[Cross-posted on ibm-main] [This is in two parts because of restrictions on posting size for the assembler list.]
Now, let me just focus on the 23 semiprivileged instructions: BAKR - Branch and Stack BSA - Branch and Set Authority EPAR - Extract Primary ASN EPAIR - Extract Primary ASN and Instance ESAR - Extract Secondary ASN ESAIR - Extract Secondary ASN and Instance IAC - Insert Address space Control IPK - Insert PSW Key IVSK - Insert Virtual Storage Key MVCDK - Move Characters with Destination Key MVCK - Move Characters with Key (not shown in Figure 5-6 on pp. 5-28/5-29) MVCOS - Move Characters with Optional Specifications MVCP - Move Characters to Primary MVCS - Move Characters to Secondary MVCSK - Move Characters with Source Key PC - Program Control PR - Program Return PT - Program Transfer PTI - Program Transfer with Instance RP - Resume Program SAC - Set Address space Control SACF - Set Address space Control Fast SPKA - Set PSW Key from Address In this discussion, Peter Relson wrote: "If the operating system lets an unauthorized program do something, then why restrict that unauthorized program further unless necessary?" So my next line of inquiry is: which of the above instructions are allowed by z/OS for problem state programs? Where is this information documented? [My follow up research will be: which of these instructions allowed by z/OS are useful for the application programmer? This may then result in a new course. We'll see.] -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-355-2752 http://www.trainersfriend.com * To get a good Return on your Investment, first make an investment! + Training your people is an excellent investment * Try our tool for calculating your Return On Investment for training dollars at http://www.trainersfriend.com/ROI/roi.html
