On 21 July 2015 at 20:53, Wolf <w...@wlenerz.com> wrote: > Hi, > >>>> disasm $12b40 >>> >>> $012b40 : 6052 bra.s $12b94 >>> $012b42 : 7a4b moveq #$4b,d5 >>> $012b44 : 6002 bra.s $12b48 >>> $012b46 : 7a41 moveq #$41,d5 >>> $012b48 : b3ca cmpa.l a2,a1 >>> $012b4a : 6dfa blt.s $12b46 >>> $012b4c : 4e75 rts >>> $012b4e : 6012 bra.s $12b62 >>> >>> This is right after the string. > > > Yes, and it's very wrong. > (...) > > >>> No. >>> I can set a breakpoint at a address. >>> > > Good, set it at $12b40 >>> >>> >> HEXdump: >> >> 000005e0: 0003 5965 7300 ffff 2689 2649 4299 32d8 ..Yes...&.&IB.2. >> 000005f0: b3ca 6dfa 4e75 6012 0000 46fc 2700 4e70 ..m.Nu`...F.'.Np >> 00000600: 4cf8 0300 0000 2e48 4ed1 2f07 6622 41fa L......HN./.f"A. >> 00000610: 053a 2010 671a 0cb0 514d 4f4e 0804 6708 .: .g...QMON..g. >> 00000620: d0a8 0004 d1c0 60ea 41f0 0808 70ff 4e90 ......`.A...p.N. >> 00000630: 2e1f 4eba 0306 1a3a fbda 0885 0000 6604 ..N....:......f. >> 00000640: 4eba 03fa 8c05 1a3c 001e ca06 0c05 0008 N......<........ >> >> 32d8 b3ca 6dfa , the debugger reports 7a41 instead of 32d8 > > > > Now, this is the correct content, it corresponds to the SMSQ.PRG file.
That is the SMSQ.PRG file :) I just pasted it for reference. > > What kind of machine or rather processor is this runnung on (could this be > some kind of cache problem?). 68000 STe (tested with 1 and 4MB ram) > > If you set the breakpoint at $12b40, you will notice that this routine gets > called quite a few times - it copies the individual modules.. > > You could check whether the code is still good each time it is called, so we > could perhaps find out when the corruption occurs. > Ok will do. _______________________________________________ QL-Users Mailing List http://www.q-v-d.demon.co.uk/smsqe.htm