On Mon, 16 Mar 2015 18:30:19 +0000, Cannaerts, Jan <[email protected]> 
wrote:

>As for my problem;
>
>I have made a small test program that holds a piece of storage paged in 
>memory, it spits out the virtual address to that piece of memory on sysprint 
>so that I can easily retrieve it. Calling the assembler routine to peek inside 
>that address space from REXX on our test LPAR, works flawlessly. I plug in the 
>ASID, the virtual address and the length (main part of my customization 
>efforts), and it spits the contents back out to REXX. I'm very happy with this.
>

I'm very surprised that would work at all, as code within REXX execs does not 
run authorized, and you need to be authorized to do the MODESET and the other 
instructions you've mentioned. How are you invoking that routine from your REXX 
exec? Where does the REXX exec run (TSO session, batch job under IKJEFT01, or ?)

-- 
Walt

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to