On Sun, 22 Oct 2006 10:28:19 -0600, Jeffrey D. Smith <[EMAIL PROTECTED]> wrote: > > It doesn't take much work to LOAD the target program, figure out the > boundaries and issue PGSER PROTECT (or IARVSERV ACCESS=READONLY). Then > on the way out, be sure to unprotect the pages before issuing DELETE. > Yah, but I agree with Ed J. that should be the responsibility of the OS, and not reinvented and redebugged by every programmer. Do those operations require authorization? If so, they're unavailable to the applications programmer writing unauthorized code.
Just curious, and probably naive, but how does one "figure out the boundaries" of a module loaded via an ALIAS or ENTRY not coincident with the beginning of the module? I understand LOAD returns only the entry point and length. In fact, the way Binder can shuffle CSECTS (e.g. as when invoked by SMP/E) there's little certainty that the primary CSECT will be first. -- gil -- StorageTek INFORMATION made POWERFUL ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

