There is no subpool that would satisfy both of the following
-- work for unauthorized callers running in their state and key
-- work for authorized callers running in their state and key and not come
out of "low private" (where "low" refers to the user region, not to "below
16M")

So it's at least not simply a matter of subpool choice (since "low
private" is usually a concern for an authorized application).

Yes, of course, an application could at runtime select which subpool to
use.

This thread had made me think about this a few days ago.

I wonder if they happen to use subpool 0 which might, at least, let a key 0
invocation work (as it would be translated to subpool 252; I can't remember
if that also requires supervisor state)

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to