Sergio, Do you just want to know if certain program contain a "CALL" statement? What will you do once you determine if a CALL exists in those programs?
There are several very fast search utilities on the IBM VM Download page: http://www.vm.ibm.com/download/packages/ Among them are: SRCHLIST LOOKALL MSEARCH PIPESCAN PIPEFUZZ LOOK4 and many more. It really depends on what you'll do once you know which programs contain a CALL statement. One of my favorite search commands is: SCANCMS SCANCMS VMARC can be retrieved from: http://zvm.sru.edu/~DOWNLOAD/ Good hunting! Mike Walter Hewitt Associates The opinions expressed herein are mine alone, not my employer's. "Sergio Lima" <sergiovm...@hotmail.com> Sent by: "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> 07/07/2010 08:50 AM Please respond to "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> To IBMVM@LISTSERV.UARK.EDU cc Subject Sample REXX using XEDIT Hello List, We need, do here a REXX that will READ a lot of COBOL Programs. So, must, locate all "CALL" Statements, and think use XEDIT for this. Someone know, if have a place, or a documentation, for us get a sample program? Thanks Sergio Lima Costa PARA NAVEGAR COM MAIS PRIVACIDADE USE O INTERNET EXPLORER 8. INSTALE GRÁTIS. The information contained in this e-mail and any accompanying documents may contain information that is confidential or otherwise protected from disclosure. If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately alert the sender by reply e-mail and then delete this message, including any attachments. Any dissemination, distribution or other use of the contents of this message by anyone other than the intended recipient is strictly prohibited. All messages sent to and from this e-mail address may be monitored as permitted by applicable law and regulations to ensure compliance with our internal policies and to protect our business. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by e-mail.