IBM Mainframe Discussion List <[email protected]> wrote on 05/05/2008 08:42:51 AM:
> If you are going to let it default or specify NO, make sure you can test this > well first. Even without testing, if you have a common storage monitor, > or download MXI from the CBT you can find out who / what is using > KEY 8 CSA (the most common violator). Even without a monitor you > can take a console dump of any ASID that includes common storage > and you can use IPCS to find out who is using KEY 8 CSA (MXI is far > easier). Again, search the archives for information on all of this. There is a technique which can be used detect programs obtaining user key CSA without abending them. SLIP SET,IF,A=SVCD,NUCEP=(IGVVSMG2,0),ID=UCSA,ML=1,END This will work on any level of z/OS (all the way back to OS/390 2.6). Also, when the SLIP matches, register 0 contains the requested length. So, you can use additional SLIPs with A=IGNORE to avoid matching on requests you are already familiar with by length: SLIP SET,IF,A=SVCD,NUCEP=(IGVVSMG2,0),ID=UCSA,ML=15,END SLIP SET,IF,A=IGNORE,NUCEP=(IGVVSMG2,0),ID=IG1,DA=(0R,EQ,000004C0),END SLIP SET,IF,A=IGNORE,NUCEP=(IGVVSMG2,0),ID=IG2,DA=(0R,EQ,000001D8),END You could also use the Jobname filter to exclude specified jobs: SLIP SET,IF,A=IGNORE,NUCEP=(IGVVSMG2,0),ID=IG3,J=MYJOB1,END For a logging capability, you could use A=TRACE instead of A=SVCD, and run GTF with TRACE=SLIP END This will create a SLIP record in GTF when user key CSA is obtained. Jim Mulder z/OS System Test IBM Corp. Poughkeepsie, NY ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

