Merging this with the "real programmer" thread, If you really want to figure this out, and have a lot of time, (and a z/OS system you can run with a single user), there are always z/VM trace traps.
Wayne Driscoll Product Developer NOTE: All opinions are strictly my own. -----Original Message----- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Edward Jaffe Sent: Tuesday, May 13, 2008 1:27 PM To: [email protected] Subject: Re: SVC 27 Robert A. Rosenberg wrote: > The problem with this method is that it will not show the > Secret/Undocumented parameters/features like LOCATE's SuperLocate > which also uses SVC27. I am not sure if OBTAIN also has secret options. The best way to learn everything about any SVC is to trace calls to it with GTF -- capturing the parameter lists. -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 [EMAIL PROTECTED] http://www.phoenixsoftware.com/ ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

