Merging this with the "real programmer" thread, If you really want to figure
this out, and have a lot of time, (and a z/OS system you can run with a
single user), there are always z/VM trace traps.

Wayne Driscoll
Product Developer
NOTE:  All opinions are strictly my own.


  


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Edward Jaffe
Sent: Tuesday, May 13, 2008 1:27 PM
To: [email protected]
Subject: Re: SVC 27

Robert A. Rosenberg wrote:
> The problem with this method is that it will not show the 
> Secret/Undocumented parameters/features like LOCATE's SuperLocate 
> which also uses SVC27. I am not sure if OBTAIN also has secret options.

The best way to learn everything about any SVC is to trace calls to it 
with GTF  -- capturing the parameter lists.

-- 
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to