Lindy 

My own reference list for key assignments :

        0       Supervisor
        1       JES
        2       Reserved* (used to be VSPC)
        3       Reserved*
        4       Reserved*
        5       Data management (eg DFP)
        6       VTAM and TCAM
        7       IMS, DB2 and MQ
        8       Problem state programs
        9       CICS user
        10-15   n/a 

Note that (*) for "reserved" does not mean that you will find no users of 
storage in these keys.

In is very common for system software products (from IBM and ISVs) to run with 
a non-problem state storage protect key and it is better for the integrity of 
the system if they choose a key that is  *not* key0 if at all possible to avoid 
unintentional overlays of supervisor control blocks. I have not seen too much 
key3 usage in the past, but have often come across key2 and key4 being used by 
products.

You should be able to spot the main users of "interesting" keys by entries in 
the SCHEDxx member of PARMLIB.     



Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: [email protected]
Web: www.rocketsoftware.com


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
Lindy Mayfield
Sent: 09 November 2011 12:47
To: [email protected]
Subject: Re: How to enable Storage Protection Override?

I love following these discussions, though I don't use this stuff at all in my 
line of work.  

I have a list of all the subpools (tacked to my wall, of course), but where do 
I find the documentation that explains these keys and what they do?

Kind regards,
Lindy


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
Peter Relson
Sent: Wednesday, November 09, 2011 2:25 PM
To: [email protected]
Subject: Re: How to enable Storage Protection Override?

>UserKey 9 can write into CICSKey 8? that cannot be correct as all DFH 
>modules would be up for overwriting.  Where would integrity be?

FWIW, "system integrity" is not a factor since in the CICS case the key 9 user 
has permission to get into key 8 and do whatever a key 8 user can do.
Reliability is the reason for this function. 

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[email protected] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to