On 3/5/2012 6:06 PM, Shmuel Metz (Seymour J.) wrote:
In<[email protected]>, on 03/04/2012
    at 04:46 PM, Edward Jaffe<[email protected]>  said:

Look more closely.
In the PLM that IBM doesn't publish?


Peter? Could you comment on what IGX00011 does?

To understand what it does study the two trace entries below (GTF is your 
friend):

SVC   CODE.... 109      ASCB.... 00F95200 CPU..... 0000
                        PSW..... 07850000 8000006D 00000000 0C53B222
                        TCB..... 00AC8300 R15..... 0000000B R0...... 00000000
                        R1...... 00000001
               GMT-03/06/2012 06:59:08.693767  LOC-03/05/2012 22:59:08.693767

SVCR  CODE.... 109      ASCB.... 00F95200 CPU..... 0000
                        PSW..... 07140000 8000006D 00000000 0C53B222
                        TCB..... 00AC8300 R15..... 00000000 R0...... 00000000
                        R1...... 00000001
               GMT-03/06/2012 06:59:08.693799  LOC-03/05/2012 22:59:08.693799

You need to look more closely at IGX00011. Hint: the "secure"
implementation is not just in the SVC(ESR) routine itself but also
in the caller
What caller? It might not be the intended caller.

Of course, I meant the intended caller. Unintended callers can't successfully use the service.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
[email protected]
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to