On 21 July 2015 at 21:56, Michael Grunditz <michael.grund...@gmail.com> wrote:
> On 21 July 2015 at 20:53, Wolf <w...@wlenerz.com> wrote:
>> Hi,
>>
>>>>> disasm $12b40
>>>>
>>>> $012b40 : 6052                                 bra.s     $12b94
>>>> $012b42 : 7a4b                                 moveq     #$4b,d5
>>>> $012b44 : 6002                                 bra.s     $12b48
>>>> $012b46 : 7a41                                 moveq     #$41,d5
>>>> $012b48 : b3ca                                 cmpa.l    a2,a1
>>>> $012b4a : 6dfa                                 blt.s     $12b46
>>>> $012b4c : 4e75                                 rts
>>>> $012b4e : 6012                                 bra.s     $12b62
>>>>
>>>> This is right after the string.
>>
>>
>> Yes, and it's very wrong.
>> (...)
>>
>>
>>>> No.
>>>> I can set a breakpoint at a address.
>>>>
>>
>> Good, set it at $12b40
>>>>
>>>>
>>> HEXdump:
>>>
>>> 000005e0: 0003 5965 7300 ffff 2689 2649 4299 32d8  ..Yes...&.&IB.2.
>>> 000005f0: b3ca 6dfa 4e75 6012 0000 46fc 2700 4e70  ..m.Nu`...F.'.Np
>>> 00000600: 4cf8 0300 0000 2e48 4ed1 2f07 6622 41fa  L......HN./.f"A.
>>> 00000610: 053a 2010 671a 0cb0 514d 4f4e 0804 6708  .: .g...QMON..g.
>>> 00000620: d0a8 0004 d1c0 60ea 41f0 0808 70ff 4e90  ......`.A...p.N.
>>> 00000630: 2e1f 4eba 0306 1a3a fbda 0885 0000 6604  ..N....:......f.
>>> 00000640: 4eba 03fa 8c05 1a3c 001e ca06 0c05 0008  N......<........
>>>
>>> 32d8 b3ca 6dfa , the debugger reports 7a41 instead of 32d8
>>
>>
>>
>> Now, this is the correct content, it corresponds to the SMSQ.PRG file.
>
>
> That is the SMSQ.PRG file :) I just pasted it for reference.
>
>>
>> What kind of machine or rather processor is this runnung on (could this be
>> some kind of cache problem?).
>
> 68000 STe (tested with 1 and 4MB ram)
>
>>
>> If you set the breakpoint at $12b40, you will notice that this routine gets
>> called quite a few times - it copies the individual modules..
>>
>> You could check whether the code is still good each time it is called, so we
>> could perhaps find out when the corruption occurs.
>>
>
> Ok will do.

It enters the code without corrupting it 9 times. Fails after that.

So which is the last(?) module?
_______________________________________________
QL-Users Mailing List
http://www.q-v-d.demon.co.uk/smsqe.htm

Reply via email to