On Thu, 29 Mar 2012 11:51:07 -0500, Paul Gilmartin wrote:

>On Thu, 29 Mar 2012 11:00:15 -0500, Tom Marchant wrote:
>
>>On Thu, 29 Mar 2012 15:21:41 GMT, MD Johnson wrote:
>>
>>>Does anyone know what I could look for to detect when
>>>an SVC contains code to place the caller into and
>>>authorized state (key 0).
>>
>>If the SVC (or PC) passes control to an address supplied
>>by the caller, allowing the caller's code to run as part of
>>the SVC, you might be out of luck.
>>
>If the SVC (or PC) passes control with escalated privilege to
>an address supplied by the caller, isn't it ipso facto unsafe?

Yes.  Is it significantly different from returning control with 
escalated privileges?

-- 
Tom Marchant

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

Reply via email to