There is no subpool that would satisfy both of the following -- work for unauthorized callers running in their state and key -- work for authorized callers running in their state and key and not come out of "low private" (where "low" refers to the user region, not to "below 16M")
So it's at least not simply a matter of subpool choice (since "low private" is usually a concern for an authorized application). Yes, of course, an application could at runtime select which subpool to use. This thread had made me think about this a few days ago. I wonder if they happen to use subpool 0 which might, at least, let a key 0 invocation work (as it would be translated to subpool 252; I can't remember if that also requires supervisor state) Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html