In <021001ceee3c$9f1fe880$dd5fb980$@TheThomasResidence.us>, on 11/30/2013 at 08:25 PM, Jim Thomas <j...@thethomasresidence.us> said:
>In a nutshell, I'm trying to find out what the best way is for an >un-authorized called to call / invoke a SRB. It can't. The only ways for unauthorized code to invoke authorized services are PC and SVC. You need an interface service (either PC or SVC) that will accept parameters, validity check everything and schedule the SRB. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN