According to the CICS Resource Definition guide: EXECKEY(USER|CICS)
In a CICS region with STORAGE PROTECTION active, a user key program has read and write access to USER key storage, but read only access to CICS key storage. Storage protection is the 4 bit flag that Linas referred to at the beginning of this thread; if the storage key where the insturction is executed from doesn't match the storage key of the target of the instruction, you get a protection exception raised and, generally, your program terminated. Garry E. Ward Senior Software Specialist Maritz Research Automotive Research Group 419-725-4123 -----Original Message----- From: David Andrews [mailto:dba@;duda.com] Sent: Thursday, November 07, 2002 12:20 PM To: [EMAIL PROTECTED] Subject: Re: CPU Arch Security [was: Re: Probably the first published shell code] On Thu, 2002-11-07 at 12:02, Ward, Garry wrote: > Which, in the S/390 CICS world is handled by the "domain" concept; CICS systems > modules run in one domain and can interface with the OS in ways that > the CICS applications can not becasue of the protection keys that the > s/390 hardware supports. Disclaimer: I can just barely *spell* CICS. I thought that CICS was supporting subspaces these days (and in fact, that subspaces were invented for it). Is CICS using protect keys? -- David Andrews A. Duda and Sons, Inc. [EMAIL PROTECTED] <font size="1">Confidentiality Warning: This e-mail contains information intended only for the use of the individual or entity named above. If the reader of this e-mail is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, any dissemination, publication or copying of this e-mail is strictly prohibited. The sender does not accept any responsibility for any loss, disruption or damage to your data or computer system that may occur while using data contained in, or transmitted with, this e-mail. If you have received this e-mail in error, please immediately notify us by return e-mail. Thank you.