List maps, groups and symbols from loaded symbol files.
See the W command for related information.
Syntax:
──── L ───┬─ A ─┬───┬──────────────┬────────────────────────── ├─ M ─┤ └── map-name ──┘ ├─ G ─┘ │ │ ├─ S ─────┬──────────┬────────────────────────────── │ └── addr ──┘ │ │ └─ N ─────┬────────────┬──────────────────────────── ├── addr ──┤ └── symbol ──┘
Parameters:
A
When symbol is specified then the address, map and group corresponding to the symbol is listed.
If neither addr nor symbol is specified then the default disassembly address is assumed. See the .R and U commands for related information.
Results & Notes:
Symbol maps are obtained from symbol files (*.SYM), which are generated using the linkage editor and the MAPSYM utility. Under the Kernel Debugger they are loaded from the same directory as their corresponding load module when that is loaded by the system. When this happens the Symbols linked (map-name) message appears. When a load module is deleted from the system, its map is removed and the message Symbols unlinked (map-name) appears.
Under the Dump Formatter symbol files are loaded for each MTE in the dump, during initialisation, from the current directory (usually the directory the Dump Formatter is running from).
Under the Dump Formatter conforming segments are not checked. Thus a ring 2 selector:offset address may not be recognised, whereas the ring 3 selector is. If LN does not find a symbol for a ring 2 selector, try specifying the same selector with the ring 3 RPL specified. For example, specify d0fe:1234 as d0ff:1234.
Under the Dump Formatter LN does not check equivalences of the selector:offset and linear forms of an address. Therefore it may be necessary to apply the CRMA to an address if LN fails to find any near symbols.
Loaded symbol maps be active or inactive, depending on whether the corresponding load module is (potentially) active in the current context. In the case of private executable modules erroneous symbolic information may be associated with a private storage location. For this reason maps may be manually activated and removed using the W command.
Maps for WINOS2 and WINDOWS components are supported under the Kernel Debugger only. These are automatically activated and deactivated according to whether the Kernel Debugger default thread slot is a WINDOWS or WINOS2 environment.
Output from each of the L subcommands is more or less self explanatory. Examples follow:
-------------------------------------------------------------------------------##la cmd: 9876 __acrtmsg 9876 __acrtused d6d6 __aDBused d6d6 __aDBdoswp ------------------------------------------------------------------------------- List absolute symbols defined in cmd.exe and their associated constants.
------------------------------------------------------------------------------- ##lm cmd is active kernel [0040, 003f] minxobj is active wpprint is active nwiapi is active rexxinit is active pmmle is active fka is active ibmdevr is active ibmvgar is active pmpre is active os2krnl is active ------------------------------------------------------------------------------- List current map status.
Note:
The Windows Kernel is not active, but loaded in thread slots 40 and 3f. The additional active slot number information is only provided with WINDOWS and WINOS2 environment map files.
------------------------------------------------------------------------------- ##lg cmd cmd: 000f:00000000 _TEXT1 0017:00000000 _TEXT3 001f:00000000 DGROUP ------------------------------------------------------------------------------- List segment groups defined in cmd.exe and their associated addresses.
------------------------------------------------------------------------------- ##ln %20000 %00020000 cmd:_TEXT3:_eChcp ##ln _tkschednext %fff4521c os2krnl:DOSHIGH32CODE:_tkSchedNext ##ln 0170:fff44695 os2krnl:DOSHIGH32CODE:HaltInst + 1 0170:fff44787 postSchedNext - f1 ------------------------------------------------------------------------------- List near symbols and their associated addresses.
Note:
In this example three uses of LN are shown.
-------------------------------------------------------------------------------##ls %fff3f500 %fff3f4a4 DevWOHandle %fff3f4ac g_CodeLockProc %fff3f4b1 CodeLockProc %fff3f5a4 g_CodeUnlockProc %fff3f5a9 CodeUnlockProc %fff3f614 _FSAbortVDM %fff3f62c FS32IREAD %fff3f638 FS32IWRITE %fff3f644 w_Big32IO %fff3f6c0 w_SetFileLocks %fff3f6c8 w_ProtectSetFileLocks · · · ------------------------------------------------------------------------------- List symbols in the current group encompassing address %fff3f500
See the W command for related information.