[Cross-posted on ibm-main]

[This is in two parts because of restrictions on posting
 size for the assembler list.]


Now, let me just focus on the 23 semiprivileged instructions:

BAKR    - Branch and Stack
BSA     - Branch and Set Authority

EPAR    - Extract Primary ASN
EPAIR   - Extract Primary ASN and Instance
ESAR    - Extract Secondary ASN
ESAIR   - Extract Secondary ASN and Instance

IAC     - Insert Address space Control
IPK     - Insert PSW Key
IVSK    - Insert Virtual Storage Key

MVCDK   - Move Characters with Destination Key
MVCK    - Move Characters with Key (not shown in Figure 5-6 on pp. 5-28/5-29)
MVCOS   - Move Characters with Optional Specifications
MVCP    - Move Characters to Primary
MVCS    - Move Characters to Secondary
MVCSK   - Move Characters with Source Key

PC      - Program Control
PR      - Program Return
PT      - Program Transfer
PTI     - Program Transfer with Instance

RP      - Resume Program

SAC     - Set Address space Control
SACF    - Set Address space Control Fast
SPKA    - Set PSW Key from Address

In this discussion, Peter Relson wrote:

"If the operating system lets an unauthorized program
do something, then why restrict that unauthorized program
further unless necessary?"

So my next line of inquiry is: which of the above
instructions are allowed by z/OS for problem state
programs? Where is this information documented?


[My follow up research will be: which of these
 instructions allowed by z/OS are useful for
 the application programmer? This may then
 result in a new course. We'll see.]


--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-355-2752
http://www.trainersfriend.com

* To get a good Return on your Investment, first make an investment!
  + Training your people is an excellent investment

* Try our tool for calculating your Return On Investment
    for training dollars at
  http://www.trainersfriend.com/ROI/roi.html

Reply via email to