I think you need to specify the length of the second operand or else it
will take the length of WKPACK and pick up bytes beyond the end of WKPACK.
On 2022-01-26 2:02 p.m., Keven Hall wrote:
The second operand must end on or after the end (last byte) of the first
operand for correct results.
Regards
Keven
On Jan 26, 2022, at 11:45, Frank M. Ramaekers<[email protected]>
wrote:
Will this instruction work?
ZAP WKPACK,WKPACK+(L'WKPACK-L'KDAYSQC) Expand remainder
In other words, can one expand the remainder from a DP instruction to the
entire field?
Frank Ramaekers Jr. | Systems Senior Administrator | CIS Mainframe Services
Unisys | O-(512) 387-3949 | M-(254) 214-1820
|[email protected]<mailto:[email protected]>
[unisys_logo]<http://www.unisys.com/>
THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY
MATERIAL and is for use only by the intended recipient. If you received this in
error, please contact the sender and delete the e-mail and its attachments from
all devices.
[Grey_LI]<http://www.linkedin.com/company/unisys> [Grey_TW]<http://twitter.com/unisyscorp>
[Grey_GP]<https://plus.google.com/+UnisysCorp/posts> [Grey_YT]<http://www.youtube.com/theunisyschannel>
[Grey_FB]<http://www.facebook.com/unisyscorp> [Grey_Vimeo]<https://vimeo.com/unisys>
[Grey_UB]<http://blogs.unisys.com/> [Grey_Weibo]<https://weibo.com/unisyschina>
----------------------------------------------------------------------
This message contains information which is privileged and confidential and is
solely for the use of the intended recipient. If you are not the intended
recipient, be aware that any review, disclosure, copying, distribution, or use
of the contents of this message is strictly prohibited. If you have received
this in error, please destroy it immediately and notify us
[email protected].
Gary Weinhold
Senior Application Architect
DATAKINETICS | Data Performance & Optimization
Phone:+1.613.523.5500 x216
Email: [email protected]
Visit us online at www.DKL.com
E-mail Notification: The information contained in this email and any
attachments is confidential and may be subject to copyright or other
intellectual property protection. If you are not the intended recipient, you
are not authorized to use or disclose this information, and we request that you
notify us by reply mail or telephone and delete the original message from your
mail system.