HLASM Toolkit Feature Interactive Debug Facility User's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Symbolic addresses

HLASM Toolkit Feature Interactive Debug Facility User's Guide
GC26-8709-07

Symbolic addresses consist of several tokens, and can be parsed with the following REXX instruction (where NAME is the variable containing the symbolic address):
Parse Var name hexvalue . '(' csect ')' symbolic
After this Parse instruction, the following variables contain, for example:
NAME
0002000C (ALLOPEN) ALLOPEN+12
HEXVALUE
0002000C
CSECT
ALLOPEN
SYMBOLIC
ALLOPEN+12

If the address is outside of the target programs defined to IDF, the code section (CSECT) name is omitted and the symbolic name is a second hexadecimal value.

If the address is outside the currently qualified module or the FULLQUAL option is ON, then the code section name as defined above is module.csect, where module is the name of module containing the address.

EXTRACT CURSOR follows the rules for obtaining arguments that are described in Arguments and cursor positioning except that it does not examine the command line for an argument.

If a Dump window is opened and the location being dumped is a 64 bit address, the variables FIELD, EXTRACT, INDIRECT, CPDUMP and NPDUMP are 16 byte fields.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014