Dear Folks,

    We have a new TSO command called LISTMOD, which allows you to see what is in a load module very clearly, INCLUDING ALL DISPLACEMENTS.  I don't believe that this kind of tool existed before, or at least (if it did), it wasn't in wide circulation.  The tool is on the CBT Tape File 994, (improved version on the Updates Page) and it is free.

    This LISTMOD command allows you to display PDSE load modules as well, and see the code and displacements.

    This LISTMOD command can be found on File 994 of the Updates page of www.cbttape.org .  Use the version of LISTMOD on the UPDATES PAGE only, which was greatly improved.

    Invoke LISTMOD by simply saying:   LISTMOD modname    where modname is a load module name.  If the load module is in LPA, LISTMOD will say so.

    To direct LISTMOD to a particular library (PDS or PDSE) containing the load module, allocate that library to the DDNAME of TASKLIB.

    Output of LISTMOD can be very long, so it should be captured by s SYSOUTTRAP tool (such tools are included in File 994).

    Some sample output follows:

Loaded Program Name:  DSLIST
-----------------------------------------------------------------
Module has been LOADED. CDE Address: 008B5128
Length of loaded module Hex:  00012818    Decimal: 75800
Length after entry address :  00012818    Decimal: 75800
Displacement of entry point:  00000000    Decimal: 0
-----------------------------------------------------------------

 00  DSLIST 04/22/24 17.51 Copyright (C) 2021-2022 J. Stephen My   00000000
4FF43CEDCEE4FF6FF6FF4FF4FF4C99A9888A44C54FFFF6FFFF4D44EA898894DA
7004E423923004122124017B5103678997830D3D020210202201B02357855048
0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---

ers   }   x     8Y       }  &}0 &0}             }     } 8 } } |    00000040
89A09ED01CAB0004FE5BB01F4DB05DF05FD0521041000090D0D0B8D0F7D4D141
59200C0C8F7504008880008D10000008000480001002AB010CE57B0C830000F0
0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---

}   )  } \ %        +\} 3  g} o0   \x   )\ M  x    0xd xM   00000080
D41050CD4E161F1140004ED4F3B8D49FB81EA7005ECD1EA7001FA800400311AD
00B0D0D0107C8E801003E000377700607A40740AD0D42E740C407409100B9074
0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---

                  .  6    K  c0 + } 3   } o0 a         \ 0       000000C0
0041101E4EC31F1E1F41CF4FC0D0B8F041D4F1B8D49FB8412040204EB74F02B1
041001BE31C38EAEAEBEB61FCD227300E0003770006071800010021050100CF8
0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---

     (many lines follow)

     Best of everything to all of you.

Sincerely,     Sam

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to