Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
VTMODS z/OS Communications Server: SNA Diagnosis Vol 1, Techniques and Procedures GC27-3667-00 |
|
Use VTMODS to find the entry point of the VTAM® modules that reside in the VTAM private region. VTMODS reports the number of modules found and equates the entry point of each module found to its module name in the IPCS symbol table. After VTMODS executes, the VTAM modules found can be located using the module name in the IPCS LIST command. VTMODS
is useful when you are checking the PTF level of several modules or
when you want to quickly verify the PTF or APAR level of a module
in a dump.
Note: For VTMODS to execute successfully, the VTAM private region must have been
dumped (that is, the RGN parameter must have been specified when the
dump was taken). If fewer than 10 modules are found, VTAM private storage is missing from the dump.
If the dump does contain the VTAM private region but is a partial dump, VTMODS attempts to find as many VTAM modules as possible. Operands
Equated symbolFor each VTAM module that is found, an IPCS symbol (the
name of the module as it appears in the module eye-catcher) is equated
to the entry point of the module.
Use the following syntax as an alternative to the panel interface. Syntax.- --LIST--(--N--)-. >>-VTMODS--+------------------+-------------------------------->< '- --LIST--(--Y--)-' Additional informationThe symbols created remain in the IPCS dump directory until the dump directory is deleted or until an IPCS DROPDUMP command is issued for the dump. VTMODS scans VTAM private storage for the character string IST. When IST is found, a check is made to determine whether this occurrence of IST represents a VTAM module eye-catcher. Most VTAM modules have a branch instruction hexadecimal 47F0F0xx at the entry point to the module to branch around the eye-catcher. If hexadecimal 47F0F0xx appears 5, 7, or 9 bytes before the module eye-catcher, the location is considered in most cases to be a VTAM module entry point. Storage is scanned starting at the lowest address of private storage to the top of the private region (below the 16 MB line). The scan then continues starting at the lowest address of extended private storage (above the 16 MB line) and continues for about hexadecimal 400 000 bytes. Sample output
|
Copyright IBM Corporation 1990, 2014
|