Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Symbolic addresses HLASM Toolkit Feature Interactive Debug Facility User's Guide GC26-8709-07 |
|
Symbolic addresses consist of several tokens, and can be parsed
with the following REXX instruction (where NAME is the variable
containing the symbolic address):
After this Parse instruction, the following variables contain,
for example:
If the address is outside of the target programs defined to IDF, the code section (CSECT) name is omitted and the symbolic name is a second hexadecimal value. If the address is outside the currently qualified module or the FULLQUAL option is ON, then the code section name as defined above is module.csect, where module is the name of module containing the address. EXTRACT CURSOR follows the rules for obtaining arguments that are described in Arguments and cursor positioning except that it does not examine the command line for an argument. If a Dump window is opened and the location being dumped is a 64 bit address, the variables FIELD, EXTRACT, INDIRECT, CPDUMP and NPDUMP are 16 byte fields. |
Copyright IBM Corporation 1990, 2014
|