Thanks, Sam!

Sent from [Proton Mail](https://proton.me/mail/home) for iOS

On Wed, Jun 5, 2024 at 8:35 AM, Sam Golob <[sbgo...@cbttape.org](mailto:On Wed, 
Jun 5, 2024 at 8:35 AM, Sam Golob <<a href=)> wrote:

> Dear Folks,
>
> We have a new TSO command called LISTMOD, which allows you to see
> what is in a load module very clearly, INCLUDING ALL DISPLACEMENTS. I
> don't believe that this kind of tool existed before, or at least (if it
> did), it wasn't in wide circulation. The tool is on the CBT Tape File
> 994, (improved version on the Updates Page) and it is free.
>
> This LISTMOD command allows you to display PDSE load modules as
> well, and see the code and displacements.
>
> This LISTMOD command can be found on File 994 of the Updates page
> of www.cbttape.org . Use the version of LISTMOD on the UPDATES PAGE
> only, which was greatly improved.
>
> Invoke LISTMOD by simply saying: LISTMOD modname where modname
> is a load module name. If the load module is in LPA, LISTMOD will say so.
>
> To direct LISTMOD to a particular library (PDS or PDSE) containing
> the load module, allocate that library to the DDNAME of TASKLIB.
>
> Output of LISTMOD can be very long, so it should be captured by s
> SYSOUTTRAP tool (such tools are included in File 994).
>
> Some sample output follows:
>
> Loaded Program Name: DSLIST
> -----------------------------------------------------------------
> Module has been LOADED. CDE Address: 008B5128
> Length of loaded module Hex: 00012818 Decimal: 75800
> Length after entry address : 00012818 Decimal: 75800
> Displacement of entry point: 00000000 Decimal: 0
> -----------------------------------------------------------------
>
> 00 DSLIST 04/22/24 17.51 Copyright (C) 2021-2022 J. Stephen My
> 00000000
> 4FF43CEDCEE4FF6FF6FF4FF4FF4C99A9888A44C54FFFF6FFFF4D44EA898894DA
> 7004E423923004122124017B5103678997830D3D020210202201B02357855048
> 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---
>
> ers } x 8Y } &}0 &0} } } 8 } } | 00000040
> 89A09ED01CAB0004FE5BB01F4DB05DF05FD0521041000090D0D0B8D0F7D4D141
> 59200C0C8F7504008880008D10000008000480001002AB010CE57B0C830000F0
> 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---
>
> } ) } \ % +\} 3 g} o0 \x )\ M x 0xd xM 00000080
> D41050CD4E161F1140004ED4F3B8D49FB81EA7005ECD1EA7001FA800400311AD
> 00B0D0D0107C8E801003E000377700607A40740AD0D42E740C407409100B9074
> 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---
>
> . 6 K c0 + } 3 } o0 a \ 0 000000C0
> 0041101E4EC31F1E1F41CF4FC0D0B8F041D4F1B8D49FB8412040204EB74F02B1
> 041001BE31C38EAEAEBEB61FCD227300E0003770006071800010021050100CF8
> 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+---
>
> (many lines follow)
>
> Best of everything to all of you.
>
> Sincerely, Sam
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to