Thanks to Charles M for getting this into a form without the HTML.

<snip>
First of all -- I am assuming PCRTN resides in the Private Area of the
Accessing Address Space (AS1) and PCRTN is defined as a Non- Space
Switching, Stacking PC , with a System LX. Is My understanding correct ? 
</snip>

No it is not. A non-space switch PC (stacking or otherwise) for a system 
LX will always be in common storage in practice. A similar PC for a 
non-system LX will be in common storage except for an aberrant case.

<snip>
Second - if AS2 (The Target Address space) can switch to Supervisor State,
issue ATSET and a Cross Memory Post why can't it simply Establish and 
Setup
Its Own Cross Memory Environment, allowing AS1 or any other Address Space
the capability of issuing a PC calls to it directly ? The procedure
described for AS2 in Figure 38 seems un-necessary to me.
</snip> 
The figure shows how things work. AS2 is the service provider space. 
Within its initialization, it would have switched to supervisor state, 
issued ATSET, established an entry table (and system LX/EX's to access it) 
for "AS1 or any other Address space" to issue the PC's it defined and to 
access the data it owns. And it might have chosen to use EAX to restrict 
access to some of its ALET-accessed data.

<snip>
Third -- Given the technique described for Figure 38 -- wouldn't it be 
more
appropriate for AS1 to define two Non-Space Switching PC routines. One
residing in the Private Area of AS1, and the other in LPA. This would 
allow
AS2 to PC to the second PC routine (in LPA) to issue ATSET and a Cross
Memory POST. Does this make better sense?
</snip>
no. AS2 is the (authorized) service provider address space. AS1 is the 
exploiter/client. The provider sets things up for the exploiter to use. 
The exploiter is not going to set up anything (and in many cases will not 
have the authority to do so). I'm not sure what cross-memory post has to 
do with this.

<snip>
Fourth -- is any one on this discussion list aware of any IBM product, or
OEM Vendor product, or installation written software, that uses the
technique described with Figure 38 ?
</snip>
Every IBM product and ISV exploitation of cross-memory that has access 
list entries defined with CHKEAX=YES and ACCESS=PRIVATE likely uses this 
technique.

Peter Relson
z/OS Core Technology Design


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to