On Thu, 29 Mar 2012 11:51:07 -0500, Paul Gilmartin wrote: >On Thu, 29 Mar 2012 11:00:15 -0500, Tom Marchant wrote: > >>On Thu, 29 Mar 2012 15:21:41 GMT, MD Johnson wrote: >> >>>Does anyone know what I could look for to detect when >>>an SVC contains code to place the caller into and >>>authorized state (key 0). >> >>If the SVC (or PC) passes control to an address supplied >>by the caller, allowing the caller's code to run as part of >>the SVC, you might be out of luck. >> >If the SVC (or PC) passes control with escalated privilege to >an address supplied by the caller, isn't it ipso facto unsafe?
Yes. Is it significantly different from returning control with escalated privileges? -- Tom Marchant ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN