In a message dated 8/19/2008 2:08:39 P.M. Central Daylight Time, [EMAIL PROTECTED] writes: >I played with something similar many years ago. IIRC, I used ESAR, SSAR and MVCP instructions to pull information from other address spaces. I did something similar once. You have to make sure that the target address space is swapped in first. >You start out with addresses that are in common, such as ASCB, then work your way down pointer chains. It is mainly useful for system control blocks. Some of the system control blocks related to an address space are always accessible, but most are swapped out along with the rest of that address space's storage when it is swapped out. Find the DSECT for the control block in SYS1.MACLIB or MODGEN and read all the comments at the beginning of the DSECT. There is usually an explanation in there as to what subpool the control block is in, then go to the Authorized System Services Guide to find the various attributes of that subpool. If you really want to map out all the storage used by address space X, you can also try to find all its data spaces and also all the storage it has acquired above the bar. Sounds like a fun learning project for one's sand box system. Bill Fairchild Rocket Software
**************It's only a deal if it's where you want to go. Find your travel deal here. (http://information.travel.aol.com/deals?ncid=aoltrv00050000000047) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

