually the way color is encoded, but 
 +the main issue for the 64 is the frame rate, the number of raster 
 +lines, and the number of cycles per raster line: 
 +
 +VIC chip         Frame Rate  Raster lines  Cycles per line
 +6567R56A (NTSC):    60Hz          262          64
 +6567R8+  (NTSC):    60Hz          263          65
 +6569     (PAL) :    50Hz          312          63
 +
 +As the video raster beam sweeps across the television tube, VIC tells 
 +it what to display, one pixel at a time.  The CPU clock is exactly
 +1/8th of the "pixel clock", so that one CPU cycle corresponds to
 +eight pixels on the screen.  Thus, it is clear from the above table
 +that a PAL machine has 63*8 = 504 pixels per raster line.  320 of
 +those pixels comprise the visible display, while the other 184 make
 +up the left and right borders.
 +
 + What is important here are the three numbers in the table, though.
 +First consider the number of cycles per line.  If a program is exactly
 +synchronized with the raster, then it can make precise changes to the 
 +screen merely by letting a certain number of cycles elapse.  A simple 
 +example is making raster bars; a more involved example is opening the side 
 +borders, or generating an FLI display (which you can read about in previous
 +issues of C=Hacking).  Needless to say, programs which require exact cycle 
 +timings will fail when run on a machine with a different number of cycles 
 +per line.  (Note that on older computers, like the old Atari 2600, the CPU
 +actually built the screen display, and so _all_ the screen code had to 
 +be exactly timed).
 + Next observe the different number of raster lines.  The visible 
 +display begins on raster line 50, and there are 200 visible raster lines 
 +(320x200, you know).  That leaves 13 raster lines for the NTSC border, but 
 +62 raster lines for the PAL border.  This causes two problems.  Code which 
 +waits for a raster line greater than 263 will have problems on an NTSC 
 +machine.  A busy loop such as
 +
 + LDA #$10 ;Wait for line 266
 + CMP $D012
 + BNE *-5
 + LDA $D011
 + BPL *-12
 +
 +will never exit, while a raster IRQ will never occur.  The code must be 
 +adjusted to use a different raster line or another method of timing.  
 +Sprite graphics on lines greater than 263 will wrap around on an NTSC 
 +screen and in some cases the image will be displayed twice.  The sprites 
 +must either be moved or their images truncated to correct this.
 + Moreover, the extra raster lines mean extra cycles per PAL frame.
 +Using the table above, an NTSC machine has 263*65 = 17095 cycles per frame, 
 +and a PAL machine has 312*63 = 19656 cycles per frame.  In many demos and 
 +games those extra 2500 cycles are used to perform needed calculations and 
 +operations before the next frame begins, which leads to all kinds of
 +trouble on an NTSC machine.  Note that NTSC machines have more cycles 
 +available in the _visible_ display, while PAL machines have many more
 +cycles available in the borders.
 +
 + Finally, consider the frame rate.  On an NTSC machine, there are 
 +17095 cycles per frame, and 60 frames per second, giving 17095*60 = 1025700
 +cycles per second, or 1.02 MHz.  On a PAL machine, there are 19656*50 = 982800
 +cycles per second, or 0.98 MHz.  So although a PAL machine has more cycles
 +per frame, the CPU runs slightly slower than on an NTSC machine.  Thus a
 +game like Elite, which involves raw computation, runs a little faster
 +on an NTSC machine.  But for most games and demos it is the cycles per
 +frame which is important -- as long as all game calculations can get done
 +before the next frame, the game can run at the full frame rate.  Also
 +note that most tunes are synced to the screen, so when a PAL tune,
 +designed to play at 50 calls per second, is suddenly called 60 times
 +each second, it will play noticeably faster.
 + By the way, there actually aren't _exactly_ 50 or 60 frames per
 +second.  The frames per second is actually determined by the machine
 +clock rate, not the other way around!  The actual system clock rates are
 +14318181 / 14 = 1022727Hz for NTSC and 17734472 / 18 = 985248Hz for PAL.
 +Dividing by 17095 (PAL=19656) cycles per frame gives 59.826 frames/second 
 +NTSC and 50.124 fps PAL.
 + The important thing to remember here is that PAL machines run 
 +slightly slower than NTSC machines, but have many more cycles per video 
 +frame.
 +
 + Just as a side node, the above calculation should indicate to you
 +that although the AC electricity lines are 60Hz in the US and 50Hz in Europe, 
 +that has nothing to do with the 50/60Hz PAL/NTSC frame rates.  Not only can 
 +an NTSC monitor easily display a 50Hz signal (let alone 59.826Hz), but the 
 +actual power frequency fluctuates around that 50/60Hz anyways, so that 
 +the AC line frequency is only 50/60Hz on _average_ -- good enough to
 +run a clock, but not nearly precise enough to generate a video signal.
 +
 + Also note that there are two different NTSC VIC chips in the table.
 +The 64 cycles/line VIC was present in the earliest 64s shipped.  This is 
 +actually a bug in the chip, though, and 65 cycles/line is the "correct",
 +not to mention most common, NTSC VIC chip, and the one which we will
 +refer to in this article.  Oh?  You don't believe me?  Well, from the 
 +March 1985 IEEE Spectrum article:
 +
 + In addition to the difficuly with the ROM [sparklies], "I made
 + a logic error," Charpentier recalled.  The error, which was 
 + corrected sometime after Charpentier left Commodore, caused 
 + the early C-64s to generate the wrong number of clock cycles 
 + on each horizontal video line.  "It was off by one," he said.
 + "Instead of 65 cycles per line, I had 64."
 +
 + As a result, the 180-degree phase shift between the black-and-white
 + and color information, which would have eliminated color transition
 + problems, didn't occur.  Depending on their color and the color of
 + the background, the edges of some objects on the screen would appear
 + slightly out of line...
 +
 +There ya go!
 +
 +Machine cycles
 +--------------
 +
 + The tiny CPU speed difference has a number of important ramifications.
 +It means that the CIA timers on a PAL machine run slightly slower than on 
 +an NTSC machine, so timer values may have to be recalibrated; note that the
 +system CIA interrupt has a different setting for PAL and NTSC.  Moreover, 
 +a disk drive runs at exactly 1MHz -- there are no "PAL disk drives" -- which 
 +means cycle-exact fastloaders will not synchronize correctly on 
 +different-speed machines.  And finally, it means that SID works differently.
 + Not only will the tempo of any interrupt-based tune (raster _or_ CIA) 
 +change, but the actual pitch will change as well.  SID generates its waveforms
 +by simply updating an internal counter every cycle, so an NTSC SID is 
 +essentially playing a digital sample at 1.02 MHz.  When that sample is 
 +played at 0.98 MHz, it's like slowing a record player down a little -- the 
 +pitch decreases.  To be specific, the _absolute_ pitch changes, but the 
 +_relative_ pitch between notes does not; the tune plays the same, but
 +the pitches are all a little over a quarter-step lower.  
 + Practically speaking, this is totally irrelevant to fixing.
 +Only the tune speed is of significant interest.
 +
 +Fixing the Problems
 +===================
 +
 + The previous section described different classes of problems 
 +which can occur from the different cycles per line, lines per frame, 
 +cycles per frame, and cycles per second.  These problems include screen 
 +syncs, bad interrupts and infinite busy-loops, too many cycles per frame,
 +mis-timed timers and fastloaders, and different music tempos.
 +
 + Fixing tunes is easy.  For programs in which the interrupt frequency
 +is otherwise unimportant, the interrupt timer source can be adjusted to
 +the correct frequency.  In other cases, if the interrupt frequency
 +cannot be changed, the music speed may be adjusted by calling the play
 +routine twice on every sixth interrupt or not calling it on the sixth
 +interrupt.  If perfection is needed, the music data might be adjusted or
 +the music routine rewritten to work at the different frequency.  Much of
 +the time none of these are necessary, as the music sounds fine at the
 +different speed anyway.  
 +
 + Next consider too many cycles per frame.  In order to fix this 
 +class of problems, we must improve the efficiency of the code.  There are
 +three cases here.  Sometimes busy waits are used to synchronize the code 
 +with a raster line on the screen.  This wastes cycles and imposes some 
 +restrictions which result in additional wasted cycles.  These busy waits 
 +may sometimes be replaced by raster interrupts which make better use of 
 +the available cycles.
 + At other times, programmers will set up all graphic updates so that
 +the code executes in the vertical borders.  NTSC machines have a big 
 +disadvantage here, as we've seen earlier.  Usually this code can be 
 +rearranged to take advantage of the available cycles during the screen 
 +display.  This can be tricky, as you don't want to be updating the screen 
 +at the same time it is being displayed, but by splitting updates up it can 
 +usually be pulled off.
 + Finally there are some cases in which neither of these techniques 
 +is of use.  For a perfect fix, the code must be optimized, often by
 +sacrificing memory.  If it can't be optimized, then something has to go;
 +effects can be truncated or updates slowed down so that less is updated
 +each frame.
 +
 + Next consider the different cycles per raster line.  In most 
 +cases, this difference is not significant.  The routines for which it is
 +significant are raster routines, where synchronization with the video
 +chip is established by using exactly the right number of processor
 +cycles.  FLI, VSP, and color bars are all affected by this.  Color bars
 +will have flicker and look crooked; VSP effects will often be shifted
 +the wrong amount; FLI routines usually either repeat the top row of
 +graphics all the way down the screen or else don't display at all. 
 +These problems can all be corrected by adding or subtracting the correct
 +number of cycles per raster line.  In most cases, this class of problem is 
 +actually the easiest to fix.
 + There are several approaches to putting the right number of cycles 
 +in for the fix.  If the source is available, inserting a NOP instruction
 +may be all that is required for an NTSC fix.  Without the source, a
 +modified routine may be inserted into some empty memory and the original
 +routine bypassed.  Sometimes the code may be shuffled around enough to
 +insert a NOP with a machine language monitor.  You can sometimes change
 +the opcodes used to use a different number of cycles.  Consider the
 +delays that can be added with just two bytes:
 +
 + CMP #$EA ;2 cycles
 + BIT $EA ;3 cycles
 + NOP NOP ;4 cycles
 + INC $EA ;5 cycles
 + CMP ($EA,X) ;6 cycles
 +
 +This gives lots of room to work with, assuming the flags aren't important.
 +If .X or .Y is unused, then
 +
 + STA $1234 
 +
 +can be changed to 
 +
 + STA $1234,X or STA $1234,
 +
 +to gain an extra cycle (if .Y=0).  If .Y is known to contain a fixed 
 +value like $FF, the target can be adjusted so that STA $1234 becomes 
 +STA $1135,Y.  Usually in an FLI routine, you'll see STA $D018, STA $D011,
 +and STA $D016 together.  Two of these can be replaced with indexed opcodes
 +to add the two extra cycles needed for an NTSC fix.
 + Also note that when sprites are active, a different amount
 +of cycles may get stolen depending on which instruction is executing
 +when the sprite data is read.  C=Hacking #3 discusses this in detail,
 +and explains how it may be used to synchronize code with the raster beam.
 +From a fixing standpoint, it means that you don't always want to add
 +two instruction cycles to convert a piece of PAL code to NTSC; sometimes,
 +as in the demo below, only _one_ cycle must be added to fix certain routines, 
 +with the other cycle being eaten by VIC.
 +
 + Sprites have a few differences between PAL and NTSC as well; like 
 +the other differences they are not evident in many programs.  The horizontal
 +sprite positions start at zero on the left side of the screen and
 +increase as you move to the right.  At some point past position 300, the
 +positions wrap back around to the left side of the screen.  For these
 +high horizontal positions, the sprites are 8 pixels farther right on a
 +PAL screen than they would be on an NTSC screen.  When these high
 +positions are used to create sprites that extend all the way to the left
 +edge of the visible screen, problems show up.  A PAL routine will have
 +an eight pixel wide gap in the sprites on an NTSC machine while an NTSC
 +routine will have eight pixels of overlap on a PAL machine.  Often these
 +positions are stored in a table or loaded into a register with immediate
 +addressing.  In this case it is trivial to adjust the value by eight in
 +the appropriate direction.  The vertical sprite registers present similar
 +behavior, which is seen even less often.
 +
 + As was stated earlier, the 65xx processors in the 64 and 1541 run 
 +at close to the same frequency, but the ratio of the 64's processor 
 +frequency to the 1541's processor frequency is not exactly 1.0, and the
 +ratio is different on PAL and NTSC systems.  This means that although the 
 +6510 in the 64 and the 6502 in the 1541 may be synchronized at the start of 
 +a section of code, after executing the same number of cycles they will no
 +longer be synchronized.  Cycles may be added or subtracted on either
 +processor to bring them back into sync, but this adjustment varies
 +depending on either a PAL or NTSC system.  This is most often seen in
 +fastloaders, where the code depends on the two processors being in sync
 +in order to transmit 8 bits one at a time or four pairs of two bits
 +without the need for handshaking.  As with raster routines, a few cycles
 +need to be added or subtracted for a fix.  Finding the right place to
 +insert or remove these cycles can be challenging.  Instead of trying to
 +remove cycles from the 64 routine, which may be impossible, you can instead
 +e.g. add cycles to the complementary drive routine.
 +
 +  Finally, understanding what problems may arise and what should be 
 +done to correct them is only part of the skillset needed by a good fixer.  
 +In the best case, you'll be working with source code which you've written
 +and understand.  In other cases, someone else may have written the code,
 +in which case you must study and understand it before you can start
 +trying to fix any NTSC/PAL problems.  Often the source code isn't even
 +available, leaving you to work in a machine language monitor.  This
 +imposes some new restraints.  In a monitor, it can be difficult to shift 
 +blocks of code around.  Several techniques are available to work around 
 +this.  Code can easily be left out by replacing it with NOP instructions 
 +or inserting JMPs to branch around sections which aren't needed.  Extra 
 +code can be patched in with a JMP instruction to the new code and another 
 +JMP instruction at its end to return to the old routines.  Where cycles 
 +need to be added, opcodes may be changed; for example, a LDA $ABCD might 
 +be replaced with LDA $ABCD,Y to add an extra cycle.  Finally, you may
 +simply have to resort to a symbolic disassembly (i.e. disassemble into
 +source code).  This may become an absolute necessity in some cases.
 +
 + Then there are the cases where the object code isn't even readily
 +accessible.  Some of the same skills used by crackers to remove copy
 +protection are valuable.  Most commonly, games, tools, and demos will be
 +compressed to make the files shorter, adding a single BASIC SYS command
 +line as well.  These routines rarely try to be deceptive and are fairly
 +short, so they can be undone, often just by modifying the existing
 +decompression code a bit.  It is common practice to have a sequence
 +cruncher on top of an RLE (or equal-byte) packer or linker.  Within the
 +"scene", there will be intros to wade past, while commercial software
 +will often have disk or tape copy protection and purposefully obtuse code.
 +
 + Just remember that fixing is often about creativity and diligence.
 +There is a common set of problems encountered and many creative solutions 
 +to correct them.  With practice, it becomes easier, just like anything else.
 +You'll have an easier time of it if you pick your battles carefully.  
 +Remember that some problems just can't be fixed perfectly.  If you get 
 +stuck, try a different challenge and perhaps come back to the problem 
 +later.  And most of all, remember to have some fun!
 +
 + With all this in mind, let's have a look at that demo!
 +
 +
 +Slow Ideas, page 1
 +----------
 +
 +Reconnaisance:
 +
 + Page 1 is divided into basically three parts.  The upper part
 +of the screen contains a stretching sprite tech-tech extending into
 +the borders, overlayed on top of raster bars.  Then the rest of the 
 +screen features a large Pu-239 picture/logo.  Finally, a bouncing
 +sprite scroll takes place in the lower portion of the screen, extending
 +into the lower (but not side) borders.
 + The screen is built using two interrupt routines, one located
 +at $1240 and the other located at $1280.  The $1240 routine is short
 +and occurs at the bottom of the screen (raster $F8 or so).  It removes
 +the upper/lower borders, performs some calculations, and calls the
 +music.  The $1280 routine basically controlls the screen, and occurs
 +at raster line $xx, at the top of the screen.  It generates the tech-tech 
 +sideborder display, and performs most of the calculations.  Both routines
 +are vectored through $0314, not $FFFE.
 + Fortunately, there is a lot of distance between different routines, 
 +that is, there is a lot of empty memory between routines -- probably it was 
 +coded in an ML monitor.  This means that adding patches, or shifting 
 +routines around, is much easier.  What a forward-thinking guy that
 +Pasi was, to realize that it would need to be fixed by C=Hacking one
 +day.
 +
 + When run, the demo is a mess.  The most prominent defects are
 +that the music plays very slowly, the screen flashes, with the main
 +picture flickering between the top of the screen and the lower portion
 +of the screen, the side borders are not open in the tech-tech, and
 +sometimes the scrolling sprites are off the screen.
 +
 +Too many cycles:
 +
 + The half-speed music and flickering screen indicates that interrupts 
 +are getting skipped, which points a finger straight at too many cycles -- if
 +the next interrupt is set *after* it is supposed to occur, then a whole
 +frame will of course pass by before it actually occurs.
 + The first question is, where are the cycles getting eaten?  That is,
 +of the two interrupt routines, which is using too many cycles.  The answer
 +is immediately obvious: any interrupts that take place totally on the screen 
 +have *extra* cycles available -- 2 cycles per raster line.  The loss of cycles
 +comes in the lower border, which means the $1240 interrupt:
 +
 + jsr tune
 + jsr blah1
 +  jsr blah2
 + LDA $D012
 + CMP #$1E
 + BCC *-7
 +
 +First note that curious $D012 code.  It surely is meant to compare with
 +line $011E, not line $1E.  Line $011E doesn't ever occur on an NTSC machine,
 +though, so it actually waits until line $1E, well past the $1280 interrupt.
 +So the first order of business is to BIT that BCC out of existence.
 + Alas, this still does not fix up the flickering.  The next step
 +is to BIT ($2C) out the JSR tune call, to see if the problem really is
 +cycles.  And sure enough, ditching the tune gives a suddenly stable, or
 +at least mostly stable, screen.  BITting out the other two subroutines,
 +but keeping the music, gives an unstable screen; the tune simply has to 
 +go somewhere else.
 + Finding extra cycles takes a bit of work; for now, it is enough to
 +$2C-BIT out the JSR TUNE and focus on the other problems.
 +
 +Tech-tech:
 +
 + Let's have a look at the tech-tech routine:
 +
 + $1280 LDA #$96
 + STA $DD00
 + LDY #$FF
 + BIT $EA
 + NOP
 + NOP
 + LDX #$09
 + DEX
 + BNE *-3
 + $1290 LDX #$5F
 + $1292 LDA $1000,X
 + STA $D018
 + DEC $D016 ;Open border
 + STA $D021
 + INC $D016
 + LDA $1060,X
 + $12A4 STA $D017
 + STY $D017
 + LDA $1100,X
 + STA $D011
 + DEX
 + $12B1 LDA $1000,X
 + STA $D018
 + DEC $D016 ;Open border
 + STA $D021
 + INC $D016
 + LDA $1060,X
 + STA $D017
 + STY $D017
 + $12C9 BIT $EA
 + NOP
 + DEX
 + BPL $1292
 +
 +The routine has three parts: the initial delay at $1280, and a two-part
 +loop, the first part at $1292 and the second at $12B1.  The difference
 +between the two is the LDA $1100,X STA $D011 at $12AA; without two
 +parts to the loop, the branch would take too many cycles.  Each part will
 +need fixing, since each part uses at least one raster.
 + Opening the side borders requires exact timing, yet the above
 +routine is entered through $0314, which will always have some cycle
 +variance.  The trick here is that all eight sprites are active; Pasi
 +himself wrote a nice article in C=Hacking #3 on using sprites to
 +synchronize the raster.  The basic idea is to get the CPU to wait on
 +a specific instruction; VIC then frees up the bus on a specific cycle,
 +and you know exactly where you are on the raster line.
 + First to fix is the initial line delay.  Since there are +2 extra
 +NTSC cycles per raster line, it seems reasonable to first try adding
 ++2 cycles to the delay:
 +
 + 1287 BIT $EA to AND ($00),Y ;+2 cycles
 +      NOP NOP
 +      NOP NOP
 +
 +Really, CMP ($EA),Y is in general a better choice since it doesn't
 +affect .A, but it doesn't matter here and we were young and naive,
 +besides.  If the above +2 cycles aren't enough, it will be clear
 +soon enough (but it turns out they are enough).
 + Next up is the borders.  Although the immediate impulse is
 +to add +2 cycles per raster line -- +2 cycles to both loop parts --
 +it's not obvious where the raster sync is taking place, and +2 cycles
 +might cause the sync to fail.  In fact, what's needed is just +1 cycle 
 +per part:
 +
 + 12A4 STA $D017 to STA $CF18,Y ;+1 cycle
 +
 + 12C9 BIT $EA to INC $00EA ;+1 cycle
 +      NOP
 +
 +The $12A4 fix uses the fact that .Y=$FF.  A NOP NOP NOP would have done
 +the trick at $12C9 and be safer, but we used INC in our reckless youth.
 + And suddenly -- poof!  The borders open up and the screen stops
 +flickering.  Why should the screen flicker at all?  Remember that the
 +loop is split in two because of an STA $D011 instruction.  This STA
 +pushes badlines off, so that the timing stays precise; since badlines
 +never occur, the graphics data is never fetched.  It's only after the
 +rasterbars that VIC starts fetching graphics data; without the $D011
 +push, this data will appear on the first visible rasterline (hence the
 +earlier flicker with too many cycles).  When an imperfect (from incorrect 
 +cycle timing) push takes place, the picture can get the jitters.  So
 +now we know why the demo behaved as it did, earlier.
 +
 +Sprite scroll:
 +
 + And yet... the screen still flickers, when sprites bounce down
 +too low.  Clearly the sprites are eating into the cycles needed by the
 +lower border routines.  The simplest way to fix this is of course to
 +change the y-coordinates of all the sprites.  One option is to re-do
 +all the coordinate tables.  But a much easier option exists: figure
 +out which code stores the sprite coordinates, and subtract a fixed
 +amount from each of the y-coordinates.  This routine just happens
 +to be located at $1590, and the simple insertion of code
 +
 + 15AF STA $D001,Y to CLC
 +      ... SBC #$0E
 + STA $D001,Y
 +
 +fixes things up just dandy.
 +
 +Still too many cycles:
 +
 + We still have the problem of what to do about the tune.  Since
 +there aren't enough cycles in the $1240 interrupt, they need to be
 +found somewhere else, and the only somewhere else is the $1280 interrupt,
 +during the logo display.  The first thing to figure out is how many
 +lines are needed, and how many lines are free.  This is easy enough,
 +by simply moving the JSR TUNE to the end of the $1280 routine,
 +sandwiched between an INC $D020 and a DEC $D020.  The border will
 +then indicate the end of the $1280 interrupt as well as the size
 +of the tune.
 + The good news is that $1280 has a fair amount of extra
 +cycles available.  The bad news is that the music is fairly inefficient,
 +and needs even more cycles.  But not many more -- just a good 8-12 raster
 +lines.  $1280 is pretty large, so maybe by rewriting some code enough
 +cycles can be gained to make it all work.  Note that if $1280 only
 +had a few raster lines to spare, this task would be much more difficult
 +(if not impossible).
 +
 + Towards the end of the $1280 routine, there are a series of
 +subroutine calls.  One of them is a JSR $1E50.  This code has two loops, 
 +one which copies values from a table at $1900 to a table at $1000, and 
 +one which ORAs a value into the $1000 table.  Instead of copying
 +and then ORAing, why not just combine the two loops?
 +
 +1E50 LDY $1FC6
 +1E53 LDX #$5C
 +1E55 LDA $1900,Y
 +1E58 STA $1001,Y
 +1E5B DEY
 +1E5C DEX
 +1E5D BPL $1E55 LDY $1FC6
 +1E5F NOP
 +1E60 LDA $1FC1
 +1E63 STA $1E70
 +1E66 LDA $1FC2
 +1E69 STA $1E6F
 +1E6C LDX #$5F LDX #$5C
 +1E6E LDA $32B6
 +1E71 ORA $1000,X ORA $1900,Y
 +1E74 STA $1000,X STA $1001,X
 +1E77 INC $1E6F
 +1E7A BNE $1E8B
 +1E7C INC $1E70
 +1E7F LDA $1E70
 +1E82 CMP #$34
 +1E84 BNE $1E8B
 +1E86 LDA #$30
 +1E88 STA $1E70
 +1E8B DEX DEY
 +1E8C BPL $1E6E DEX
 +1E8E RTS BPL $1E6E
 +1E8F BRK RTS
 +
 +On the right are the patches we added, along with replacing the JSR $1E50
 +with JSR $1E5D.  Instead of copying from $1900 to $1000 and then ORAing 
 +into $1000, it simply ORAs to $1900 and stores it in $1000 ($1001 actually, 
 +since that's where the first loop stored stuff).  Sharp-eyed readers may 
 +have noticed that the patch affects $1001-$105D, whereas the second loop 
 +affected $1000-$105F; doesn't the patch above lose some bytes?  Of course 
 +it does, what's your point? :).  The ancient hacker technique applies
 +here: try it, and if it works, don't touch it and don't ask questions!
 +Better than a huge rewrite of self-modifying code.
 +
 +Wrapping up:
 +
 + With the above fix in place, and the tune moved to the $1280
 +interrupt, the demo finally seems to work great.  All that remains is
 +to save it and crunch.  Figuring out which areas of memory are used
 +is easy enough, by looking at the disassembler and the initialization
 +code (which unpacks the code further).  But after crunching -- uh oh,
 +lockup.  A program freeze shows that it is still running, but that the 
 +interrupts are not occuring.  A glance at the setup code shows that $D012 
 +is set, but $D011 is never set -- presumably the high bit is set, so the 
 +interrupt occurs on a nonexistant raster line.  Adding a simple
 +
 + LDA #$1B
 + STA $D011
 +
 +to the initialization routine at $1443 fixes that up just fine, and
 +the program decrunches successfully.  Woo-hoo!  One page down and
 +one to go.
 +
 +Slow Ideas, page 2
 +------------------
 +
 +Reconaissance:
 +
 + Page 2 has essentially four visible parts: a tech-tech at the top of
 +the screen, followed by a swinging FALSTAFF sprite on top of rasters and
 +open borders, followed by the ubiquitous Pu-239 pic/logo, followed finally
 +by a sprite scroll on top of rasters with open side and bottom borders.
 + All this is done with two interrupts, one ($11FE) occuring at
 +raster line $31, the other ($1350) occuring at line $D1.  The $31 raster
 +performs the tech-tech, the FALSTAFF rasters, and also performs some
 +calculations for various sprite scroll effects.  The $D1 raster handles the 
 +lower rasters and scrolling sprites, and also plays the music, scrolls the 
 +sprites, and does the calculations for the FALSTAFF sprite.
 + When run, the screen is quite a jumble -- too many rasters -- and
 +needless to say, the screen effects need retiming.  The music really sounds 
 +better at 50Hz, so it needs to be retimed as well.
 +
 +Top to bottom:
 +
 + Before fixing the timing problems, the extra cycles need to be
 +addressed.  In the $D1 interrupt, after the lower rasters are displayed
 +there are a series of subroutine calls at $13B3:
 +
 + $13B3 JSR $211C ;Tune
 + JSR $0F80 ;Scroll sprites
 + JSR $1300 ;Clear $7Fxx tables (used by JSR $0E00
 + ;  in $31 interrupt)
 + JSR $1D00 ;FALSTAFF sprite
 +
 +Deducing the function of each routine is easy enough -- just BIT it out
 +and see what happens.  BITting out the first three subroutines frees up
 +enough cycles to make the screen stabilize.  Finding cycles is usually
 +more work than fixing up timing -- especially three subroutines worth! --
 +so it is enough to $2C-BIT out the three subroutine calls for now and fix 
 +up the timing first.
 +
 +Tech-tech:
 +
 + At the top of the screen is a normal tech-tech, controlled by
 +the routine at $11FE.  The code flows roughly as follows:
 +
 + $11FE Set up $D020/$D021, waste a few cycles to get timing right
 + LDX #$08
 + $1214 LDA $xxxx,Y
 + STA $D018
 + LDA $xxxx,Y
 + STA $D016
 + INY
 + DEX
 + NOP NOP NOP
 + Change VIC bank ($DD00)
 + CPX #$00
 + BEQ $123F
 + NOP 
 + NOP 
 + NOP
 + ...
 + CPY #$2F
 + BCC $1214
 + JMP $125E
 +
 +The thing to recognize here is that there are two loops -- on every eighth 
 +line the BEQ $123F branch is taken.  A simple cycle count shows that the 
 +first loop takes 63 cycles, and the BEQ branch adds an extra 20 cycles:
 +obviously, these are simply timed for the normal and badlines.  So all
 +that is needed here is to add 2 cycles to each loop: I changed the
 +CPX #$00 above to INX DEX for the first loop, and changed a NOP NOP
 +to a CMP ($EA,X) in the $123F branch.  With the raster timing correct,
 +the next step is the initial timing at $11FE.  By doing a little rearranging
 +of code two bytes can be freed up, giving 2-6 cycles to fiddle with:
 +
 + $11FE LDY #$0B LDX #$0B
 + LDA #$01 LDA #$01
 + STA $D019 STA $D019
 + LDX #$02 LDY #$02
 + $1207 DEX DEY
 + BNE $1207 BNE $1207
 + STY $D020 STX $D020
 + STY $D021 STX $D021
 + LDY #$00 NOP NOP
 + LDX #$08 LDX #$08
 + $1214 tech-tech loop
 +
 +As you can see, by using .Y in the delay loop instead of .X, the LDY #$00
 +instruction becomes redundant.  As it turns out, just +2 cycles are needed.
 +Finally, there is the matter of the last raster line.  When the JMP $125E
 +is taken, there is some delay before changing the border and background 
 +registers, to get a nice solid line.  It turns out that four extra cycles
 +are needed here, and fortunately there just happens to be several padding
 +bytes before $125E.  By changing the JMP $125E to a JMP $125C, two
 +extra NOPs are easily inserted.  That takes care of the tech-tech.
 +
 +Falstaff rasters:
 +
 + Immediately after the tech-tech are the rasters and open borders
 +behind the FALSTAFF sprite.  JSR $0EA0 handles this part.  We already 
 +fixed a sideborder routine in the first page, and this one is similar:
 +
 + $0EA0 LDX #$05 ;Initial delay
 + DEX
 + BNE *-3
 + LDX #$15
 + CMP #$EA
 + $0EA9 BIT $EA ;Change to NOP NOP for +1 cycle
 + LDA $xxxx,X
 + DEC $D016
 + STA $D021
 + INC $D016
 + STA $D020
 + LDA $xxxx,X
 + STA $D011
 + NOP
 + NOP
 + NOP
 + DEX
 + BNE $0EA9
 + LDX #$02 ;Change to LDX #$03 for last line
 + delay loop
 +
 +As before, +1 cycle needs to be added to the border loop, which is
 +easy enough to do by changing the $0EA9 instruction.  The end delay
 +also needs a little change, to make the last line nice and solid
 +(there are no sprites active on the last lines).  Finally, the
 +initial delay needs to be changed, to line up the routine correctly.
 +I changed a CMP #$EA at $1277, just before the JSR $0EA0 call, to
 +NOP NOP.  As usual in this type of thing, it was easy to simply
 +experiment with the initial timing until the borders opened up.
 +
 +Bottom rasters and sprite scroll:
 +
 + Finally, the bottom rasters need fixing up.  Once again, the
 +loop looks familiar:
 +
 +   $135D LDY #$FF
 + LDX #$55
 + CMP #$EA
 + NOP
 + NOP
 + NOP
 +   $1366 LDA $7F02,X
 + STA $CF18,Y ;Stretch if necessary
 + STY $D017
 + LDA $1504,X
 + STA $D011
 + LDA $1C32,X
 + DEC $D016 ;Open border
 + STA $D021
 + INC $D016
 + DEX
 + BNE $1366
 +
 +And once again, we need to add a cycle.  As with page 1, .Y=$FF means
 +that the STA $D011 can be changed to a $CF12,Y.  Changing the CMP #$EA 
 +to EA EA adds the two cycles needed in the init to get everything aligned,
 +and poof -- instant open borders (as long as all the sprites are being
 +displayed correctly).
 + When the scroll is activated, something else becomes apparent:
 +as the sprites scroll into the left border, they "pop" to the left by
 +several extra pixels, i.e. the screen coordinates change by too much.
 +To fix the sprite popping, all that was needed was to add 8 to $0F00
 +(the sprite coordinate).
 +
 +Too many cycles:
 +
 + Alas, the moment we've been dreading has arrived.  Where in the
 +world do we find enough cycles for three subroutines?  One option is
 +to get rid of some effects -- for example, the sprite scroller has
 +many time-consuming effects that can occur; by getting rid of those,
 +the tune can be placed in the $31 raster.  Working through the code
 +doesn't reveal subroutines that can easily be rewritten.  Still, it
 +sure would be nice to get all the effects going; but where to get the
 +cycles?
 + A little thinking suggests something, though -- the PAL
 +routine can't have THAT many extra cycles, simply because it doesn't
 +get cycles until the raster routine is finished, at the bottom of
 +the screen... oh duh.  A glance at the raster routine shows that
 +it covers $55 rasters.  The interrupt takes place on line $D1,
 +which means that the rasterbars extend all the way down to line 
 +$0127 = 294 or so, which is over 30 rasters past the last NTSC line.
 +So suddenly there's a great big chunk of cycles, for free:
 +
 + (Orig PAL) (Fixes)
 +
 +   $135D LDY #$FF
 + LDX #$55 LDX #$35 ;Only $35 raster lines
 + CMP #$EA NOP NOP ;+2 cycles
 + NOP
 + NOP
 + NOP
 +   $1366 LDA $7F02,X LDA $7F22,X ;Add $20 to compensate for .X
 + STA $CF18,Y
 + STY $D017
 + LDA $1504,X LDA $1524,X ;Add $20 ...
 + STA $D011 STA $CF12,X ;+1 cycle to open borders
 + LDA $1C32,X LDA $1C52,X ;Fix probably not needed
 + DEC $D016 ;Open border
 + STA $D021
 + INC $D016
 + DEX
 + BNE $1366
 +
 +Note that the table offsets need to be increased; without that, the sprites
 +start stretching all over the place and everything goes weird.  With $35 
 +raster lines instead of $55, the rasters go all the way down to the last 
 +NTSC lines, and free up just enough cycles for two of the $13B3 subroutines 
 +to be re-enabled:
 +
 +   $13B3 JSR $211C ;Tune
 + JSR $0F80 ;Scroll sprites
 + BIT $1300 ;Clears $7Fxx tables (sprite scroll)
 + JSR $1D00 ;FALSTAFF swing
 +
 +That pesky $1300 subroutine just pushes it over the edge, though:
 +
 + $1300 LDX #$2F
 + LDA #$00
 + STA $7F01,X
 + STA $7F2D,X
 + DEX
 + BNE *-9
 +
 +It doesn't take *that* many cycles, so one option is to use even less 
 +than $35 rasters.  But this makes the bottom part look awfully small, and
 +obscures parts of the scroll.
 + If you think about it for a moment, there are some free cycles
 +still hanging around elsewhere in the code: in the tech-tech routine!
 +There are lots of NOPs inside of the tech-tech loops; enough to piggy-back
 +the $1300 routine into it without much effort:
 +
 + $11FE LDX #$0B LDX #$0B
 + LDA #$01 LSR $D019 ;Still 6 cycles, -2 bytes
 + STA $D019 LDY #$02
 + LDY #$02 DEY
 + $1207 DEY BNE $1205
 + BNE $1207 STA $D020
 + STX $D020 STX $D021
 + STX $D021 LDX #$08
 + $1210 NOP NOP
 + NOP NOP
 + $1212 LDX #$08 LDA $1887,Y
 + LDA $1887,Y STA $D018
 + STA $D018 LDA $1B87,Y
 + LDA $1B87,Y STA $D016
 + STA $D016 INY
 + INY ROL ;Replaces LSR LSR ...
 + DEX ROL
 + NOP ROL
 + NOP AND #$03
 + NOP STA $DD00
 + LSR LDA #$00
 + LSR STA $7F01,Y
 + LSR STA $7F2A,Y
 + LSR DEX
 + LSR BEQ $123F ;Every 8th raster
 + LSR
 + STA $DD00
 + INX
 + DEX
 + BEQ $123F
 +
 +Using LSR $D019 instead of LDA #$01 STA $D019 saves 2-bytes (6502
 +instructions like LSR use a "read-modify-write" cycle, and write #$FF
 +to the register while LSR is working, which is why LSR $D019 clears $D019!)
 +while still using 6 cycles.  Replacing the LSR LSR ... stuff with the
 +ROL code saves another byte.  Moving the DEX down saves two more bytes,
 +and getting rid of the NOPs saves three more, for a total of 8 bytes --
 +just enough for the LDA STA STA which replaces the JSR $1300 code.
 +The new code uses two fewer cycles, however -- but by rearranging the
 +initialization code we can just branch to a NOP at $1211 above.
 + Every eighth raster the branch is made to $123F.  This routine
 +performs another INY, which has the effect of skipping every eighth entry 
 +in the $7Fxx tables.  Thus extra STAs need to be added:
 +
 +   $123F BIT $EA BIT $EA
 + CMP ($EA,X) STA $7F02,Y
 + NOP STA $7F2B,Y
 + NOP
 + ...
 +
 + The two STA xxxx,Y each take 5 cycles, so 10 cycles exactly replaces 
 +the 10 cycles used by CMP ($EA,X) NOP NOP.  But since the STAs take two more 
 +bytes, the rest of the routine needs to be moved forwards; luckily, there 
 +are empty padding bytes immediately following the routine, so it moves
 +forwards without a hitch...
 + Well, maybe with one hitch.  The whole tech-tech routine uses
 +self-modifying code all over the place.  The modifying instructions
 +immediately follow the routine, and so need to be adjusted to the
 +new locations.
 + Finally, for some strange reason, the above fixes also affect
 +the FALSTAFF rasters.  Adding an extra +2 cycles to the intial FALSTAFF
 +delay fixes that up, though.
 +
 + So much for extra cycles!
 +
 +The Tune:
 +
 + Finally, the tune really does sound better at 50Hz, so a 5/6
 +delay needs to be added.  There is some free memory at $09xx which is
 +ideal:
 +
 + $09E0 DEC $09FF
 + BEQ *+3
 + JMP $211C ;Play tune
 + LDA #$05 ;Skip tune every 6th frame
 + STA $09FF
 + RTS
 +
 +As the comments say, it simply skips every sixth frame of the tune, to
 +give it an effective play rate of 50Hz.  It works!
 +
 +Glitches:
 +
 + Unfortunately, there are still a few glitches in the fix.  The
 +bottom rasters have some flicker in the upper right (and occasionally upper-
 +left) corners.  Pretty minor stuff, but still annoying.  Fixing means
 +rewriting the raster loop.
 +
 + Much worse, though, is that the screen will glitch badly when
 +certain sprite scroll effects are activated.  This glitch seems to involve
 +quite a lot of rasters, since even with the tune disabled glitches are
 +still evident.  One choice is to reduce the number of bottom rasters,
 +but that doesn't look very good.  Another is to eliminate effects, but
 +that's no good.  A third is to do a big code rewrite -- bleah.  But the
 +easiest is to just call it a 95% fix and say "good enough" Good enough.
 +
 + And there it is -- Our First Fix.  Hope u lik3 1t, d00dZ!  Next 
 +time, we'll have a look at some of the routines which weren't covered this 
 +time, such as fastload and FLI routines.  Until then, have fun fixin!
 +
 +.......
 +....
 +..
 +.                                    C=H #17
 +
 +begin 644 slowideas-ntsc
 +M`0@+".\`GC(P-C$```!X+##0Y@&B4[WP")W_`<K0]Z*QO4`(G?8`RM#WH%;*
 +MO9I=G8CXBM#VSC$(SBX(B-#M3!4!@`*-``CF^M`"YOM@I/BB`R`O`H7XF*(%
 +M("\"(/D`H`"8H@,@+P+%^-#L(!$"A2U*T$`@)0)*D$@@)0)*D,[((!$"A2W)
 +M@)`+H@$@)@*%+2`1`J@@$0*JO3("X""0!HJB`R`F`J8MZ"#Y`,K0^HC0]_"L
 +M(!$"R?_P).D`H@`@+P*%+B`C`F7ZIBV%+:7[Y2Z%+NBQ+2#Y`,C*T/?PTZDW
 +MA0$L,-"E^H4MI?N%+EA,0Q1(K3&D[@("T`/N`P(JA?=H8.B*!O?0`R```I`2
 +MZ.`(T/+P"Z('Z`;WT`,@``(JRM#U&&``_R`#`00,$`(?,*#P"`]`@`8'L`HD
 +M8"[@&3]*<+;`3V_UA_)G\!>0DGS^DDZ/S]-W3I-]^)NJ8#A@0$H_UAG0"VQE
 +MA\`/P&)M)PGCPIN1\?/CXG?OA&4_/R+Y-$\^M-A/)/?WXG`"!@X>/IB>?>GO
 +MX)43(8#@"C]P&`/QF9FQTXQV!G;%7Q#YB/_G3C/&1\8ST[J$A$VD]^%-E-A-
 +MXT*"%9-Z462:(>$>B/!-$<R/)'<CJ3WZ_S]3D_D0">R:<<"GA@>'PJ:`,//W
 +MY5\)H!@*P7,-//7S]U64H__Y%2MSD5?Z.]9("=`8,&!"=?R,7X5>@2<ING@F
 +MX>$!P)J'J"0Y34Y!TYKT%!3T5)G]!@+PG0>,6%.G7@,!G(F\0>GQ,$!#IZ&R
 +M>])HMDA9EP@33HP<$]]U3DM2P"`P&`P",!(SX0=_P!<IWZ)"44G`GH$K#?0:
 +MIS7(F\W.`9D(J_T2-/04]/83$>`<@9\?`0,>```IBQ/CHB(A6/@Q,2$@<)TF
 +MRLWD3=5DW)N2R^$%7GYK,X%LK(WDZ?C\/`TZ0Z++H^/#`3P`0=9>'AP8:PX%
 +M9#)TI$):>"-9/0!6#N/OZ<C^?P'PGF)P@3@%50G,IP$9Z<[;J<!TC/R&<M,=
 +M.83I2^2U,14V*P-_#Y82A^^."RZ/@\6#)_#X.G@!@\.LNC/6F``K!+@.#P>$
 +MZ!Q\^>%ET+4]/Q`VGI`'ZE?TWC38_OY4?((DP?4,XZN1G2I2@0*$2R:'!7/"
 +MP`%>\5[ZAUK#KF+L?5Y7<K/C\MHU3\<'P>'J0E)4_^[`#7A'9V9F9V=CX]KQ
 +MLQV9]-RU95O(<#@Y7C;A:Q['_30KRN%TX5N=TP0&M,$`/K).W$JZ,5H0M(]H
 +MH'(*>JHA^N&TPK5PNR/<E*M+,08<??GA3*KT'*];KJC"<&%ZD*G%=S6\\.NX
 +MIAW<'<.ZJ!__EL2J+5%"E;!P='BB"<>%@T.+"D\'UD8:\=[$37OF`5YY4JJ]
 +M0!^:?])C^KS'\^H,9]/^/H[O]UE_^*]P)N\>]H2LR6T%1R\LDM/ZNZ#/@!_Z
 +M]>$`KWNQ&G!^/UE<V.4LJ\G__HIAP\>7&.ZS)(>6'JE9!T)+8V?EEO+9.40:
 +MWDKO6ZCB.6V$MC=A^?V=VY3+1HX61;MRA`]@`KLMMY2%KRLH*?VMBS4_<9%:
 +M[BZAI`UI=:LK&H!W5[[,@%'`_K+F+599+BW$+:V."EI=P,K+;F8<!<W,M>%B
 +MEN'131>*3-CHMLI;$P?H063$MK=1&_/"ZQ!UQ;AL'[,#MR:J==$.Y/]QJ2^&
 +M"O0/!*\LA`KRN[I,!!7D8"%QHX!JV_B,#!CQL>E<4];ELGS&_8#Y<:T1\!/Z
 +MXPP:'C+8D<!CP@>'<-B,&!BML^&*W-@.*X/V!^!ORL!JX#+G.%6\0'8L_"FU
 +M3.L;C'C8T9#UQQF9FQVL`S=ORJX,*ZM/E;SX&/8L*2E++S9F?,QZXIF<8-:V
 +M/`9\:>U<?D!\#'@"6:+PZN!FZP1>,13_W0!\28^0CH'>H00)X14_W<`CI$X1
 +M7U!M-?A7.%MT1`(!$0YK#&N>&,S;#Y`P4)$[]9:F*0M9`.9F8T77FL-C;S-F
 +M:Q%-C9CL##8XKJ$(!)R$_95&LDA+R`OZNB"Y?L!"@=72P0H+"@]2`0H%"@E2
 +M"0H-4F4*)$$(%U)1"B=`!]#\!/R$F)P(/#6(,8PL$"P0J!2DFJ">GJ"=XAGD
 +M5&A0;=`NSS/)]\LVPM#@$N#"EC^"\?WV&?87^8_`S'Y_X_`__'.\?[R'+_+]
 +M$_P4&Q0;]1KV"2>H!VCG-]<WYV8.++6V+BVM\_?<7W[/W\WG]OCO[(""@\'#
 +MPH"``8.`PT##@8`"PSQX!@6`!(*!@X&"A/?O"@F)"(@+BPK_R[XK0#<+0'<*
 +M1#0Z=FGBI@8T-W*D`C1K0J>J-%0.I,8T4`W'B,:C/-G<-QHBS["(T69]BK.Y
 +MGV`QHSH+%$/WO`(SH`"90A[IC/INFG@@212B`+T`5&=6!T:'OW6PCW7(C6L_
 +M<G`T.IG5"3K8ZZLQG5GLLN\@3A18:8&11I"@+K-T&<80ZXPP$[@D$9QU)NSI
 +M6$P-"&<`"Z;VG]TR_%$@4`E&B6A',:(QPP?[IH8P$&@00`F0``JVHH0*`\02
 +M`\S):8!%O@J1%PCLXG'**EA@*5K,/)&B3Y9X#R9`]3>!`SK=>K?H5,M&@&[0
 +M?YB`=751!.5H?M$OL51!R?V<+:$:0Z'<SZO6F`0F1C/C!=GN`.I7*?A<,:SD
 +M<</<R;RA##>1XQ-'Z($<6=3+N*.I86C#S*!B(P[T!-P?$"ZS]`!-AR)-G=A#
 +M^@']V"/UK/W)--`%J3"-9[]V,S]RF=(16E(FD@,:S[KF>;(H6C<!G5BN/<TC
 +M<<?BAAI)'*I5ZY"XO7)1>98_&YX_0`]R0#0P\E`T4O\RCWB!#QK3!'BVYP^C
 +MQC4>[`GW43_>P`VI!Q%\.3L`CZ@$?0`"H]!U'HCZ@$?0`#(+-^BH+T_&IW_U
 +MT[[)T_V;W?1YS^PL//?V4#?&NJMH@:M0I%)_47(`,SO!L3H1LSI@C]2>&?L`
 +MS]J&:0AT/N?ZQAG18!!H#U8PVHLAU\,.:+0<?#VV*DVA0&I<S75SMSVH"9>!
 +M`#3;RC""N$2!3%$P`$I;,,$PZ9B2B8^#\?Q`$`?W[]_7Q[>OGY>'?V]G5T\_
 +M-R<?#P;^[N;>UL:^MJZFEHZ&?G9N9EY>5DY&/CXV+BXF)AX>%#_C[?8,CNAT
 +MPY8<.-#;R,G*AHYF;G9^AHZ6IJZVOL;6WN;N_P</'R<W/T]79V]_AY>?K[?'
 +MU]_O\`24?$16I-8HT2%9D'5H\:]T._0`^Z'?D@$CM(!`5,(%N3_Z`-)C]3"`
 +M52"E@2I7_5-!2/Q+N6/J.Y/J4@$$#1QVYX_,H^;`K&&T'&E'NFHJ,-,!,B`U
 +M6YB.@8&EB]^:LWO4N[6YR.LH4NOC*GZB!XH*J+U1>](78`:/L$"BX0T)D`T(
 +M3_O$:]S`"B.X.I/^9`="]1:3OP#WJ+2=)]#*$,Q0="^A&CFA'#N@P)_-)?J\
 +MP,3(S-#2UMK>XN;H[/#T]OK_YM\AH>)BHR.CY&2E)66F)F;G)V>H*&BHZ2EI
 +MZBIJJNKK*VNK^WDL;*RL[.TM+6U[ON[Z_6_KNYT<Y.<'-RQL;"OKZZMK*RKJ
 +MJFHIZ:EI*2CHJ"?GIV<FYJ9F)>6E).2D9".C8R+BHB'AH6$@H&`?WY\>WIY>
 +M'=U='-R<7!O;FUL:VII:&=F961C8F'MYU]>75U<6UI:65E85U=65E555.?ZG
 +MS_4N?_>OE%0^W_]/#N_*7C?\;/-15YGJW,I8Y_\PN7WFV#G_RS7EY?7^5+#S
 +M_8F)CY_LG/]EY_LW/_N_,_>OFAI^W_]/#QS>-_QL\U.9[%\&OPU<M%OX-?&W
 +MCAQT4$].34Q+2DE(1T9%1$)!0#\^/3LZ.3@W-30S,C$O+BTL*RDH)R8E)"(A
 +M(!\>'1P;&AGS>E\[R0\.#0T,"^WE">W;MX^WB[?`O;7=QWUX]W';7.3G!S<\
 +M\#>%!88&AP<'B`B)"@J+"XP,C8X.CQ`0D9(2DY05%9:7F!D9FIN<'1X?'Z"A
 +MHJ,D)28G*"BIJJNLK?B]]?O/[]'[\/S\7SX@/M]^/P#^7]]/WX/'IB[Q@"^7
 +MX!?;^^G[Z_/7UW[>('^KV^V%]K/Z?OTEOQ0WV=?DR?9:[Z:]''Y"4%_%]]P%
 +M\_@L,\?O/SN;#_'[S\[G<!]?O=S\O;X=?PX?6S\,_QC]T!=NW;R]L\_.?`%W
 +M0-S^!@[G]S]`PX#[N?'SZ\N?WCG_C:'FOW@Z%>/WGYW/*#^P,\?H.`^OWNY^
 +M7MZZ_7(%?#9^&?XQ_\1(>J'UF<P?E8<^?7E]+\9,DMD?9:OR*G"$RQ%7G>0[
 +MWT[WXN_>ZW\_+]?Y[F>_E_-,_#]A9W['SW,]_>N:9^'[RSLWA;&?A^^O_._>
 +M>>?A,?W%L9^'Y67\[\NYY^'=R;&?A^]\\3/7+<6QGY?OC>%L9^7[YWA'&?Q<
 +M@0'FH("Y^F@P/G>P2%9L9J%AF:AH<'YZH@(Y\Z)">SGAT;`UIG=(!X@'R$BT
 +MSM$Q.4%)`5%986D!<7F!B98V"`S-#4@-M6P%FYN&:-C%@'G!N<X^CH[(#P]/
 +MC\@0$%"0T31L(J,C[#82$G-4I+3$U.3U!.45)3(%15SS597H%A9T;"TMKFPV
 +M%U>7V#/586)C9&5F9VAI:FO.5LH&W-<;#<WN#CJV'(@<W1U=G9WSE>'EZ>WQ
 +M]?G\Z@('.6"@X35L0L-#Q&RV(F*<HMSC(V.CY"1DI/3:A+S!!,D$UKM,FY_7
 +M:7C_I:;5L81]%93U$=4U6SL_L;(@LR"TH+6VMZ"XSW<V+FZNR"\O;Z_SER0(
 +M[!PL/$4XUV1DIKE99!F9MLN+83\USL\@T-$@TEQ;&FL<7[94XOI!N[RG%[XN
 +M/DY>;GZ.GJZ^SM[N]?`6":^'CY>9`OA-CT]?;W7%L?"?Q<_-`#T0=<_`^,-N
 +M`/J<9:=`-"I&)T!T,K*J0V9)]"($.2B_U.-(.Z$<IQI!='("QI*KU[29'V+T
 +M4!0"219H#Y?<7T^ZJS&-Z5$:X#U;A$^F\>HE^M4"C`9,YLX"(=Q/(SI$F.<G
 +MZ==(DGO$&<Q1@)140?.L`A.N!/V`)^R!/V@)^V`@3FZZW%)>WY+T4K,,?J?^
 +M9)O97@&3!$I,&*CN)U)EH/1K"(&/U@`([;)N!%R`"!13X$2Q"9)\9!,7Q8"_
 +M4H@`8?L!!?L$G[A$_8`G[`D_8(GZ@$_4$GZA$_0`GZ`D_0(G[@(!-PG[A$_8
 +M`G[`D_8(GZ6\!-PGZA$_0`GZ`D_0)`Z"?_`4?Z%@22-[2*!.D_2?2"3Z0<K0
 +M\:U;'S.1K&D^JUA.'N3Z.#;4OACMJ7TQXT`>4P*@^0`#K]B-#TZNISLX40^R
 +MYBJ`'F?@_&&FD!B!#W9]!%56T3PP6?62R8XTS@=D'`F?B`FR`=I:<,R($#-@
 +M$^/9!=[WK2`KS(/\_H@>IH)T0&D.`U.A`UE"'DJ@A@P22&!XD*@`_@!3P^@?
 +M_HL__P/__X4?K\^?CX</G\C^315^^?_/*/UY_SQ1VGP`C?`?A1K*-!1E*,3X
 +M1<)AXL/U^6'[_JOT!1R*/U&]@*/T'Y^!1^A^'X*/U&,C#53GXH_4:C\H_87,
 +M1L(_<!'[P(_?!<G[P++KP`%3QKCPC]/$?HXN3]4>/PFG@FG!"KH0.=%)A_#_
 +MS^#^C#31#Q^(_?!8?2/11W/ZV'US(`H//\`>(\T$/P@;_$?7XCT_D=W\>)H\
 +MIIYK#Z4>B.Y5]/*L]/Y8;GXCN^%AE0"NQ<`17IB=B@(0YIV)BJ)`?Q5]`:KZ
 +M3I5T(B``'3L4;(`?IV4JTZEE@`Z\K``%P7J$T/@%7T#H_1]8>]`#\_\/\?\?
 +M\/\_\"C]?D-9\C]'D?H<C]!D?J-Y'$NS]?^?\4?JDUA_G\$8F`0(J#]>-^J%
 +MKQ0%(U4!Z%G^CU)+KRMD_/`.<X`<YP`YS@!SG`%E^J/11W*.@!SG``YSA9?J
 +MCT7D:U2@@CD28XCU1MCB-(XX%I^H]%7<CH5<0#CJ/UQP<?[XX[\]QR.+CA'2
 +MBT^T47O@`''`8;P`,'@`<#P`X"':`'@<`/`X`>$97@C$>$7QXBX'\!5]*/15
 +MW#BKB5;B-91H*LI&(&#*8=IC^F?R9V)F2F3ZP\?=,YDS<20`"YP%9,*Q>CG[
 +MOG/[?/?R?>_P__G@_^/A_X?`@1Q`:)\'^$2RD\T;::0*:<Z?RHDE(P`]&`/(
 +MP#Q&`<(P#Q$J//_`'C_@#A_X'L?\/</_.<#^A5/_!X'_@\!_X<`?\\1.(24>
 +M")!1%(^@.H6L0#\M8B5<1_^B_S_`?A_@_`_Q_@?X_P/P?X?@/\T5JM#,`!61
 +MF_+#*1B;#FCJ0H?"/K\.?]%"C]4?2/3^1W?RP[OA'=P'"8X)G`L/I1Z#B8N;
 +MN)`#\5IHL8%>`A__`Q1^O&?\/$?\?@/^?Q.^?[DC]\#Q_^4?OW.'__/(_=8?
 +M_^,/_\-&F`HQTZ`T3'@B2_'-5#?XXFBCZ<UB7RKNS_P<A_`X?$3!\B2'T?0?
 +M`'`/@#@&AN`?!$-\(@'!'T0/RG;?#X^.']_>/?W\>/CX3OM3#!,/U<-/`@,^
 +M%C&*&)@<H_5'^FY#Q_?WCW]_#CX^#`F]-2K$]&[_##_^#!_\#`_X*1Q&$30P
 +M!P`P`IT,+;]3%Y)+!2N$M?!?H>L/T>?T82F0937Z'J&50!ID:IB>6,3:L\A^
 +M!^%'ZLZU5G62LZO5=6*U7Q;U,GBU$"E3X1./E&#^H_7S\/WY'Z?/R)5'Z/GZ
 +M)*__`^?15[_P#YZ*OO\`-15^_``\>`H_0#!0=(O<`\`>!%=@(OX!_@0`_PD/
 +M7(A4R$)<@AA)$Q).5QX`)_``1_@`@_P!`?X"`/\"`'\#`#X(@>!&(D@$R<BI
 +M`6A4N-FUI^WZ/V;1^S*ZOVY1^_JU,!']P_'CY_'WY^%_#\`^'\`<'X"N28_4
 +M?JP&/Y77T`_"'11^^"&O@<$;J)G=1)S^^?Q\>?IO&"+,:GX\3OS\C[/#S_/!
 +MC_&!G_F%\;<`<&`P&/!X/(\C]X_QXQ_XQ?/Q@`:/E<HVI(2^AL`($X`<.`\^
 +M?/4?OCAQZE@%Y'Z@!#UC,X/HS#Y_@%J2"ANL$^P!@%7ZI4('@#@/6$DH^E'H
 +MK3!5RI]Q.G]XA`?$S^7L?KXMOTX5?J='"XNYF`.'`4``'#H3,='USX"/U5XI
 +M_)4`/GP"C&1F+B_5F3:C]7J=RK]4Q^^?`*@,&`++]3@?5V'_CRCT84?KPF(]
 +M%8GHY3Q'Z&++]3#Q'7\*.A<&4P+`=.`\`<!^`X#G!P#!%.<XZ+>.``\<6+W/
 +M"K]5]X+XHM^.<1^ABKZX4>G!X*TQ^`!6V:S8Q=[0K&8]7C$*/V933#33G5?3
 +M_A_RM:X'\'P#X!D0,`KI[^%A^O"Y:9D_D`I7C:AZ8/+!2.%5TJO?!>-^K(T?
 +M%AK(T%64C$`U&"!X``@P6&\X+9Z/%XWZLL!0K>"K01E*H4^3[`.#@`''3.Y5
 +M,`ZLZ%7ZJC$=R.A5Q)]E4GW'RP_1Q5^@*,99?JR\5IRI]42G\HN%23Q<9+?R
 +M?G*D9;?J?J1J?TRY9C6A;-[PNDJ587+W.E7G4JP`5RL<".3`#P'P#@/P'@)3
 +MELG"\[]1AO`<@(1=+CKT9%>%*.*GL#6>:J>+Y#]6.%NB`?U8L*GV!15`"P_6
 +M#P`^'@`<-><;F`/@/"(#X6'[X!2,962H<CF0\<`<P(NL%8"BO3C6!`/IBX5>
 +M5JWP`RC9`4":L:$`_\`!*QQ0U;2`"P_5><FIET4?J'8'1^AR/T<5?HP/K&H]
 +M':F+;]5Z.P_@%@^L9VT+*&T`<$?K`M.5%(CKX!Q<<=KPL<VEX/%A^GP`N/5]
 +MRD`:!)7ADH_4%*O%=3%97K#`'X'P0">"C)7-^CRC#`5KA+*2`2IKI`63SIR4
 +M)'"F'8&,"S?_=3#'[B8!]<2]?+U?O];U42"Q>6[#Z2MD)[E^T]+I2`\#3H`+
 +M719`F\'[9F)IOWB@`RZ8%AZ@*?MK5.+P?MDZZ:ML6*;AQ673]#+9Z4`[H`8`
 +M#7Y5X84AR^YUHM^FP!ZL#KKF;(-8,7C@RNIC7BX;K5CX7&4E\N&&/W$!@>XZ
 +M!`#X*=?D7AQ`+Y'C7S(EZK&^%,0%\ANN2N!U@'>.,#_\+K%ZP\`'9LDQ[UQA
 +MN5W/&]9Q"$`X4_I!@JX%"P0.?V`8:!!S^ZX!#G]QW_C?WKF];W-CUI<S.9'K
 +M"Y^L$@H4'COL##`\<>AXV^+_\B_]<WK>YL>M+F9S(\8,!_WJ`\?\AS_[=.YY
 +M.Y[^[]H=WT]^3KZY_6_XV/&ES-\9'C"Y`=SSJ"AW/!W.?=O=X=^1ZY^[?&QX
 +MTN9OC([GM_[Y`>('Q">(?]$7ZE_$WR=\4'*/Q2^JG]%KXN?%YZO__>L#_OX`
 +M>,!P]7OJ[]?_>?!WGGWJ]\.'?R'X,[O5^5C\J7X37PD/A#%A<8&1H;>^WF0$
 +M)#14=(2DOWT'WGH/_/=IJWV_U7\/:7):4D(Z*AH2`?'AT<&QH9&!<6%).2D9
 +M"/CHV,BXJ*"0@'AH9Y[4D'!@4$`^W'OAGGJ!@@+YZ5T)"@P-#Q#SVKPN,C8Z
 +M/D)&2DY25_]\@(*FP.F!OX%$PP/%R`)9>@(F6$`@`LP"`Q;S:0##P0)#@<ZX
 +MB`!#`(%<=#BUI0<2`08)&#H@?-UTX:*B82!NNP*9W!X*'$`H"ACKHJF?`P*"
 +M;XM0L!F?`F*,P`9G=GMYM,*,2A-D()O:S%Q()%'$:6-J$`(L"D`R'BI`"L^!
 +M)BZ"O"J`P@M=?9`"!X<SC%V:K/83$'&<"B9^R&8^LP6&X>%LM0(/9FD)"VH"
 +M'`A`)`H:S^<4I"]IX/9!DP@*EID9G),0!H"P+9!L[&%XDS#=9P2\KEF6P:!6
 +M?+*$!%'7"S(`P%ETR5#R`#8!MN`RQB`A44>#(%ASLQF4H:0,]R`'9!LD&(9`
 +M\S>;>AP>!H:S4HWQE#7ECTK&"`*,`(&*!@RP[=>`N"O(19?.#T%!A1U=,T`T
 +M/+1</$@P$9;@+KI`7#.5.IPJ>5FSJ8N/$174L\&YER\NP4"6VV2XD,N2W<<C
 +M+UZ3;%!EH\$H3`1D_/VU&043(7E]T_CQMY9+=M0Q<!7%RQ;#B=R:(JS!!A5Q
 +M8.3N!78RLB`QG,\SL%1-XF$RC$W7B'O,W6-[-QCRP\!7$2\BX!#0D'`2UG`'
 +M"C@-$WF8;TGF9[K*$&>;/@.`0QQU-MA[ET""#<M8`4CAX9IN@@99\AXRSO(&
 +M8@!2B;)$$8&,@Q1Y>%&&LF&4`FXD6>#S`X-9I51.]I(GHF\7'Y*AR+(0'B#S
 +M:UA\%L]WBPSLFBQ]QF`D`<"O,3BYQE/9B#!EUFAP6\P]=K4,O,#75X\,@4#W
 +MF'+HK=:H.ZN'74Q,8G.QX90/-H'0.$./,H>9+!H"Y?AP"N'AX?!:\4A=;SS-
 +M-X:C"49%V;#;T%+&P3<)H2\I4"=QT"(JYC]=?3E3`QC(R^<J\R:%01G@]7;=
 +M-`D"/*S>I\L^6!KE505U3A[IY?`&/!!!'4JVKS;9F&Z=QEF6WHWJX7"VK\>*
 +MH%&'K!XZD60("".-MTFO%>GO/\]S/$WE+MZL'X\3?"U3VU2]Y4[EI@=B@\8G
 +MC(V+C$R9^G)P<LJC$U+C`S;M@FU=F&SN>\UKVP'O-67.8<`AG"]+(7=$KAB<
 +MS9.V8`64KH[K79#,%@$29`O-/`%Q5@H6[$-AZR_!!42=A2ZGGG.6\M1YARZ+
 +MGRC@`N$]ZS>/>"!V%#+NE,3$K?"P;BX<4@&>FQHR.*`(9>Y8/%-V9Y0Z^&7+
 +M,4*#QEX:YB7F;I9`7AB%)2VM*Z3P=W+"^2X9,"H$&`K'P48I.&T9<6Q8^$\G
 +M689/DA7C#$\H038N!+F!!F\Z3Q,5;8!1-W`*SG$A5A72FCF'L89W.-7D>M&3
 +MFFH#9S`@J)ECV7'20[K;#@OB>5T\:GF2!49&IL0!82S:9-.:4W1\S<#01C&%
 +MN+)[7;P<F/X&6F1@ZN7N>SV*7E8"[LEV?H@S]9DAPH\WRI0P!"!1RF`>(#):
 +M[M!8]&Y<:/%XB"N?A*A`^4K7HMN9B7$B[LE8!"!:&O.1AU3#8V'`H6'L6@FJ
 +M=T^B8J&LY!)R-@H[N=%7>&RP[>=!X*&AC/@G92"#'4#!6YZ"EO%P^1RACE\*
 +M-Z&M4ZA:=[.]4X)7'NP\>;8O"#+'JVKP&0X/>8QLY'4<VV7/2)!@ERVK.<.%
 +M7):E!^4O&`UC32/0L94L^V<C*IT,/:R<7KMV7F"K.-W16\I!S-HSQ8G$%:]0
 +M%9`5CT,ZIX8%4\0T9\O2M?(QFCV9&'KF=MBH[MY>^!XP->:?N%('"'7J](84
 +M;=W)R&KVQGU.[K/-R!YX*8F7/6#5ZOB[K0>LNK@&#W,1+`-FLXR&=`:Y@_<,
 +MCJS><$[J?,2\R=LXXT@TN?#@\!+YZ07LJO&?L5=.[N3QU`AXD,N-1GJ[:]P2
 +MLEW$<*N9VP9BJZ`2QW5D[8$3>5N)B#D#G2&[Q774<[FL#'C%`ZA8/AP6U?CR
 +M;NV>=1;?"Y'#1.($2<W5LDW,)(HPG>:JA#O&.=TQO694/=V?.RU+'APE3P="
 +MIY/!8['@A;Q6\0`>OJI3:/_V?#?WQ.\KOW\`#Y:W`#UG`#V7\>[/CWE\>ZWC
 +MWQQ^@.`&PWL.Z?QW+FK<Y_#=$73YQH[K\#Y5O*ODF7.0);-85G-EJ>ZS+Y[*
 +M_@>LSX'_)8?^@9\FPW#E6Z<K^'K=GDS[T8&`?__A\OKYRC\YJ!ZYLEY9ZU7X
 +M93N'``];*0E&\]?+'%3N_-)?7,!O;.&?G/9]_*=U?!5;UP!UH'D^L&`WR'#/
 +MJ&LOL'R_S3N-*PVP``YI^FM/WVP`/9SZT#6&6#8!9#E%E#ZTOK]6!X5E1@6.
 +M!8YEH49R2RYH#*YDQK,M'`[]%-@%\D.7P8!V_3$KG+?+FL^L&R^P'+?`&H^H
 +M&D@`Y+Y0TUW;)`'E`RT/1@%IX;%[?\!1\MZCZR[+[+<M\,ZSX"D]Q<GN_ZS_
 +MX;)(OA(X8!/K1)^\I/?6)]$T2^+G+___ZSX]3"M6N3)+'[,5U2`43?.\=]EE
 +M"'U4_\:(W\:)8_1._T=8%HZYWFQ^]./WUT<7C&FE^P)%2`Z/EHJKV*M8U,KK
 +MV,Q])M=0`MS'6LS-6L0(>][#8[\O^^O8CGT46)`$UU$+\T9T`U.6GC[Y?]&=
 +M2/QHP8\XT7U#$N+:C!@%NA9_O`9_@,```0,P?]2!&IVM)^9(%X`^2`Z`(F"=
 +M<P=Q&[N(W=Q&XCAG%.=^(`U:R@C6?$-?WO`SX&+^HK6>F:SNT!2]9`1O2QOG
 +M6?757;S$XP!DSIL$P8L;QA[<\UMD_W@)9/_H"SAW9RO(J3.6N>$BF-,==&D]
 +M^4P'@'5KCY'YT4O_[C=<;KR0'EUG\Z;/BZPJHN:"UA;VYH6?=\XL02_O')O,
 +M7;&]A;@I\,GPT!^E9\,1A!P$(#,MG+D.N=,"[`@I[!P$N/IQF,YZ5UJ<&@2.
 +M-H$>FU.H[KW=>CCS&&GUCS.HE_$.L-QJ<&3@:`4X^&,7Q?.+UX837AH#GCX#
 +MZJ]/K:-7;&-:>:J)SW7N>[58TU_\MS`R8#0)O'P?G'1229[#6.<.T.-=I)\G
 +M><NPGDF*-?>]AL&B>IJ(,@H0=S+2=3+](G0&_N2BFUG4\G9]DX/Z^K!B_F0'
 +M4:)D`U+TA[H(UZ1S+GEJHX7O[U\MID%)UOI/H&)]/ULD7KT8_'NV([SO>3(*
 +M65+:S(%J3H/?M$Z&WZ$Z9`T>@5?J`8O4=Y8J"U)?(0E(PB2DY$>MZ;7_@"[R
 +M/L0`U9&5UHLSA1P^'#"W#!`EG]&D7_`EO_X^N7$'\0?1!U$'-1,&__C2`W("
 +MT0)Q`C02`G_HYDF.(07'(>2!TSQ\#O_O6$O@1/)283,82GP2F?\:$6+@+./U
 +MG+DB%@"WK%C0=?93_.%&]<+0AX![C*T`IRT3E>`-T4/3`:?[:%LKF`9]V=[Z
 +ML)/*^N8%GK:.-$#3%BRI6>X)X%&\1NU;4K:=9\4U_>,^\BY9Z##3ZZTWN5#S
 +M*RELO!+O01R7%XRFOMJVC@]F!9%(?&C+CG*6G!N^QR8(U?NMXDO'$QFVAQ\L
 +MPHT_9A%5K\LOXT^O\YFJ8!B<SX:;F=B9@6+B`O1UD,%;Q`S/&?YQ["G\SVO6
 +M7^ZSZL`F=9][S.UQRNK9Q='CI\C3UUP)51$&`[>B+!D$D#*M9T'':RR<<-:S
 +MD[64SC>3`BRO&9+-T6<<@PUV_;D;?ER%=EQ<\='@MG0'UT_-UJ;X)8,F(MFF
 +M$]G>H_)[V2,)91NG9>//@]Y7(8?>FF^W>R^L-QII!''S(;%YZWUZB7]4<.&7
 +M]<,0?9N&+]<+XU9T1Q0=-@,T0Q0--*3_N/&M9RN/AGWW,_=`#[F>$8',_1FS
 +MC@VSK-]S#F,,L8@0^XU*8KT0@SR+F;A<S>*K`%S6=\@"=K/LXRM#K>76%.NT
 +M(>UVX4&(3,0F8>.C:]8?M1(!+1"!I*/O"!\B3ACME;\LQIEPS&`*EL_#;*0>
 +M2\W2#PW6*V2),VX%)K=V[-HDAI>V>1([(FW7>'R4M/^Z(LB@-,E&>3]#Q"GA
 +MH"#(9E2S^*?!Q[7I??Z`U>@[D:&>CF+V]"K_I9$L^\D(L#!DSH%+.9R-3VYF
 +MFEX<P;(.9&?`-<=M:R`>,2V@!.%4O<KDY@_<9[F'-QIN8>7*H`/@=,Z8XU<<
 +MCE_:`)R?^0!J`$J8#0+8C9B*ZP#\`&T/:@`+EGJF)5HF*%I$.O^]*61K1R<.
 +MXF7V$QM`(J?^=)VF:,:4W'PL&T[,SU7OY:QL9:1KY:7OZ3WC2>[Z3W_B>\F3
 +MZ_R?4I:5H(0:AS&`;8@/L"N&HN>>'F(>(N17G24>EKRU)1Y&T-^9-)E_YGY^
 +M2%S;F03B%SO]R^)_N7+*,`-,O:Y@,%%F>Y&IP]WH:"&#A:?:/,]B-3AKO@,'
 +M"T^T>8[4>G"K'?I8>%H]X\PVH].&._2P\/1[Q]@J]1Z<,=^EAX:BWS[!:SPY
 +M8[Y+#PQ%OWV#UGESQWR7'AB+?NMH&K//FC_@NSX9SUQSQC.Z!=G^>?`<(V/Y
 +MYZW#^>>1,5%A<9&AS9_@9DJ+"\R-3@[/T-'2T]465YD:G!W?H:.EI^HL[W)H
 +MU.'N_0(%;9CI2UM>;3:^K:WN+2WNNYY/EZ05=IW`%<GMSK7('=#ETHW3-=/E
 +MU(W2E=N5W*7=K<85Q7W>]\/Y6O%^\8[QSO'>\>[R-O)*\E[R<O*"\N;PNO>?
 +MV985][TZ7O[>A%\27QO?--5],WUY?7MALV`);"ML2VQE;!\"@H+?3P&'Y]_/
 +MNWR^]@MQOM\/"2?P"0$@X.$CK\2DY25EI>;S[@(``P=GX"./P%"''X$N/`&<
 +M?`.#!0%0`D`#(`.SX4`1`!C`(#0+`!*`04&]A1!`)EL@0069\;)@`(0`#((5
 +MG>"D)@($@@F^`*;/@(9X9G@`"3KHS(!#$V5R"$9GBAH3KH9L(5&SX$0C8$&P
 +M0>'P`N/AG1FD"%!@+<-JQP;<&P.@!06%XQ%`01F4"`,<`N/MU^!:$$!+R_7W
 +M?T@^[OC`V.#7ZWY(#0\-CPXX_G\=\1+/>+9^Q@['#KXO9^!=S(<'R@=+A[P^
 +M0^5>7L]/F&3R:&0R:!0WXGU_P`J+#`+&-WC(@SCY!I$"C`:.9\R8%'`SR^D-
 +MU_`3/R0=?+=X-O5+L_9![?46_&^HEQ]Q@S'/@^)!\F9)$A+&DD@2O#Y)8YY>
 +MST^6+!.AD[&LGAGX'TQ9!6+:&`@<<!@`6V\85(!0F)PCPEGE]2`^0OF\88CD
 +MBB&*2HI*W7Y_Y,$`83<WE.OIZ>>2S[>7@SO\<3!A&E`D@DWFA%'W".A(J^E7
 +MBN3K<4U@B"$<A^"3<EA@0@9A00QE0B/>""@=1;0@5!!BP\A887-Y!ZJ:A!A'
 +M4HEQ$31]J);#L"2,)D5Y-8<"2`3$\85P2&-1[%99$%).FZ(]U'D20Q85PA2C
 +MK($>D,8&4(9PR/8S-?`S\#!5\0BKW79W&_@<02K[4?AJO0^$:1DC0\"[P*_`
 +MJ\"GP)_`D\"+P'_`>\!WP&_`6\!C_P4$BX!1U5G^MO!>)U_^3$)]4(F02=+,
 +MIA99G0#A62N+S!59MA08LO,,6W,CZ1T!2D[,2P,(@R,Z@P0$E9<4P2/Q`2J<
 +M"M'L5NI7"%:/=1[(]U'^HZG,G)X(GA">**<9#OX$R@W1UX:D\$82YOR$,C!2
 +M4Z-I'Y*(\2HKAE)M&<0CV,5)94B/DV-T9Z2(='AXL/N$/C]'<>'T$CW1\H\8
 +M(ZE$<:B]59\,9%R(2@1Z(<EI0(:EM\02*$N4*:'=5^+"=A$=9F@\6&.7+"=1
 +M;&IN>(_5E]*)N"/CPZA$=1JJH$:<$L,!#`3$0_1$G_XX&%$)Y^&(06$1,66G
 +MHI;481^C8T+?ZEDPP/@A&$$P=258L%BZV\8)1H00F)"(?_Y,(X@&"292/Q2,
 +M2/15\JO-6)",.&"!2"`P5-VA!0*#(8."H@%13HNT>H=#!X9"!`>'!@1#(\5*
 +MGIN\(CT"O_#B"Q`2J"S)29Q(9J3.,H@N*80K+#`S.#<U,Z1!`<(%SI'Z>'""
 +M4\1O)(2":$4$T">*.I1^EBC])U'Z2*/T@4?HVH_1A1^BB-,R+E'Z4J/TF4?I
 +M$H_1U1^C2C]%E'Z(__CAX"$C&H#!#^H_%,>984INA70(?#<S1D_]!.([*!1T
 +M>/HK/48!X(*1\C"D]`=2Q[DK8IU5?;@J^W-0$J86\I6?:;EDH^A]'CE+#T48
 +M6'4<"3`5%<020A/$%<8P;)RF()X0F9^4G`8$A,\N4PA&")G&.P_B&`I@P&@C
 +M`ND"N$9Q,U7U<#DXC)QZF#D%"TNJ'AX&\(:NN40<8IRX]3)XOS_Y##1RE182
 +M,E67)88%D@SK+"YF24NW0I';HP)P:F9@7ES!%U^$Y(1D3K\(!T;&'7X+"@B'
 +MB(HY?L=(")U^$C'DL=?A<8,QW7X<'1X?PR"RY/T&$=?;K\/SPZ@F=)PQ_@C.
 +M4=4#H*AC=B2;FK/YS-J2,R"Z4+G7>>'Q^?'D,?';E;V-$(S7,V-\,[21G"\4
 +M-9WN,UGF\X_WBOT$W-O@]WK5T,##S@N9\Y+YO-FS!#Y.3C\(3,^6WF'R9GNP
 +MK</&0Y#UGZ74!9(%+*F@),.0&!J(&Q\:&WA\$`T+/;P'R`?8".7K>"+P&#($
 +MP<CLZ^')'L/V++%-X?!A&&$H\17-723.&?_!,42UB>6NM@W.3J&=P8,_F?3/
 +M5@H=,D'<#3PW2E^1NG)JZW34W_P(`!PYMQ`6W80%Q,#/S\'04$1*RL`<?H,!
 +MA(>'`(<S]"[<P;K```D)"&WB9L-74,'5PD`'^"`M/RL`P&O`%]@!U`(#P$*Y
 +MFN+7Y7/`%AX`.5\U+4`I6`8`/N>0/.N:30&V;RGDHU2(DZ:YW0`S;JGU0)O_
 +M8M9)S5#D5>!O'<R[JMH)>.B82#@H6(CY:AK+O*W?$&'SA54,I.TV?\F47RKV
 +MPQ!=J_I)&.BY!:ENM@%,F^L\D><^F?52LA5XWD>2Q')(O[;.!7STC$0\-$R$
 +M_78.QZ"YTPQE_YE3+2=!F_9Q"5\:AO-@3;NJ&0CXZ56I+O;`C%HK_=&6G?UD
 +MU$O+4N)Z&<%Q*.BP@%@X(!`.?\`\(+".\`GC(P-C'.'@L,,G#F`:)3O?`(G?
 +M\!RM#WHK&]0&>OL`./6@*,J]ER^=:>8^*T/;.,0C.+@B(T.U,%0&``8W@">;
 +MZT`+F^VF"D^*("("\"A?B8H@9Q\$'R`4`!,/#MQ?C0["`19S%J5H(!`2@25(
 +M)#P^L[(>'7DP$@%T0"0$SCU<>%0X_*J],@+@()`&BJ(#<=-,6]#BT8]_3(WW
 +M\*QQPY/_X$G2`40`ZDRX@(P)J%^H;L,2E^^4NAX]%B6R-/(D)OAIR_WKA(+*
 +M7ZE<<.583``02*TD:>Z-QD]P6!@15%2^[0P=$4#>]/(@``*0$NC@"-#R\*.H
 +M/T73M*J77J,,%)G_+@'J`P80#`X/@`(_B.`'#1CI\`4*"XG`H5?&=_A/@!JS
 +M!PAJ06-SV8"U3764XMWS^/07:`R4(#!`7=AF6("0H+V@8&[D#MX@>SL<]O+O
 +M$%-WV"NTY!87&!D:&QP='A\A(B,D)28G*"DJ*RPM+B_>H89LF)EN0S--H:FQ
 +MN<&Y`<G1V>'I\?H""A(:(BHR.D)*5M>Q+3$U.WB)Z@HJ2FJ*BJK*ZPLK2VN+
 +MJ\OL#"Q,;(RLS.T;Q&D#:MXC6V-OO]M7.7O]M9N_W_;6\`00/O]M=0N1<-#Q
 +M$3PNQ1!%UAD:01T?(2)!)2<I*RTO,3,U-SD[/$$_0T1X04>;])2TU/GU45)!
 +M55=96UU?86-E9VA!:VUO<7)!=7=Y>WV\2_Y>%.@S4!-,&?&81!AXD^LQ;`4,
 +M,;'GN9&3E9>9FD&=5GS_U4B3@_FIJ.JIH&J)J/H!JO^)JO>L?O['OOQ^KIJN
 +MT?J]'NO&B_O&`__1]-,>-'[(E(_1'_]1*CC^''K2ZQ%'[K2ZT1^[0<.V->]7
 +MU>U5U:3]H'[JSX>DO_ZJ^'NNBE=5\!=5]BCZW8],EDK<UM,".']E%+QT+NBZ
 +MKN`ZNNB[>NJ[/Q)(>C]#K#Z7=5WM/W4=U_0/U_4?[*+Q_?_WM,!I=94M'[#]
 +M*7H_8?EV<H.O'"I^KL%#=U%_=U5?^M57^O55^`F;R_J+JOQ.*_C'7Z^\UW;3
 +M`UO]:U]]:@3:8*_&GU@GU4_G50&%]%A95=WH3.0U/\?KO'[OQ^[OI&WX#ZZZ
 +M+K;'HU;O_[*GMAGE.M'[#]K.LCB?4U^H#7VP$%V!!=%X!+(!L/T=5=0-CZ'H
 +M_5Z:_UI@2)1K2_J_*SAPRZJNKXI7]7`?"D+_V6JJKUE^_JO^KJNTMJ/+E;0.
 +MEK4>7K5>7G5==X_<JG7TP%K'5;Q(9>U3&Q0':U4U?QI:]&9&,NV7U[1:/@/K
 +M;HNM;JNM46]-5HKR[`JU^O^7ZP*`&N7`#,$_:;5RP`8P\M`',Y^U%R`"FNJH
 +MHA2I0!D!?YFM/W41D=65H>4YKN`0X8PYAQ<V1^6RSPZ0UBU(!&YWU(#&YW6/
 +MFC<[F#?'148$WU6"5Y6`)E@"<6&LHCJP3"P.XBUB3?+5`H>V[N^#*EWK>H@7
 +M-33[1"K7#>J>Q7.%M"-(=#N8^BR#0O1(5C1'08Z$W^.B`V-J.3FCDZ<ZL#JQ
 +M/W`5P:R$`A&IH(W/>I&^-NY%<U6<2PI@3-,`=S?V@A;?Z(`H?Y5!/#MTB727
 +M=*4KI9ND"Z1[I.NEPI%DJUXA';6\#E&Q^M"9U!\]^$@+@],XP]((/`.DU*:,
 +MG_T`JI@(7_J18_,C%*H,G^\`W)_:/S\H_/N/Q@EG+X'GXI[\?C/GY%>EK'95
 +ML&_(H@Z]``\XTVIFSJ?.5E"'E6A0?DC$@%9/&?A29\%+4@I88R:GAC1`/<-<
 +M84TG#EL>;6P`6`+34TX+7*`7I"'SI`'WJJ&+I@`Y7K3'TT1].,?3@!]'`#Z'
 +M'0F&`20"(>$X$LT4E'#V!,*`_>->&,P,#Q4O\:&Z5G*U/T@4B<I`8"!!["%2
 +M(QHJ!U/]&BB?9ES&B6@XE^R#0UH*V$PL$`#H,Z!*YV$[U5'(U0`]$M\(,0JD
 +M%&C7CK[P)X\<".-#2605(]"_3#*`!4ZI`!4^@M/H&Z-#QJ0=/C963]VD]?>I
 +M4@,G/4@$+\*8%_L"155.6@&PCY](A&D*`IY)YJ2$_<!AL[D@@1[@L1K4^LF`
 +MT.AMC`!6!.A&<@@EX3HPL<*V"=*&B=,'"=.-``'V1.I&A.J&Q.K'!.L'0'7X
 +M!AEKIW"X?A$9].D^?I5GZ6Y^F,]L\_36>W.?I[/;_/U"S]1<_4C)IS-;22E]
 +M.40!%)#*>$_?A,#V@J3='2B@&HU+'*$/>B[VF?83V^G\PO-^B"U)PSH4`%$,
 +MQAD&@S&!1!#,Z^\.,1HQH)]#<:+:&05)_E('&@&ZCLS/IO,E2K_*\`V>=8!?
 +M*0U4Q<$B3JDL@2:]!6IZ_8RZIC-CDQV,JB!\A28(B3C!<D\&LPS=5$'5,NBU
 +M=#;%-4Y#&ZG*Y1Y!0!W<)B5:G[&C(EDK>PD[A02B[AI/!/W)'-`,J1:-3QJ1
 +MF-8\NIF9-K;:JFM)00&X'+&I(?0=T:F%:$:FAK:):HJ!:CB4V4](`!N:"B$&
 +M8JR9T`T&2PJ?].JI&$73]2EC1UA;5F"`GV^IU$5SN$LZ6O_&\P;+T@S2T\`]
 +MKZIP`YTG8S/%B))6T")M!29`]3'Z`,I"I4'(W4'&4`K5*";:>CG'TR*R?#AP
 +M)J#.F@XREEIC`#_T1JO&KTB4_S(QGQB0EZ2"LR)9]ZI6'&OADV36XXMG0`KF
 +M/7G4YQ(MQ#O'#QW,2B?K*W7!SC4]R#@"2"`#RP`3W`!VI!FF``88*D.0N<$S
 +MZ3Z(J3=@\..D!:"TY!=H1K4KU)A@)K\8!6[*;;!MX%6X+>);X(6^"0I<](8M
 +MXUN:W1;B(LY`0FF*)_BHJ+,Y!(P,I_C0T-C8XG^.CH\/#Z?ZT(4_R)/\C(R1
 +MGRJ?Y,G^N_$Z[2\4%*/.FO]>?BM>OBQ?P?BUTUW#+<,!)]^*6K!JH8H4G%9N
 +M"2#$6Q"K1A[1V1R8;4:$9$8$6Q=/\6101,1'-O-$!#4P/7.:&`8A4MZ$(@A!
 +MM<X`J""!B!`"L7SVF`F$EFEJ_BWPL`D3_@(*3^3]!TA%W+'RUY)_,<ZZ!@!;
 +M1@')_)^@8<!M<#'RUY)_,<ZQ][`7]\OC[5]?#PI_<37\\G_R.W]QI/V9\2C^
 +MZ$_N1\[^ZG;^XWS'+W?SYFQR/A?W0^I_<SM_/(J,'C\]H/-_,GH]W^V94#SE
 +MROM[5^#70Y#07;^YB7B_NAR_GQF/BYWRO[@?&1F/F?W2U^ATT'M'V=I9/D.C
 +MYB0^0..@`\IW/";3J93XO\OR4?F4PBXL,=9$W&01F0-R\&ND\/"0\*"`L(#`
 +MD-"0X*8]0H)"VZXTEWD&A@<&AX:$-<['\%AP8GFQ_,9:935NFJ$.&,Q_,;82
 +M@',?S7.U_A+7$'M?P6U_)C-?R6*[XPQP_@MC^"F)OX)</IKR=.%C_2+8EG+^
 +M28)\TUI_-?[5.PGHWL?S&($AC-LMCD"G+D8@@YP=&,9I0@@EAK9KF?GM)!'Y
 +MR6PP*8T0AH_86G+&8RTRF3\8WG>I-KP:S@R+BXI;U++>"/CT@DQL9&,>,4UW
 +MQ,?$QT1&Q$9'Q<?%1S'K'1\9>X<";\9%1<2Q]#1$4QSQ4;$QC7G$Q29Z[X&K
 +ME-=C^:R&$,9+MC^B&!%?\<[<CIQ,7KA_+UZG`;NQ_1@$8$"A&L?S2;&NG@4G
 +M0Z9[IH.F$X6SA6-4C4XU]L8S@J13IQ).7)'N!8QC.`X@M&L!R;L0X`$4R>R?
 +M\:R=2:L0R;S6,T]M6["Z4R747%N'`U<M=[\^F#PW/N-UB?[./ZMXF/T'`6OU
 +M=RY>S76UR,;K6L\]P+G9^XVF)_@;'ZGXN;%@6OU=RY>SAUN'"XV*/'9"_GD`
 +MOWE)D`.MY-[30!'"&A1!S.>P<=(Q8!2?80J(IVZ([6C*RAAN&AV1AS$>0?*8
 +MK!J47^<VL+'S79@/+9.&Y!'9#73QY(/5A4LD:`ZT(T#S]!<];0?/T)S]"^/O
 +M'L/T(,`^RE^$D2#"_'E@,<WSH!G-]4OUDD&@"-[8]``6/RK,JLM.OB@`1AQU
 +M\M0P52`&F&1&/8,.[_%MWZ"@X6'BXZ2EYN@I*>I0JJFGHYZ7CH1Z;F-734,Z
 +M-"\L*RTQ-CU%3EA1A:G)Y?\U8:%@D#GHW-#$O+2NK*ZRN,+.VNCY!Q,?*3$U
 +M.3DU,2LE'14-!P#\^8I_OS_`P<-#]QV9WO[V[N9/?0V5E9FIO=7Z(DY^KM]0
 +M>=L<2'-T]73S<&QGXDDOBLGY.(?G9OZW6=J;7)V>\E8;N'R'AH2!?WY]XLH"
 +M"AHEJ-D97J9FYB4CXJ#?'5N29V%=6>'I:76+'IS>7Z"X8D,E7IS:V)83T8]-
 +MC$M*RPN,SI"3%=B;GF%$CI:>H_`@I*"<EY..BXB%A.@.!S_X4GEU<6UH9&!<
 +M6EE:7%]E;'1^B92@J[;4!D49^IK[%&MIYN/+^M:RCF9&*A,U7U^@83!*5FZ"
 +MEJ:NMK*JGHIV6CXB!>G1O:VEG9VAK;G%U>7V`Y-F'X1-H+BF>LT_WOCOB(S$
 +M69G)Z>G9J5CH9\<65934$V+"0>YS3QTC*C20^2E=C;WJ$C93K=G)J6DHV),R
 +M5?7OPTQ'_)#L3*4"_/1G7N])G!)_AX['JAIJJLQZJ::AG):0BH7-Y]XE8F0F
 +M*&JM+W4+6F:6ML:^KH96#+XK:*6BX!V976;T(&-G;'!T>'OD8,_X+?X`!``.
 +M';X`$?']P@[!U41$0?9IQ\<&"#,*$#,%/M/C3\&$GW!!6$%8(?A!^"U\!"<@
 +M0QIX4Y_#'C!`^$#N'0%X07_@RQ3@N5<8\$N_&&*FFZY>[MZI^DG^`FBMC>&[
 +MD`D5,!G4?/I#`<RQ+8@;Y-5OMJ[`LW:=4[_<MX@C9_/V@(.=@4"G48@G4G/U
 +M,X^B:GG81YX4I@[X43::L(]JV"5;'QD@7@#Y(#H`B91X=T8_=&/VGV,G.RB`
 +M0!I=J%EU%GQ#)%ZAY\/I/45N>FDU.[0%+W3)8U5:0RO=:/IN(=Z*<P!DS((D
 +MSV(I/B2USF)8?^@')$-2#A7#JS&DAC;_.N`D`LI'UIUY)]?R-UW5O'<@<=Q_
 +M.Z5R!X.X*J+G9)9$50-<[04?:.%_>$)@.5BC0J&)I\,3^@$D%V11HOJ,?3%)
 +MND%*G5P9.!H!3'PE4J,)J*FFCVP(HFM`FH^#^G?HENI^TSK\.T.Z[1A]SO\N
 +MS/),U@8BZ)_9W<6M#Q:YR8T<G'D".$L[KF((5*G0@FN7Z[.O773FZS$TZTDU
 +M9@-,@.E2E4E3(!J7J0V@K*O<D-ST54<^@$][=$',7.N[SZ!L^KP0FA4N]N,^
 +MTR]N2:F2)U5S"UM<3\R!:U)T9):5,G9H5@*0^9`\\UO.O&/2.D4I+G5L1`5!
 +MQ@90<9,T28=$];W7(/`%WD^Q`#;.K7)&-_(:Y,?#AA58;!D1G&0^4'BKDD5)
 +M6?\;IF(F#8X_4YF^36O4C--!K[*?YB%O6(\0\`!VT+U&=6!<WV?:#>X+5SJP
 +M5/;\]4+C@`TQ,(Z7/<$UX$VI-ZAR*!:D#Y._$.\S[N70F&'WPU?4Z?,[J2]!
 +M*=.$;.I1H?ZZ`U>H4'':GHP0WJ%?2`,$V2#6!>A%H%#'./+:[=<RFEPY@J0%
 +M4'O`,8[:D&=(3\T`)@.QV)-DH6-!DV&-1DWV')!D.3IO54Q,<=(%6/U$5'8`
 +M^"Q'9*.UHAL2"7D#"I=5Z\$T;KA([UYUSZURD==2^0J)4X8HM2/QHQK4XQYX
 +M@H`G36BB2`/0`EBB)A`21&>E@':@`;0]Z;F*O!,)H[:M7^7[K!(!AQZ[YW/5
 +M^-%NH@0UH`:9,DE*@%(>%=`3VNLEC64DC54DO=5D>[-'NK1[]L>[9'UW4H(2
 +M2;1M(93`52.$GDA]@9U%RG@R1D1<F"=.`0,%S%V((),<"MC)M7MUSN3-.K&I
 +M6I\#"FD-8,6`?F;")B-@/`X<KL"L!2I4ONW4(G;44P*6+6ZUR@B<MZ$$S'3>
 +MN)YNX/N9C)\2_-DDY&UC3D95C*,$.U8(K"JP5&</SB1Q:\S7!*43P^_+_U?X
 +M$P<+3Y19GN2C4X>[]#!PH:?:/,]A$:G#74_`+S\UR:=J/3BG?FRL+1[RCS#:
 +MD^7S7R3J/3ACOTL/#46^?8*JL\.6.5I\EAX9D2@C0P+#2B<CW)"@L,#0WL/6
 +M.S_GRS/7:R>-SOP).>>;@#W#Q-H97D6"%/$Y"HLB+C)I09G@/V2DY46%YD:G
 +M!V?H:/*10P!-HPHH^D<"_\PYQR`G)2PF7B``)VPG!R5/)I2HY-*D(&4E]R4+
 +M)ALF,"9`)FPF#Y0*#/K\@4UO(']]_'O[_%P?E6Y-UN3]P)4`!_B>@#'Z:`%Q
 +M?H.@H,TG>,X`IF-)"7?(P0I[BT(,-?F*FMJ+?[-0;K4`NOX`!0=7X35Q-$;G
 +MF.!_`T$!M\MWS7`Q"#7%P)^%Q4<N9S1]&<#((!IK`0!3A`M>O"Q/AG5%V%PC
 +MBGK@Q\>$`QX;(`F^(`8BQ\"2?`*0IP$"P$"!5PV*##@@C$(B0K<ODI?GZ[7R
 +MGF5O51R%SE\F#7RSVB'^R1R/(*#`KA^,YL;A^(4,>@,GPG(G4G@Q^)X*0@9P
 +M^08$!/_`B`#%D'%HH@(_Q%/]LS/".*(Y2PSKSW$=T1PQ'*2([!"U1Q_Y"*JV
 +M5RK%$$%QZ[J]_>XS;!KGW*"5@`A*%``6,#(`'!]L#)H!A1=;`K':(@!L!%"=
 +MHHBZ/L=>A:,(D$I,-VP2`#ANN#@T3>'EP+!K&6V;0BO`!!U%NB?8>J_G:'SU
 +M?Z>K#_9>TXP/#\4_OZ8'F1N<;J0N3/R;895\3`.,#_C\//%S`H1)Z<$^(!!A
 +MAAF#S-*&&&"4!/6(>>)X1@F(T#/#CYC'M.^PZZ.^9.>N<0RS`\30#,B&_)O=
 +MX<%I5&'@?QL6$1X1'V$0>></\LZ\*+6#`>&)R@/\$H"/:<<\24>TXH\H]H=!
 +ME^J\I0T=EI(J3X(=[1Z@7B@G56@/@]EA?U'Y0/&$X/\"H0F9]@(6B/9?1_^4
 +M5I_5TX<<=S4O_,JLS@,(RK#+ML9_F[C]0Y.VH<P)NMD^'\\JWRTURQ@'M3&Y
 +M[3PX+3PM.C#JT*9N\&TH^%^GEPC]#`/GD>9\\K<CORT9:/#_LN6\,M$D_M!$
 +M\J,JB7\GEM"D&3<PR=(`XI*4R;,MDAF87=`V5HDN*)E*0G"0D5B9.IK^.$XH
 +M(`>KNK#RTAIYS,B'J_Z/A\J_YG@_@]AU,6+_6BE<+5?%C7("`8!GD57_CU$$
 +M\;0HW>"<Z\%'Q\'T?_],CY#[#H!Q^2X0G_/L=#52#L?&.N^9MU5/@XG^P8'W
 +MPMX6LA>.C&1?P;%NV8J=7P<.[OH+JN,T,$F#!LDE<PU8-#1F$P!CYD>V'C'$
 +M;,>4:6`'S=W^N+^/&CPE8L)[S/?KH)7^=^<(?G_PG5&=G3SSGO<]^$X.#FK_
 +M.+,Z*@E&V_/"C"\P.S/?_D@=S&(?''^X`:'W^!P["9#L"W^N>)H6\,`%/P&A
 +M@<5>6`R.0:GT+M`O0.__V?Q]SWUGGXXCG_9ABYF9B8=LSC5-C;S-N^9CMC9C
 +M1.)DD!JI`7GY_0;<%M*GX7*UXO#.BQU)MP,"!N0DE0V'JLZ<CQ8B(YM.'![K
 +MPAMRZ$R7+X9`?5\RF!L15TEM_O*_HD)9:^.<SG)P##*$XY<'ACN7P@BO)!`_
 +M:ZE<')R=01A!X!^71`>J`-+.^DIFU!SR8<>>4YW'X_YNGQ^6<@%3E6"_Q/0#
 +M!P\?I/\?M`'^LW-G0>&3>0_I+E`8<'#EA]J;&>7,/F)^P'W6-#`^;G3)CHPZ
 +M0&D[&_(#X<"08,3%@O@C%,'`@"F#P9+(`::V.(8342CC:S$^T`.-=^,^=BQ:
 +M_Y\`/)BB,C(>'1A#P;,S%O<8*H&-FJ__,P\7.K8^0#QB[&^0,;\8D>WJBX&?
 +MRIQ^`R49Z\!X/:U4?EG50P,$^2;E4KGL[Z1*S-L0`L968S[.5FF#N2`O9+[*
 +M6ZW#\QD>7`Z89Q]<0*`D,#-#0PO(8,$93A<-5AZN&JQL#E[J^K[[`'_X`=52
 +M!TJ5E2=(`4\@&T\A\\\G4\\\EYVK_:I.X6I.0!D.0`5`=,PZ_Z_2-.7(!JJI
 +MN`+XL/.W1555/2JM(;W29?O7_J])'<5^G5T&7[JB0-5TP%K@)O2'4]6`X8=(
 +MY=#U==2Y=&J*J50+U(H#5H6+D_?VYL"C6HT`&,"]:`N[]O4@)K^W(,*ME&1J
 +M^BUAL2I+!`5+;KN+6C`5;Z#`N;]U9E\(`'\`QU*IJ_35IO0`/V/Z](5LFFNL
 +M]+T1`#__0HL++]#6E0JB+S/T/Z[DUE50M,"8)?!TFET_0VE0U@I'POW\3]Y*
 +M4_4:W4[CIK`>!``_1CDH9R#7Z=*0&OU*)7J8_:1P_:EI1=.ARW'"T1"=U`1!
 +M3;D'3]VD:TV7SOT]ZBNSK?!$#\`#UB?ZJE`8=4\;F?5#QY1&AZ+;G28!F0'4
 +M@&'[(&'[2&@":D>/*!L:AZ*.L/T#L/VK`%9P)5?JQ`7=^WS*`7.BL=:!>VP"
 +M!>M`>ED=--![UT_TNG^H@*GQ.0TZY$.D\@//TYR`!?N@-#KB5ZJ_"5J<E6GC
 +MLU^?)5]N%!^3"!K5:57]50/O/_]6,#^5(#]K`Y:@Z0\3Y[,R>[C)`ZI`X_>H
 +M`4_C(`TWCRU7NHW*N(?9>Z5``U>%0&L!J;4AN$W//%I-I^N7HY=#EN.50F`*
 +MO2@#ZEZ^Z8'^\LBNJK5I``.XA%S)B1U>AU3Y>N?J!]]=>I6LX;@#]#]+*&-7
 +M]4NU=[R=;?:X@+WL"^+$"D?[4U8[;Z:;-)HESDK%[975'Z(C)+WS`GS`EA:<
 +ME=9H=+OU^G7A6$C6?H-2JH#2;&3Q<P$WT`6_P;7Y;_$QJYL_F(`>AZT`Y%#D
 +M.OV3I./T-4U3?R7A@:7]!S8QC]_IZ]9'KK2TJUW7SR=T]*O!K!JIVX;@/2Q,
 +MR5?H6)$Q^\J@<K1XG7+?'[8CH`LTI``YZOT_YK#BCK-669R3-2XS`_?]`KA8
 +MYD.1)S)U)U)TAJO)4@7><8J6+#J?$<:?7[A+4G4DG,G2',]Q``:K\=8`8`&!
 +MSE?W>!\-WLM[R[Z4K7I>5X/UJ(`NA)\4I^1P_=!?Q#GA`.]4CO4U^M)[28PE
 +M:EPI6M]VTS5X<H#P>+;3]>K;=OUW/1Y*56I^2P&&GK'[+2)'J]=]ZR$@"K^<
 +M@?CKH'ZJI2%XN+7JWO8%\2CYS8?H;>Q@!__=^(K/:^WB`_;RX`*NFW9*>BC]
 +MI8.W8"]#IN7!`IX*:XYB56NO>]#]_ZY!K4<;B@#VXFJU!ZSR-6B6]_(`NW!`
 +MN"#-8_8ZKQ);]SJ2_Z.==#'Z:O+K`)K)O.,,D@G4ZJ<G2FG[5,?L@U].W6?I
 +MUN6RQH(IUO.@`<]<?M,U^AT\U^B?2KJC]M(DU6HC#J\%`(JKB:H/52KB_ZYP
 +M[F<3^ZR]NLP#_0J&[,YY<JAYBV=/^?NNKP*Y;ZQ]OO;`Q`_$@#56S"#NOWXE
 +MCW(/[X+E3]K,`/98_"Z_N@/'%Y"K2`=3DHK^7H8A^GIS`-L,0UUF@'T4D?>Y
 +M7ZK`4LN,(9J^+$!Z.[&2#G7TY=>H-6``#5K%->/JL$\T[6\+92HOI``GVX"7
 +MWY^GE#_K#I)PZL'NCWL<6V'>[`_7O(!WC`:T7<[GU3<`1X@39`08X25.'U5&
 +MYGRR-_P/\`,?]_Q$CM>,!#@X?`.'OX3#'X.!P.`KR@.!5A/[0#!!@@0YCY*#
 +MF8!Q54I,`P&!5HW53X.,<%GR:2X='E*`LI#`,+#B`HQI@_:]-G&((X`;9O0)
 +M_KR!@SO5*@(-R5CSG@^!S`_X`WZOE#?T!_P'^K8CH>G>E/FKP__L_]L__O-%
 +M!YRP2X'#;B\'GARA^ZSNV\V_DO+OMUD2)$A04)2G63K(##1$CA(B1@?>/.N$
 +MA0%!:PG%X7%Q6$V28H68H&0K3`0>`@8*4)`0*"PJ;Z4ZQRB$DB4"(N+"P<%^
 +M/\`*?($=(T:RK(.`0\.1WXO&Y>6E<\*.<3_3A""$`V;:CG_+&?R$?PA`]"'H
 +M"_\'S<>,B8$O88"!-W/8_9RROJ/[N_GS\W?Z;C.3(W!QL>-FWXKD=\S=^?@<
 +MMPX,'`,P!>"1.45/VY)`0K=/94T&=R9ZF];^$;K7`,!GNHVL"R8BP8"P;(1,
 +M6K)R<.#G7C1!0D2%&LDR0DQ6EI:JF)BQ,C`8#S,R4#P/3"X,*,2<L9H&98."
 +MJ\"ST>2T^(335['^\,W-:A5!0D+`K*DI24E4B4I<=M4$[]8&$_VYO';7HR(_
 +MG"=^$0><37@__)G/>H%7_#OO*\X0]XPQ[9&W;&'7'''I$%`@8(?^`@2E%35"
 +MZTI,U\`,%G_N=@&`4I.A7P?:=%8A&)6S<,`PD*Y/BGV;'63$PR#S"#_"2'^M
 +MP]C-%A@"E\29)DR98]<II`3)$2)4;,NF#`QU33>";B`UD!*P:!P0^K$0^$@Z
 +M-07%:O\E*0*P;0<%B/\#_/]5@/QH<8"'"0I8A3`,D"5)B9(B)$B),-WY@[Z)
 +M??[YO'$(!`/7P_@8,'C9]HN)ZFG'_\+!\[/"'%?>$Z^,">2`@32EV0&L\>8X
 +MP0ZF,5#/$^48)FG96GRD^,$COM:V#`6G#)Y,0X($!"/`X%.OZF'R91B_C_P)
 +MDMHC1JDB1$B3B+AJM4,K`P8`X'HR?]_.`R)("'.?X`<F3D1*3(@3(L12^R<6
 +M&>'_)!I(JJ9ICA!C@CQ`@Q4A1@@IC$R/&##A.6`7_CSY4AGP@'L]BA/W:F?O
 +MG#Q#.`?,7J_!2&>)L+A3'##G@UNAR=Z9\NC!"Q?0`KTX(=5Q3.G,&C_@'_JN
 +MS$"?$"C_IQ;]V`/VMK<=G_+`?]P$.$&/=B/I#=+_!=)])%2KA@+__?V0@$)_
 +M8>%FG!@LH%TN3^!"#]#"#\3U^KVO(3#`\7(`D$!0$3(!`!$A1/4)6@$,K3Y_
 +ML4M;@0!Z?H@*EID9G)<0"NVJ;2:H:'D#'IP:8FWG2D`0`AR60:`IV)W!R<("
 +M&B`*))Z@R>@8UT%`*,`8*("C&6<PT5$PD#(!=+\#7"&L-K-:F0I-`/!6,8%#
 +M"EJB='UP71S:NT\4QP1JG,C%'5IT83,2P#0),U(0Y.#E$9'D-3T$DNTK1)-4
 +M4T#6,MJ*1M6XIV!P*A4,H5IJBB;0R'BK6'R'KF!<%6Y%CE+B8&D,MR:=/T&1
 +M,`5N0RR=0B*A*.J9<B+8*@F$@SACI8BR+Y.D")@K2PP;(2L.;2RTW)OB3'5>
 +MF8QVHZ`X"XG(4(4?J:J5S"N*)5*E+%`$H*@HHY1+'ZU=IVB3&:!!XC'@R`F(
 +M`+09!_Q.C["!-/<2-$RUR8F1?_`!A[)T?2F`%3\$G![>`Y#$K"=DM@].=H;3
 +M/!00)&D2?P#2[0I_0:M=C!4G2@<8I3K]A'A"YPY`<23V09$VNAR5F+!BU2"@
 +M]$0';+E[M!R;T%Q@4>:U$K'3#<2'=L`$:E"&SC0X373*#4<\-S;\@_D5F.+\
 +M3]^Q<I<@20.I$(P,DZE*",G,`LFR"A`&6I]LNP4&)@:$`@$C""26XNRKI2VY
 +MP:,B:>#$.!"KBTX<@^`AH*XE8@P)L@*'I9"@:Q8KF$LV3<;%)!073@`6WE94
 +M$/7#F539(0%!@]9(`N>]\T-QD7`7D;6B=S%-U4W[6GY:!_P&Z!"#2$;K'"A&
 +MP5(0M-`2PZ,QTI=@K"0D^5V(B+'Z"LOVE:),G\DFFVUQM:CE;D[P/C:"(V@Z
 +M*`DN87B?8@0?TJE>'%:MVW\9/I@W%0)E_+4_F4#/VBX&0=%!5"UEGQ</('++
 +MH+0=DXQ-N+UH*8GF,0L<"Q-!J6;(%H#93Q*QHA;;@4;&YR2D[@,(*:6F6^<3
 +M88OP@/$&5Y$PE+)PQCTV-"UREVS%#@]A\%6L$-`R%K022+:Z1`,9+89<I8-$
 +M`E/)(,"`6Y\RFGD7;#X)2G`1=S`,):<0P$#B=L7PP(M9,=H5!1E#M'X!=*(0
 +M20&F+MHE<DII2=*Q@6;GD;^QQG.-M[37+:/6*!BC2Y8ZGAF>"D<Q4!$AED>0
 +M\29+<"$G3R*$LCDP*60U"Q(/`DF10)<#L59#E(9'\:9.%AH<AV93C9."!DV@
 +M\N^PU=@NX2K8F)+A;G"V"OAPH`@8HXQS,2XF+JDJ>S#$XRI-SB,0(<XE2D.V
 +M<2#P2DV4N&8V:EP=F?L81>@0Z!0X#!77!7"DN!1KE9;H"9:W'@W'6RTPRR:"
 +M5[%6XDPRJ`8PSLF<R/#8:IHX3]<>6DLO7>&DMKB0#0O=<0(;#\Y,S%.IQ@W2
 +M:3Z9BY*S,U."!.LI=<*8"8#V6*<Q!:%$;'%6$8@\72B#F1;=U$X<41O_@-F?
 +M%X9PX//%^QY":"`<V>`>MP=T";DS"R#\!8(N$,7P>6,D6PE4G<*.LR"<N`0P
 +MD#"RE,K#]BW@I@MV@H!#<TX>V^[`8X)H")A;'8V/[9W.L0Y:W)(MABC$&!4U
 +M`E-[]"DFQPH%W$H67^8J$R2$I<'-BP%Q)N]5J_0&:366K%/<-<X+!-QI1&67
 +MXBT-7CD`3$8I`(!`F4["PX/%Q-T-?L`#`$:&4%V@UU&/W&&)(G]"2IEP_<1;
 +M(`)7N16V$[<CJ>X.S8I6ZQ<`+<WCB$S-N9T["(&YUM,K^X.H,XRZBB;,?@.$
 +M/5*HJL-8HD\T:L$0.S:Z@BN!A;7HU<-@"VRSF;KP"(!Z0P8S#T6/!=L=!P4N
 +MGZ4.>&*3LNO4+I4,V/-5:+PRYSV(LN9$@K,C8HYX)KAX%):Q0"3,4S)TMMPZ
 +MPK`8DT\N+7H>IZK.J+')@S&@#I9H*,Q"`SG<`U&MHTG6Y5X,*KK<QEA?9C36
 +MP0LO"G`MZ4BGG)MQ>K8H/T36[O7<+&I5JJE%&$D3+4&4U6\<)SN.0Z3:G[FN
 +MSF'CG8FQF@S<,X()KF'&O9*XA;L=;>-$L)4[&-.)Q(EDXPEVEFR+$Q!"D)2U
 +MK+7@C5L'ZT<:PA=/UL'F\"T&7J?S+90XB3('^I\%"4J328[+-LMP)N9NB8J(
 +M"0"GTEQ0W9D'-UPLNH'@C%:4EC%&.(,PK%H$,I"M8(R$B!"0N9*N=&#GA=B3
 +M-*;%K&)S!SCC&H'H;%C-+Y8L$M4#>%\+@+CAS`@JS+<'M3B2+&PCNDNR:QDQ
 +M(,L^2ZX`S%&0MT6))G-L&QM-20"Q0@Y:S=$YN8TSPC,TXN!,V@)Z-,2'I,@X
 +MOR)A@",I[EC3>#DDVE^UQ!C!D@V!A;7`RLS>-$#%"<C.?RYT*!.6[7FDS#;R
 +M:68\TA&Y;TPVN)N)E*"H3$W"-1/"4('4N0<5&4L7,6@$"2R#&:*GV1F9&Y+Q
 +MXY)V17`1)Q9D2<Z4V$#]8%$(TC2%PJO1@M9AI:K77),`FZ\%5N?<@9SIV8KF
 +MFU*A;":::C>=ZF,'A("R&JV.,UXKK:A!HFXQ%)@I\PE&-)ULV:>F$8'.?[\6
 +M1\829`3\241299%BS9S2TU@A;QK8=\G<@;0C7_6:UF\ZE=C=7J=86WD+)].;
 +M/,I\6/#FS_N,[YI0:VK[:YK88S@0ALY6M]WC(;F6%1(.=YUWAT2&].4L:;A`
 +MER66\4QK;;)9SP6D_&JYUPUWA*9O+2$!0YI-9/EPMDMW0*`A5K.=\;-H5<<F
 +M%MK61*35;71RMFW9;@62%':[:T'?$O%0YHO35#G?&.<X?W`&<96!VI=NCQ"@
 +M.<6=S',`L5Z'#CA["3H3IU-3#N1J3>`&Q/N-=36T[Y$KCA2H\-Y_@(Y+XZ[D
 +MXM0;..HZT;B@RW@!-=3A5MG*XVP`C7$US-R<-7C-TB;;G/(NNQW>\%<=+YK\
 +MUZ$PR]1.)A#M%(M/470D#A[K0P%MSKL13C<M;8\MY0[E?([C+A&K8;<UWST&
 +M9I`D-9R+F;U46FYB&L6A[</5.H(;!);D^3AN.HQK878VIY=8X@"$MNF\VHPQ
 +MB8",N&RSD!,Q10R;H$W5^W0FYU9<Q`:UN;</@:ZX+GZ%(')S@J>#KE5*@S,"
 +MKJ\K":B$S)$'M4Y`A"Y/1QDI!0,5#@05;*EUT!F\&KURVG6D9YC9C==<EEM,
 +MW)[=<#KQW*YJ(`P4.9.%QH@9J,*FQ<*D:V\:AG:*0.O1J>'>C`6TJ93Y/EFK
 +MIP$;RXV\Q)FN1(QE^@1CI<X9X<G$`\X-S4U,P`49CP!@DG2Q=8,&HQD;Q;4L
 +M/L1<]+YQMN)K&24#`MU=%O@#\E:/#JFMN,ZR1NN+.\N40UQHM';-?0*Q2A((
 +?HT;F)R7&)D7./!%,L0$LN>9&1T:G*_!/]O_^"7-__\N4
 +`
 +end
 +
 +::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
 +
 +The Herd Mentality as gleaned from the musings of Bil Herd
 +------------------
 +
 +This is sort of a story that was really a bunch of posts I did on compuserve 
 +back in 1993. The language is coarse, the English malformed and if you're 
 +a certain ex-Commodore employee you might be offended by the story.  In 
 +that case, the story is probably about someone else and not you; my 
 +fallback position would be that the whole story is a fabrication and meant
 +for entertainment, not to mention that worrying about things like 5 year 
 +stories written by burnt-out wackos is bad for your cholesterol.  As it 
 +turns out, this is about a sixth of the sillyness that went on, this is 
 +more about some of the events that centered on the 8563 chip which I was 
 +being asked about at the time.  Oh yeah, the content is also dated with 
 +a slight slant towards the melodramatic. 
 +
 +12-Jan-93  19:28:05
 +
 +Coming soon to a terminal near you... the gruesome story of the chip that
 +almost ruined CES (and the C128 along with it)
 +
 +EXPERIENCE the shame and horror of being a Chip Designer at Commodore during
 +the Witch hunts!
 +
 +SEE the expressions on Managers faces when they realize that their Bonuses are
 +at stake!
 +
 +HEAR the woeful lamenting of the programmers as they are beaten for no
 +apparent reason!
 +
 +SHARE the experience of being a Hardware Engineer... stalking the halls in
 +search of programmers to beat (for no apparent reason).
 +
 +LEARN how to say "THIS CHIP ONE SICK PUP" in Japanese.
 +
 +Find out just how badly busted up the 80 column chip was and how many DIRTY
 +fixes were needed to make that all crucial show in Vegas on January 6.
 +(Christmas, what Christmas). .
 +
 +<Said rather coyly in an attempt to elicit any positive responses> Unless of
 +course no one is interested..... :) Bil
 +
 +
 +14-Jan-93  15:37:59
 +
 +This is the first of many parts as this thing went round and round during our
 +mad dash to make the CES show. I don't even remember what year it was. The
 +8563 was a holdover from the Z8000 based C900 (the "Z" machine as we called
 +it). The people who worked on it were called the "Z" people, the place they
 +hung out was called the "Z" lounge and well.... you get the idea.
 +
 +The most interesting thing that came out of that group besides a disk
 +controller that prompted you for what sector and cylinder you'd like to write
 +to on every access, was one day they stole the furniture out of the lobby and
 +made their own lounge disguising it as a VAX repair depot. We were so
 +amused by this that we stopped teasing them for a week.  (But I become
 +distracted....)
 +
 +Now the very very very early concept of the C128 was based on the D128, a
 +6509 based creature (boo... hiss).  The engineers on the project had tacked a
 +VIC chip onto the otherwise monochrome (6845 based) in an effort to add some
 +color to an otherwise drab machine. No one dreamed that C64 compatibility was
 +possible so no one thought along those lines. I was just coming off of
 +finishing the PLUS 4 (before they added that AWFUL built in software to it)
 +and even though I had done exactly what I was told to do I was not happy with
 +the end result and had decided to make the next machine compatible with
 +_something_ instead of yet another incompatible CBM machine. (I won't go into
 +the "yes Virginia there is Compatibility" memo that I wrote that had the
 +lawyers many years later still chuckling, suffice it to say I made some
 +fairly brash statements regarding my opinion of product strategy)
 +Consequently, I was allowed/forced to put my money where my mouth was and I
 +took over the C128 project.
 +
 +I looked at the existing schematics once and then started with a new design
 +based on C64ness. The manager of the chip group approached me and said they
 +had a color version of the 6845 if I was interested in using it it would
 +definitely be done in time having been worked on already for a year and a
 +half...... And so the story begins..... (to be continued)
 +
 +
 +16-Jan-93  19:06:28
 +
 +Looking back I realize that the source of a lot of the problems with the 8563
 +is that it wasn't designed FOR the C128 and that the IC designers did not
 +take part in the application of their chip the way the other designers did.
 +The VIC and MMU designers took an active interest in how their chip was used
 +and how the system design worked in relation to their chip. I overlooked
 +ramifications of how the 8563 was spec'ed to work that came back to haunt me
 +later. For example, it was explained to me how there was this block transfer
 +feature for transferring characters for things like scrolling.  Cool.... we
 +need that. Later it would turn out when this feature finally did work
 +correctly that it only was good for 256 characters at a time. 256 characters
 +at a time. 256 characters at a time?? I never stopped to think to ask if the
 +feature was semi-useless because it could only block move 3 and 1/3 lines at
 +a time. Did I mention the block move was only good for 256 characters?  Later
 +a bug in this feature would almost prove a show stopper with a serious
 +problem showing up in Vegas the night of setup before the CES show. But I get
 +ahead of myself. It was also my understanding that this part had the same
 +operating parameters as the 6845, a VERY common graphics adapter.  Not
 +scrutinizing the chip for timing differences the way I normally did any new
 +chip was another mistake I made.  The major timings indicated what speed
 +class it was in and I didn't check them all. I blame myself as this really is
 +the type of mistake an amateur makes.  I wonder if I was in a hurry that day.
 +:)
 +
 +
 +16-Jan-93  19:06:39
 +
 +It turns out that a major change had been made to the way the Read/Write line
 +was handled. When I asked about this, VERY late in the design cycle, like in
 +Production when this problem turned up, I was told "remember,, this was
 +designed to work in the Z8000 machine." ???!!!! ????!!!! Shoulda seen the
 +look on my face! Even though the Z8000 machine was long dead and we had been
 +TRYING for 6 months to use this damn thing in the C128 I'm being told NOW
 +that you didn't design it to work the way we've been using it for 6 months?
 +Shoulda asked.... it was my fault, shoulda asked "is this meant to work".....
 +:/
 +
 +
 +Don't get me wrong, the designer was VERY bright, he held patents for some of
 +the "cells" in the Motorola 68000. It just that chip had to work in
 +conjunction with other chips and that's where some of the problems lay.  Our
 +story opens as Rev 0 of the chip.... (what's that..... doesn't work.... OK,)
 +Our story opens as Rev 1 of the chip makes its debut and ......(pardon me a
 +moment.....) Our story opens as Rev 2 of the chip makes it debut..... <to be
 +continued>
 +
 +
 +19-Jan-93  20:50:41
 +
 +Forgive the sporadic nature of these additions.  Now where was I .... oh
 +yeah.... It was sometime in September when we got 8563 Silicon (or so memory
 +serves) good enough to stick in a system. I can't remember what all was wrong
 +with the Chip but one concern we had was it occasionally (no spell checker
 +tonight, bear with me) blew up.... big time.... turn over die and then smell
 +bad..... But then all of the C128 prototypes did that on a semi regular basis
 +as there wasn't really any custom silicon yet, just big circuit boards
 +plugged in where custom chips would later go... but you can't wait for a
 +system to be completed before starting software development.   I don't think
 +any of the Animals really gave it a thought until when the next rev of the
 +chip came out and now with less other problems the blowing up 'seemed' more
 +pronounced.  Also the prototypes got more solid _almost_ every day.  (I knew
 +to go check on the programmer's prototype whenever I heard the sound of cold
 +spray coming out of their office.... later it turned out they usually weren't
 +spraying the boards just using their "Hardware Engineer" call.  Sometimes all
 +I had to do was touch the board in a mystical way and then back out slowly
 +sometimes accompanied by ritual like chanting and humming.  This became know
 +as the "laying of hands" This worked every time except one, and that time
 +it turned out I had stolen the power supply myself without telling them....
 +If anybody else got caught "messing with my guys" they'd get duct taped to a
 +locker and then the box kicked out from under them leaving them stuck until
 +they could peel themselves down, but that's another story.)  ANYWAY, when this
 +problem still existed on Rev 4 (I think it was) we got concerned.  It was at
 +this time that the single most scariest statement came out of the IC Design
 +section in charge of the '63.  This statement amounted to "you'll always have
 +some chance statistically that any read or write cycle will fail due to
 +(synchronicity)".
 +
 +
 +19-Jan-93  21:12:05
 +
 +Synchronicity problems occur when two devices run off of two separate clocks,
 +the VIC chip hence the rest of the system, runs off of a 14.318Mhz crystal
 +and the 8563 runs off of a 16Mhz Oscillator. Now picture walking towards a
 +revolving door with your arms full of packages and not looking up before
 +launching yourself into the doorway. You may get through unscathed if your
 +timing was accidentally just right, or you may fumble through losing some
 +packages (synonymous to losing Data) in the process or if things REALLY foul
 +up some of the packages may make it through and you're left stranded on the
 +other side of the door (synonymous to a completely blown write cycle). What I
 +didn't realize that he meant was that since there's always a chance for a bad
 +cycle to slip through, he didn't take even the most rudimentary protection
 +against bad synchronizing. It's MY FAULT I didn't ask, "what do you mean
 +fully by that statement" because I'd of found out early that there was NO
 +protection. As it turns out the 8563 instead of failing every 3 years or so
 +(VERY livable by Commodore standards) it failed about 3 times a second.  In
 +other words if you tried to load the font all in one shot it would blow up
 +every time!  The IC designers refused to believe this up until mid December
 +(CES in 2-3 weeks!) because "their unit in the lab didn't do it."  Finally I
 +said "show us" and they led the whole rabble (pitch forks, torches, ugly
 +scene) down to the lab.  It turns out they weren't EVEN TESTING THE CURRENT
 +REV of the chip, (TWO revs old), they were testing it from Basic because it
 +"blew up" every time they ran it at system speeds (No %^$#%$# sherlock.
 +That's what we're trying to tell you) and even then it screwed up once and
 +the designer reached for the reset switch saying that something does
 +occasionally go wrong.  Being one of the Animals with my reflexes highly
 +tuned by Programmer Abusing I was able to snatch his arm in mid-air before he
 +got to the reset switch, with blatant evidence there on the test screen.
 +
 +
 +19-Jan-93  21:12:15
 +
 +One of the rabble was their boss and (I have been speaking about two
 +designers interchangeably, but then they were interchangeable,) the word
 +Finally came down "FIX IT" Hollow Victory as there was only two weeks till
 +we packed for the show, and there were 4 or 5 other major problems (I'll say
 +more later) with the chip and NO time to do another pass. It was obvious that
 +if we were going to make CES something had to give. As Josey Wales said,
 +"Thats when ya gotta get Mean.... I mean downright plumb crazy Loco Mean".
 +And we knew we had to.  The programmer thrashing's hit a all time high shortly after.
 +
 +
 +22-Jan-93  14:17:32
 +
 +Memory flash, I just remembered when we found out there was no interrupt
 +facility built in to the 8563.  I remember how patient the designer was when
 +he sat me down to explain to me that you don't need an interrupt from the
 +8563 indicating that an operation is complete because you can check the
 +status ANY TIME merely by stopping what you're doing (over and over) and
 +looking at the appropriate register, (even if this means banking in I/O) or
 +better yet sit in a loop watching the register that indicates when
 +an operation is done (what else could be going on in the system besides
 +talking to the 8563 ???)  Our running gag became not needing a ringer on the
 +phone because you can pick it up ANY TIME and check to see if someone's on
 +it, or better yet, sit at your desk all day picking the phone up.   Even in
 +the hottest discussions someone would suddenly stop, excuse himself, and pick
 +up the nearest phone just to see if there was someone on it.  This utterly
 +failed to get the point across but provided hours of amusement.  The owners
 +at the local bar wondered what fixation the guys from Commodore had with the
 +pay phone.
 +
 +Any ways.... To back up to the other problems that plagued the 8563.  Going
 +into December a couple of things happened.  The design had been changed to
 +support a "back-bias generator" This thing is generally used to reduce
 +power consumption and speed the chip up.  Well, something was not quite right
 +somewhere in the design because the chip got worse.  The second thing that
 +happened was that both designers took vacation.  Nothing against that from my
 +point of view here 8-9 years in the future, but right then we couldn't
 +understand what these people were doing working on a critical project.
 +
 +
 +22-Jan-93  14:17:37
 +
 +Or maybe I was just getting to used to eating Thanksgiving Dinner out of
 +aluminum foil off of a Lab Bench.  Christmas consisted of stopping at
 +someone's house who lived in the area for a couple of hours on the way home
 +from work.  Anyways, the chips could no longer display a solid screen.  The
 +first couple of characters on each line were either missing or tearing, until
 +the thing heated up, then they were just missing.  Also, the yield of chips
 +that even worked this good fell to where they only got 3 or 4 working chips
 +the last run.  A run is a Half-Lot at MOS and costs between $40,000 and
 +$120,000 to run.  Pretty expensive couple of chips.
 +
 +The other problem takes a second to explain, but first a story.....  Back
 +when TED (the Plus four) had been mutilated decimated and defecated upon,
 +management decided to kick the body one last time.  "TED shall Talk" came the
 +decree and the best minds in the industry were sought... We actually did have
 +two of the most noted consumer speech people at the time, the guys who
 +designed the "TI Speak an Spell" worked out of the Commodore Dallas office.
 +They did a custom chip to interface a speech chip set to the processor.
 +Operating open loop, in other words without feedback from any of the system
 +design people (US) they defined the command registers.  There was a register
 +that you wrote to request a transfer.  To REALLY request the transfer you
 +wrote the same value a second time. We referred to this as the "do it, do it
 +now" register or the "come on pretty please" request, or my favorite, "those
 +#$%&@ Texans" register. ANYWAYS, the 8563 also had a problem where the 256
 +'bite' transfer didn't always take place properly, leaving a character
 +behind. This ended up having the effect of characters scrolling upwards
 +randomly.
 +
 +
 +22-Jan-93  14:17:45
 +
 +So to recap, going into December we had a chip with .001% yield, the left
 +columns didn't work, anytime there was one pixel by itself you couldn't see
 +it, the semi useless block transfer didn't work right, the power supply had
 +to be adjusted for each chip, and it blew up before you loaded all of the
 +fonts unless you took 10 seconds to load the fonts in which case it blew up
 +only sometimes. Finger pointing was in High swing, (the systems guys should
 +have said they wanted WORKING silicon) with one department pitted against the
 +other, which was sad because the other hardworking chip designers had
 +performed small miracles in getting their stuff done on time. Managers
 +started getting that look rabbits get in the headlights of onrushing Mack
 +trucks,  some started drinking, some reading poetry aloud and the worst were
 +commonly seen doing both. Our favorite behavior was where they hid in their
 +offices.  It was rumored that the potted plant in the lobby was in line for
 +one of the key middle management positions. Programmer beatings had hit a new
 +high only to fall off to almost nothing overnight as even this no longer
 +quelled the growing tension. A sprinkler head busted and rained all over
 +computer equipment stored in the hallway. Engineering gathered as a whole and
 +watched on as a $100,000 worth of equipment became waterlogged, their
 +expressions much like the bystanders at a grisly accident who can't tear
 +their attention away from the ensuing carnage.  I can honestly say that it
 +didn't seriously occur to me that we wouldn't be ready for CES, for if it
 +had, I might have succumbed to the temptation to go hide in my office
 +(checking the telephone).  There were just too many problems to stop and
 +think what if.  Next time (hopefully) I'll try and bring all the problems and
 +answers together and explain why I stopped to tell that rather out of place
 +TED story.
 +
 +
 +30-Jan-93  19:27:11
 +
 +No single custom chip was working completely as we went into December with
 +the possible exception of the 8510 CPU.  The MMU had a problem where data was
 +"bleeding through" from the upper 64K bank into the lower.  This was in part
 +due to a mixup in the different revision of "layers" that are used to make
 +chips. This chip essentially had one of the older layers magically appear
 +bring old problems with it.  Unfortunately, this older layer had been used to
 +fix newer problems so we didn't have a way to combine existing layers to fix
 +ALL problems. Dave D'Orio (start telling ya some of the names of a few of the
 +unsung types here) did a GREAT job of bringing most of the IC design efforts
 +together.  I was sitting with Dave in a bar, we were of course discussing
 +work, when he suddenly figured out what the problem was.  He had looked at
 +the bad MMU chip under a microscope that day.  Later that night, under the
 +influence of a few Michelobs, his brain "developed" the picture his eyes had
 +taken earlier and he realized that an earlier layer had gotten into the
 +design.
 +
 +
 +30-Jan-93  19:49:06
 +
 +This would not be the first time a problem would be addressed at this
 +particular bar.  (The Courtyard.... If you ever saw the David Letterman where
 +the guy stops the fan with his tongue, he was a bartender there). The PLA had
 +a problem where my group had made a typo in specifying the hundred some terms
 +that comprised the different operating parameters. Well the designer in
 +charge of the PLA took this rev as an opportunity to sneak a change into the
 +chip without really going public with the fact he was making a change.  When
 +the change went through it caused one of the layers to shift towards one side
 +and effectively shorted the input pins together. Ya should've seen the seen
 +where the designer's boss was loudly proclaiming that Hardware must of
 +screwed up because his engineer DIDN't make any changes (that would've been
 +like admitting that something had been "broken"). You could tell by the way
 +the designer's face was slowly turning red that he hadn't yet found a way of
 +telling his boss that he had made a change. Talk about giving someone enough
 +rope to hang themselves, we just kept paying it out yard by yard.
 +
 +
 +30-Jan-93  19:53:45
 +
 +Anyways back to the 8563.  The first problem was relatively easy to fix,
 +providing you didn't give a hang about your own self respect.  The 8563
 +designer mentioned that the block copy seemed to work better when you wrote
 +the same command twice in a row.  I made him explain this to me in public,
 +mostly due to the mean streak I was starting to develop when it came to this
 +particular subject.  He calmly explained that you merely wrote to this
 +register and then wrote to it again.  I asked "you mean do it and do it now?"
 +"Exactly", the designer exclaimed figuring he was on the home stretch  to
 +understanding (Intel, at last his eyes unfurled), "kinda like a 'come on
 +pretty please register' I asked with my best innocent expression, "Well sort
 +of" he replied doubt creeping in to his voice, "you wouldn't be from Texas
 +would you", I asked my face the definition of sincerity, (said in the voice
 +of the wanna-be HBO director on the HBO made for TV commercial) "why yes....
 +yes I am" he replied. Mind you a crowd had formed by this time, that poor guy
 +never understood what was so funny about being from Texas or what a 'Damm
 +Texan' register was.
 +
 +
 +30-Jan-93  19:53:50
 +
 +This 'fix' actually did work some what, the only problem was that no one told
 +the guy (Von Ertwine) who was developing CP/M at home (consultant). Von had
 +wisely chosen not to try to follow all of the current Revs of the 8563,
 +instead he latched onto a somewhat working Rev4 and kept if for software
 +development.  Later we would find out that Von, to make the 8563 work
 +properly, was taking the little metal cup that came with his hot air popcorn
 +popper (it was a buttercup to be exact) and would put an Ice cube in it and
 +set it on the 8563.  He got about 1/2 hour of operation per cube. On our side
 +there was talk of rigging cans of cold spray with foot switches for the CES
 +show, "sparkle??? I don't <pissshhh> see any sparkle <pissshhh>". Anyways,
 +no-one told Von.... but don't worry, he would find out the day before CES
 +during setup in 'Vegas.
 +
 +
 +    23-Oct-93  16:57:43
 +Sb: C128, The Final Chapter
 +
 +Thought I'd finish what I'd started back in January of this year. I had been
 +talkin 'bout how busted up the 8563, now we get to the part about how it got
 +fixed... well fixed good enough... well patched good enough to give every
 +possible attempt at the appearance of maybe passably working...
 +
 +One of the things that got worse instead of better was something called the
 +back bias generator.  Now as much as I admired the blind ambition (as opposed
 +to unmitigated gall... no one ever said it was unmitigated gall and I am not
 +saying that here and now) of slipping in a major change like that right
 +before a CES show, it became obvious that it needed fixed.  Now the back-bias
 +generator connects to the substrate of the chip and if you've ever seen the
 +ceramic versions of the 40 and 48 pin chips you would notice that the pin 1
 +indicator notch is gold colored.  That is actually a contact to the
 +substrate.  I have never heard of anyone ever soldering to the pin 1
 +indicator notch but I had little to lose.  At this point all I did have to
 +lose was a HUGE jar of bad 8563's. (One night a sign in my handwriting
 +"appeared" on this jar asking "Guess how many working 8563's there are in the
 +jar and win a prize."  Of course if the number you guessed was a positive
 +real number you were wrong.) I soldered a wire between this tab and the
 +closet ground pin.  The left column reappeared though still a little broken
 +up!  The "EADY" prompt now proudly stated that the machine was "READY" and not
 +really proclaiming it's desire to be known as the shortened version of
 +Edward.  To  fix the remaining tearing we put 330 ohm pullups on the outputs
 +and adjusted the power supply to 5.3 volts.  This is the equivalent of
 +letting Tim-the-Tool-Man-Taylor soup up your blender with a chainsaw motor
 +but it worked.  The side effect was that it would limit the useful life of
 +the part to days instead of weeks as was the normal Commodore Quality
 +Standard.  I was afraid that this fix might be deemed worthy for production.
 +(said with the kind of sardonic cynical smile that makes parole officers
 +really hate their jobs)
 +
 +Remember the synchronicity problem?  Remember the revolving door analogy?  We
 +built a tower for the VIC chip that had something called a Phase Lock Loop on
 +it which basically acted as a frequency doubler.  This took the 8.18 Mhz Dot
 +Clock (I think it was 8.18 Mhz.... been too long and too many other dot clock
 +frequencies since then) and doubled it.  We then ran a wire over to the 8563
 +and used this new frequency in place of its own 16 Mhz clock.  Now this is
 +equivalent to putting a revolving door at the other end of the room from the
 +first door and synchronizing them so that they turn at the same rate.  Now if
 +you get through the first door and walk at the right speed every time towards
 +the second door you will probably get through.  This tower working amounted
 +to a True Miracle and was accompanied by the sound of Hell Freezing over, the
 +Rabbit getting the Trix, and several instances of Cats and Dogs sleeping
 +together. This was the first time that making CES became a near possibility.
 +We laughed, we cried, we got drunk.  So much in hurry were we that the little
 +3" X 3" PCB was produced in 12 hours (a new record) and cost us about $1000
 +each.
 +
 +A new problem cropped up with sparkle in multi-colored character mode when
 +used for one of the C64 game modes.  Getting all too used to this type of
 +crises , I try a few things including adjusting the power supply to 4.75
 +volts.  Total time-to-fix, 2 minutes 18 seconds, course now the 80 column
 +display was tearing again. Machines are marked as to whether they can do 40
 +column mode, 80 column mode or both. We averaged 1-3 of these crises a day
 +the last two weeks before CES.  Several of us suffered withdrawal symptoms if
 +the pressure laxed for even a few minutes.  The contracted security guards
 +accidentally started locking the door to one of the development labs during
 +this time.  A hole accidentally appeared in the wall allowing you to reach
 +through and unlock it.  They continued to lock it anyways even though the
 +gaping hole stood silent witness to the ineffectiveness of trying to lock us
 +out of our own lab during a critical design phase.  We admired this
 +singleness of purpose and considered changing professions.
 +
 +We finished getting ready for CES about 2:00 in the morning of the day we
 +were to leave at 6:00.  On the way to catch the couple of hours sleep I hear
 +the Live version of Solsbury Hill by Peter Gabriel, the theme song of the
 +C128 Animals and take this as a good omen. Several hapless Programmers are
 +spared the ritual sacrifice this night... little do they know they owe their
 +lives to some unknown disc jockey.
 +
 +Advertisements in the Las Vegas airport and again on a billboard enroute from
 +the airport inform us that the C128 has craftily been designed to be
 +expandable to 512K.  Now it had been designed to be expandable originally and
 +had been respecified by management so as to not be expandable in case next
 +year's computer needed the expendability as the "New" reason to buy a
 +Commodore computer. That's like not putting brakes on this years model of car
 +so that next year you can tote the New model as reducing those annoying
 +head-on crashes.
 +
 +Upon arriving at the hotel we find that out hotel reservations have been
 +canceled by someone who fits the description of an Atari employee.  Three
 +things occur in rapid succession.  First I find the nearest person owning a
 +credit card and briskly escort her to the desk were I rented a room for all
 +available days, second, a phone call is placed to another nearby hotel
 +canceling the room reservations for Jack Trameil and company, third, several
 +of those C64's with built in monitors (C64DX's??? man it's been too long) are
 +brought out and left laying around the hotel shift supervisors path
 +accompanied by statements such as "My my, who left this nifty computer laying
 +here... I'd bet they wouldn't miss it too much".
 +
 +The next day we meet up with the guy who developed CPM (Von) for the C128.
 +As I mentioned earlier, someone forgot to tell him about the silly little
 +ramifications of an 8563 bug.  His 'puter didn't do it as he had stopped
 +upgrading 8563s on his development machine somewhere around Rev 4 and the
 +problem appeared somewhere around Rev 6.  As Von didn't carry all the
 +machinery to do a CPM rebuild to fix the bug in software, it looked like CPM
 +might not be showable.  One third of the booth's design and advertising was
 +based on showing CPM.  In TRUE Animal fashion Von sat down with a disk editor
 +and found every occurrence of bad writes to the 8563 and hand patched them.
 +Bear in mind that CPM is stored with the bytes backwards in sectors that are
 +stored themselves in reverse order. Also bear in mind that he could neither
 +increase or decrease the number of instructions, he could only exchange them
 +for different ones.  Did I mention hand calculating the new checksums for the
 +sectors?  All this with a Disk Editor. I was impressed.
 +
 +Everything else went pretty smooth, every supply was adjusted at the last
 +moment for best performance for that particular demo.  One application has
 +reverse green (black on green) and the 330 ohm pullups won't allow the
 +monitor to turn off fast enough for the black characters.  I had had
 +alternate pullup packs made up back in West Chester and put them in to
 +service.  On the average,2 almost working 8563's would appear each day, hand
 +carried by people coming to Vegas. Another crisis, no problem, this was
 +getting too easy.  If a machine started to sparkle during the demo, I would
 +pull out my ever present tweak tool and give a little demonstration as to the
 +adjustability of the New Commodore power supplies.  People were amazed by
 +Commodore supplies that worked, much less had a voltage adjustment and an
 +externally accessible fuse.  I explained (and meant it) that real bad power
 +supplies with inaccessible fuses were a thing of Commodore's past and that
 +the New design philosophy meant increased quality and common sense.
 +
 +I'm told they removed the fuse access from production units the month after I
 +left Commodore.
 +
 +The names of the people who worked on the PCB layout can be found on
 +the bottom of the PCB.
 +
 +"RIP: HERD, FISH, RUBINO"
 +
 +The syntax refers to an inside joke where we supposedly gave our lives in an
 +effort to get the FCC production board done in time, after being informed
 +just the week before by a middle manager that all the work on the C128 must
 +stop as this project has gone on far too long.  After the head of Engineering
 +got back from his business trip and inquired as to why the C128 had been put
 +on hold, the middle manger nimbly spoke expounding the virtues of getting
 +right on the job immediately and someone else, _his_ boss perhaps, had made
 +such an ill suited decision.  The bottom line was we lived in the PCB layout
 +area for the next several days.  I slept there on an airmatress or was
 +otherwise available 24 hours a day to answer any layout questions.  The
 +computer room was so cold that the Egg Mcmuffins we bought the first day were
 +still good 3 days later.
 +
 +About the Z80:
 +
 +What court ordered Commodore to install the Z80?
 +
 +It wasn't mandated by court order, it was mandated by a 23 year old
 +engineer that realized that marketing had gone and said that we were 100%
 +compatible.  This turned out to be a hard nut to crack as no-one knew
 +what C64 compatibility meant.  Companies who designed cartridges for the
 +C64 used glitches to clock their circuitry not realizing that the glitches
 +were not to be depended on, etc.
 +
 +The Z80/CPM cartridge didn't work on all C64's, and no-one had really taken
 +the time to figure out why.  Someone noticed that a certain brand of the
 +address buffer used in the CPM cart worked better than others so someone
 +concluded that it must be the timing parameters that made a difference.
 +This wasn't true, it was a very subtle problem that dealt with the way the
 +6502, the Z80 and the DRAM had been interlaced together.  So here we had
 +a CPM cart that didn't work with all C64's and it worked even
 +less reliably with the C128 even though the timing parameters in the C128
 +were far better.  In my opinion you couldn't call the C128 compatible
 +with the CPM cart as it only ran 20% of the time when tested overnight.
 +
 +ALSO, I worked hard to make sure the C128 had a reliable power supply.  I
 +was told "no fuse'..... oops one got in there by accident... in fact it
 +was easily accessible... darn it anyway.  However, with the wide
 +variations in minimum and maximum power supply requirements we couldn't
 +handle the CPM cart, it needed an additional .5 amp because of some
 +wasteful power techniques that were used in it.  I couldn't foot the
 +bill for an additional .5 amp that might only occasionally be used.
 +
 +SO, with that said, I accidentally designed the Z80 into the next rev of
 +the board.  We designed the C128 in 6 months from start to finish
 +INCLUDING custom silicon, these were records back then, the Z80 was added
 +around the second month.
 +
 +The Z80 normally calls for a DRAM cycle whenever it needs one... it might
 +go 3 clocks and then 4 and then 6 and then 5 and then 7  between dram
 +accesses. Since the processor shares the bus with the VIC chip there are
 +only certain time when the bus is available for a DRAM cycles.  Since the
 +shortest cycle for a DRAM access for the Z80 is 3 clock cycles, you are
 +sure to catch a DRAM access if you do 2 cycles (wait for vic) then 2
 +cycles (wait for vic).  Whether you catch the Z80 between clock 1 and 2 or
 +between 2 and 3 doesn't matter due to the special circuitry in the design.
 +Otherwise if you just let the Z80 rip it crashes when it tries to grab
 +DRAM while there is a video(vic) cycle going on.  And that's why it runs
 +at a clock-stretched 2MHz.  The REAL bitch was the Ready circuitry when 
 +flipping between DMA/6502/Z80.
 +
 +The C128 design team: SYS32800,123,45,6
 +
 +Bil Herd       Original design and Hardware team leader.
 +Dave Haynie    Integration, timing analysis, and all those dirty
 +              jobs involving computer analysis which was something
 +              totally new for CBM.
 +Frank Palaia   One of three people in the world who honestly knows
 +              how to make a Z80 and a 6502 live peacefully with
 +              each other in a synchronous, dual video controller,
 +              time sliced, DRAM based system.
 +Fred Bowen     Kernal and all system like things.  Dangerous when
 +              cornered.  Has been known to  brandish common sense
 +              when trapped.
 +Terry Ryan     Brought structure to Basic and got in trouble for
 +              it. Threatened with the loss of his job if he ever
 +              did anything that made as much sense again.  Has
 +              been know to use cynicism in ways that violate most
 +              Nuclear Ban Treaties.
 +Von Ertwine    CPM.  Sacrificed his family's popcorn maker in the
 +              search of a better machine.
 +Dave DiOrio    VIC chip mods and IC team leader.  Ruined the theory
 +              that most chip designers were from Pluto.
 +Victor         MMU integration. Caused much dissention by being one
 +              of the nicest guys you'd ever meet.
 +Greg Berlin    1571 Disk Drive design.  Originator of Berlin-Speak.
 +              I think of Greg every night.  He separated my
 +              shoulder in a friendly brawl in a bar parking lot
 +              and I still cant sleep on that side.
 +Dave Siracusa  1571 Software.  Aka "The Butcher"
 +
 +Not to mention the 8563 designers who made this story possible.
 +
 +.......
 +....
 +..
 +.                                    C=H #17
 +
 +       -fin-
 +</code>
magazines/chacking17.txt · Last modified: 2015-04-17 04:34 (external edit)