In <021001ceee3c$9f1fe880$dd5fb980$@TheThomasResidence.us>, on
11/30/2013
   at 08:25 PM, Jim Thomas <j...@thethomasresidence.us> said:

>In a nutshell, I'm trying to find out what the best way is for an
>un-authorized called to call  / invoke a SRB.

It can't. The only ways for unauthorized code to invoke authorized
services are PC and SVC. You need an interface service (either PC or
SVC) that will accept parameters, validity check everything and
schedule the SRB.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to