IBM Mainframe Discussion List <[email protected]> wrote on 05/05/2008 
08:42:51 AM:

> If you are going to let it default or specify NO, make sure you can test 
this
> well first.  Even without testing, if you have a common storage monitor,
> or download MXI from the CBT you can find out who / what is using 
> KEY 8 CSA (the most common violator).   Even without a monitor you 
> can take a console dump of any ASID that includes common storage 
> and you can use IPCS to find out who is using KEY 8 CSA (MXI is far
> easier).  Again, search the archives for information on all of this.

 There is a technique which  can be used detect programs obtaining user 
key CSA
 without abending them.

SLIP SET,IF,A=SVCD,NUCEP=(IGVVSMG2,0),ID=UCSA,ML=1,END 
 
  This will work on any level of z/OS (all the way back to OS/390 2.6).   

Also,  when the SLIP matches, register 0 contains the requested length. 
 So, you can use additional SLIPs with A=IGNORE to avoid matching on 
requests you are already familiar with by length: 
 
SLIP SET,IF,A=SVCD,NUCEP=(IGVVSMG2,0),ID=UCSA,ML=15,END 
SLIP SET,IF,A=IGNORE,NUCEP=(IGVVSMG2,0),ID=IG1,DA=(0R,EQ,000004C0),END 
SLIP SET,IF,A=IGNORE,NUCEP=(IGVVSMG2,0),ID=IG2,DA=(0R,EQ,000001D8),END 
 
 
 You could also use the Jobname filter to exclude specified jobs: 
 
SLIP SET,IF,A=IGNORE,NUCEP=(IGVVSMG2,0),ID=IG3,J=MYJOB1,END 


  For a logging capability, you could use A=TRACE instead of A=SVCD,  and 
run GTF with

TRACE=SLIP
END

  This will create a SLIP record in GTF when user key CSA is obtained.

Jim Mulder   z/OS System Test   IBM Corp.  Poughkeepsie,  NY

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to