In article <00B53282...@SendSpamHere.ORG>, VAXman- @SendSpamHere.ORG writes:
[...]
> The PCB is in system space protected ERKW. You'd need to get to EXEC mode.
>
> Pass EPID to EXE{_STD}$CVT_EPID_TO PCB to get the PCB address. The JIB, Job
> Information Block, address is in PCB$L_JIB. This is the valu you see in the
> LNM$JOB_xxxxxxxx table name.
>
> You'd probably want to write such code as a protected shareable which could
> grant controlled access to EXEC to any process not possessing the privilege.
>
> You can do this using SDA too but it's not really geared to use in a program.
>
> SDA> READ SYSDEF
> SDA> SHOW PROCESS/INDEX=<epid>
> SDA> EXAMIN PCB+PCB$L_JIB
>
Well, you can do this:
EISNER_111> pip (say "read sysdef" ;say "show proc")|anal/sys -
|gawk "/JIB addr/{system(""show logi/tab=LNM$JOB_""$NF);exit}" "-"
(LNM$JOB_82078A00)
"DCL$ATTACH_00009CF3" = "MBA49346:"
"DCL$ATTACH_00009F41" = "MBA49438:"
[...]
EISNER_111> sho sym gawk
GAWK == "$SYS$TOOLS:GAWK.EXE"
EISNER_111> sho sym say
SAY == "WRITE SYS$OUTPUT"
Substitute your own code if you like for the GAWK invocation.
George