On 5 Mar 2012 23:38:50 -0800, in bit.listserv.ibm-main you wrote:

>On 3/5/2012 6:06 PM, Shmuel Metz (Seymour J.) wrote:
>> In<[email protected]>, on 03/04/2012
>>     at 04:46 PM, Edward Jaffe<[email protected]>  said:
>>
>>> Look more closely.
>> In the PLM that IBM doesn't publish?
>>
>>
>> Peter? Could you comment on what IGX00011 does?
>
>To understand what it does study the two trace entries below (GTF is your 
>friend):
>
>SVC   CODE.... 109      ASCB.... 00F95200 CPU..... 0000
>                         PSW..... 07850000 8000006D 00000000 0C53B222
>                         TCB..... 00AC8300 R15..... 0000000B R0...... 00000000
>                         R1...... 00000001
>                GMT-03/06/2012 06:59:08.693767  LOC-03/05/2012 22:59:08.693767
>
>SVCR  CODE.... 109      ASCB.... 00F95200 CPU..... 0000
>                         PSW..... 07140000 8000006D 00000000 0C53B222
>                         TCB..... 00AC8300 R15..... 00000000 R0...... 00000000
>                         R1...... 00000001
>                GMT-03/06/2012 06:59:08.693799  LOC-03/05/2012 22:59:08.693799
>
>> You need to look more closely at IGX00011. Hint: the "secure"
>> implementation is not just in the SVC(ESR) routine itself but also
>> in the caller
>> What caller? It might not be the intended caller.
>
>Of course, I meant the intended caller. Unintended callers can't successfully 
>use the service.

How does the system verify that the caller is the intended caller
versus an impostor?

Clark Morris

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to