In a message dated 8/19/2008 2:08:39 P.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:
>I played with something similar many years ago.  IIRC, I used  ESAR,  SSAR 
and MVCP instructions to pull information from other  address spaces.
 
I did something similar once.  You have to make sure that the target  address 
space is swapped in first.
 
>You start out with addresses that are in common, such as ASCB, then  work 
your 
way down pointer chains.  It is mainly useful for system  control blocks.
 
Some of the system control blocks related to an address space are always  
accessible, but most are swapped out along with the rest of that address 
space's  
storage when it is swapped out.  Find the DSECT for the control block  in 
SYS1.MACLIB or MODGEN and read all the comments at the beginning of the  DSECT. 
 
There is usually an explanation in there as to what subpool the  control block 
is in, then go to the Authorized System Services Guide to find the  various 
attributes of that subpool.
 
If you really want to map out all the storage used by address space X, you  
can also try to find all its data spaces and also all the storage it has  
acquired above the bar.  Sounds like a fun learning project for one's  sand box 
system.
 
Bill  Fairchild
Rocket Software





**************It's only a deal if it's where you want to go. Find your travel 
deal here.      
(http://information.travel.aol.com/deals?ncid=aoltrv00050000000047)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to