On 5 Mar 2012 23:38:50 -0800, in bit.listserv.ibm-main you wrote: >On 3/5/2012 6:06 PM, Shmuel Metz (Seymour J.) wrote: >> In<[email protected]>, on 03/04/2012 >> at 04:46 PM, Edward Jaffe<[email protected]> said: >> >>> Look more closely. >> In the PLM that IBM doesn't publish? >> >> >> Peter? Could you comment on what IGX00011 does? > >To understand what it does study the two trace entries below (GTF is your >friend): > >SVC CODE.... 109 ASCB.... 00F95200 CPU..... 0000 > PSW..... 07850000 8000006D 00000000 0C53B222 > TCB..... 00AC8300 R15..... 0000000B R0...... 00000000 > R1...... 00000001 > GMT-03/06/2012 06:59:08.693767 LOC-03/05/2012 22:59:08.693767 > >SVCR CODE.... 109 ASCB.... 00F95200 CPU..... 0000 > PSW..... 07140000 8000006D 00000000 0C53B222 > TCB..... 00AC8300 R15..... 00000000 R0...... 00000000 > R1...... 00000001 > GMT-03/06/2012 06:59:08.693799 LOC-03/05/2012 22:59:08.693799 > >> You need to look more closely at IGX00011. Hint: the "secure" >> implementation is not just in the SVC(ESR) routine itself but also >> in the caller >> What caller? It might not be the intended caller. > >Of course, I meant the intended caller. Unintended callers can't successfully >use the service.
How does the system verify that the caller is the intended caller versus an impostor? Clark Morris ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN

