In a recent note, Walt Farrell said: > Date: Mon, 6 Nov 2006 12:34:40 -0500 > > On 11/6/2006 11:42 AM, Paul Gilmartin wrote: > > In a recent note, Walt Farrell said: > > > >> Date: Mon, 6 Nov 2006 07:08:24 -0500 > >> > >> On 11/4/2006 10:27 AM, Paul Gilmartin wrote: > >>> In a recent note, Gilbert Saint-Flour said: > >>> > >>>> How do you invoke GIMSMP from an exec ? Via CALL ? LINKPGM? > >>>> > > Is there any reason you suggest LINKPGM rather than LINKMVS? > > Note that GSF suggested LINKPGM, not I. > Noted. I had thought that apparent from my placing my reply adjacent to GSF's prior ply.
> IKJEFTSR provides the interface that allows TSO programs to transition > from non-authorized to authorized, and CALL, TSOEXEC, and ISPF all use > it when they need to invoke APF-authorized programs. > I had thought this was possible only because the TMP itself runs authorized, and any attempt to gain the authorized state from an unauthorized address space was perilous. What SVC does IKJEFTSR employ to enter the the authorized state? Is it merely ATTACH plus RSAUTH? What prevents any problem-state program's doing the same? -- gil -- StorageTek INFORMATION made POWERFUL ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html