On Sun, 22 Oct 2006 10:28:19 -0600, Jeffrey D. Smith <[EMAIL PROTECTED]> wrote:
> 
> It doesn't take much work to LOAD the target program, figure out the
> boundaries and issue PGSER PROTECT (or IARVSERV ACCESS=READONLY). Then
> on the way out, be sure to unprotect the pages before issuing DELETE.
> 
Yah, but I agree with Ed J. that should be the responsibility of the
OS, and not reinvented and redebugged by every programmer.  Do those
operations require authorization?  If so, they're unavailable to the
applications programmer writing unauthorized code.

Just curious, and probably naive, but how does one "figure out the
boundaries" of a module loaded via an ALIAS or ENTRY not coincident
with the beginning of the module?  I understand LOAD returns only
the entry point and length.

In fact, the way Binder can shuffle CSECTS (e.g. as when invoked by
SMP/E) there's little certainty that the primary CSECT will be
first.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to