Thanks, Sam! Sent from [Proton Mail](https://proton.me/mail/home) for iOS
On Wed, Jun 5, 2024 at 8:35 AM, Sam Golob <[sbgo...@cbttape.org](mailto:On Wed, Jun 5, 2024 at 8:35 AM, Sam Golob <<a href=)> wrote: > Dear Folks, > > We have a new TSO command called LISTMOD, which allows you to see > what is in a load module very clearly, INCLUDING ALL DISPLACEMENTS. I > don't believe that this kind of tool existed before, or at least (if it > did), it wasn't in wide circulation. The tool is on the CBT Tape File > 994, (improved version on the Updates Page) and it is free. > > This LISTMOD command allows you to display PDSE load modules as > well, and see the code and displacements. > > This LISTMOD command can be found on File 994 of the Updates page > of www.cbttape.org . Use the version of LISTMOD on the UPDATES PAGE > only, which was greatly improved. > > Invoke LISTMOD by simply saying: LISTMOD modname where modname > is a load module name. If the load module is in LPA, LISTMOD will say so. > > To direct LISTMOD to a particular library (PDS or PDSE) containing > the load module, allocate that library to the DDNAME of TASKLIB. > > Output of LISTMOD can be very long, so it should be captured by s > SYSOUTTRAP tool (such tools are included in File 994). > > Some sample output follows: > > Loaded Program Name: DSLIST > ----------------------------------------------------------------- > Module has been LOADED. CDE Address: 008B5128 > Length of loaded module Hex: 00012818 Decimal: 75800 > Length after entry address : 00012818 Decimal: 75800 > Displacement of entry point: 00000000 Decimal: 0 > ----------------------------------------------------------------- > > 00 DSLIST 04/22/24 17.51 Copyright (C) 2021-2022 J. Stephen My > 00000000 > 4FF43CEDCEE4FF6FF6FF4FF4FF4C99A9888A44C54FFFF6FFFF4D44EA898894DA > 7004E423923004122124017B5103678997830D3D020210202201B02357855048 > 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+--- > > ers } x 8Y } &}0 &0} } } 8 } } | 00000040 > 89A09ED01CAB0004FE5BB01F4DB05DF05FD0521041000090D0D0B8D0F7D4D141 > 59200C0C8F7504008880008D10000008000480001002AB010CE57B0C830000F0 > 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+--- > > } ) } \ % +\} 3 g} o0 \x )\ M x 0xd xM 00000080 > D41050CD4E161F1140004ED4F3B8D49FB81EA7005ECD1EA7001FA800400311AD > 00B0D0D0107C8E801003E000377700607A40740AD0D42E740C407409100B9074 > 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+--- > > . 6 K c0 + } 3 } o0 a \ 0 000000C0 > 0041101E4EC31F1E1F41CF4FC0D0B8F041D4F1B8D49FB8412040204EB74F02B1 > 041001BE31C38EAEAEBEB61FCD227300E0003770006071800010021050100CF8 > 0---+---+---+---1---+---+---+---2---+---+---+---3---+---+---+--- > > (many lines follow) > > Best of everything to all of you. > > Sincerely, Sam > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN