One point about SVCs vs PC's: unless you go fairly far out of your way, a 
PC routine will not confer additional key/state authorization to its 
invoker. An SVC routine easily can do that by manipulating control block 
fields. This conferrence leads directly to many of (or is itself) the 
system integrity issue(s) related to a "magic SVC".

Ed Jaffe mentioned SVC screening

Curious: Does anyone use SVC screening for its documented intended 
purpose: to define those SVCs that a particular task is allowed to issue 
(and conversely those that it is not allowed to issue)? 

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to