One point about SVCs vs PC's: unless you go fairly far out of your way, a PC routine will not confer additional key/state authorization to its invoker. An SVC routine easily can do that by manipulating control block fields. This conferrence leads directly to many of (or is itself) the system integrity issue(s) related to a "magic SVC".
Ed Jaffe mentioned SVC screening Curious: Does anyone use SVC screening for its documented intended purpose: to define those SVCs that a particular task is allowed to issue (and conversely those that it is not allowed to issue)? Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

