> 072A 1F77 SRL R7,R7 R7 = 0
> 072C 50705018 ST R7,24(,R5) Clear R1 in previous Save Area
>
> I assume R7 has a value less than decimal 64 in order for the comment
> R7=0 to be accurate. SRL is Shift Right Logical and SRL R7,R7 means
> Shift the contents of R7 right by 7 bits, which basically means divide
> by 64 (or clear the reg because it always has a value of less than 64).
Oops. That is a type on my part. Opcode 1F is SLR (Subtract Logical). So I
looked it up correctly,
commented it correctly, but funbled with the instruction mnemonic.
> I have software diagnostic tools at my disposal where I could actually
> stop the program at the offset 72C and look at R4. From what little
> I have delved into the bowels of LE run time I have always found R4 to
> be adjusted from routine to routine - kind of like it is routine-related
> temp storage. An old fashion way to figure out what is in R4 is to take
> a copy of IGZCPAC from SCEERUN and move it to your STEPLIB. Zap your
> steplib version so that offset 72C ST instruction opcode 50 is changed
> to 00. That will cause an abend0C1 when it is executed. From the
> SYSUDUMP you can find R4 and the data will probably be in the dump.
> If not use a SYSMDUMP and then use IPCS to list the address.
I got my hand-generated disassembly from a dump that also contains the areas
in question:
Dump No 3443 Job Z6141303 Step FQZ020 Program FQM5021 Abend Code
S0C1
GR 0-7 00000000 0003B780 19313498 19512160 0003B798 00000000 0004BBD0
0003B780
GR 8-F 00000002 193A3C10 0004A050 992A03B0 00027B58 0003B7C8 992A067C
00000000
Address Offset Origin STORAGE 0011
0003B778 012778 00000000 00000000 193956A0 19395698 *..........îµ..îq*
R1
0003B788 012788 993956B0 00000000 C6D8D4F5 F0F2F140 *r.î^....FQM5021 *
0003B798 012798 A6080000 0003B790 0003B780 00000000 *w.....¼°..¼Ø....*
R4
0003B7A8 0127A8 00000000 00000000 00000000 00000000 *................*
0003B7B8 0127B8 00000000 00000000 00000000 00000000 *................*
0003B7C8 0127C8 00102401 0003AE78 0003B9A8 992A067C *......þÌ..¾y...@*
DSA_ACT
0003B7D8 0127D8 99543000 0003B9A8 0003B780 19313498 *rè....¾y..¼Ø...q*
0003B7E8 0127E8 19512160 0003B798 00000000 0004BBD0 *.é.-..¼q......]}*
0003B7F8 0127F8 0003B780 00000002 193A3C10 0004A050 *..¼Ø..........µ&*
0003B808 012808 992A03B0 00027B58 00000000 0003B9A8 *r..^..#ì......¾y*
0003B818 012818 00000000 00000000 0003B7C8 193A4400 *..........¼H..à.*
0003B828 012828 00027B58 00000000 00000000 992A0AF4 *..#ì........r..4*
0003B838 012838 00000000 00000000 00000000 00000000 *................*
0003B848 012848 992A059C 000002F8 0003B9A8 0003B798 *r..æ...8..¾y..¼q*
So R4 contains address 0003B798. It points to a byte that contains x'A6'.
Fred!
-----------------------------------------------------------------
ATTENTION:
The information in this electronic mail message is private and
confidential, and only intended for the addressee. Should you
receive this message by mistake, you are hereby notified that
any disclosure, reproduction, distribution or use of this
message is strictly prohibited. Please inform the sender by
reply transmission and delete the message without copying or
opening it.
Messages and attachments are scanned for all viruses known.
If this message contains password-protected attachments, the
files have NOT been scanned for viruses by the ING mail domain.
Always scan attachments before opening them.
-----------------------------------------------------------------
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html