According to the CICS Resource Definition guide:

EXECKEY(USER|CICS)

In a CICS region with STORAGE PROTECTION active, a user key program has read and write 
access to USER key storage, but read only access to CICS key storage.

Storage protection is the 4 bit flag that Linas referred to at the beginning of this 
thread; if the storage key where the insturction is executed from doesn't match the 
storage key of the target of the instruction, you get a protection exception raised 
and, generally, your program terminated.

Garry E. Ward
Senior Software Specialist
Maritz Research
Automotive Research Group
419-725-4123



-----Original Message-----
From: David Andrews [mailto:dba@;duda.com]
Sent: Thursday, November 07, 2002 12:20 PM
To: [EMAIL PROTECTED]
Subject: Re: CPU Arch Security [was: Re: Probably the first published
shell code]


On Thu, 2002-11-07 at 12:02, Ward, Garry wrote:

> Which, in the S/390 CICS world is handled by the "domain" concept; CICS systems
> modules run in one domain and can interface with the OS in ways that
> the CICS applications can not becasue of the protection keys that the
> s/390 hardware supports.

Disclaimer: I can just barely *spell* CICS.

I thought that CICS was supporting subspaces these days (and in fact,
that subspaces were invented for it).  Is CICS using protect keys?

--
David Andrews
A. Duda and Sons, Inc.
[EMAIL PROTECTED]


<font size="1">Confidentiality Warning:  This e-mail contains information intended 
only for the use of the individual or entity named above.  If the reader of this 
e-mail is not the intended recipient or the employee or agent responsible for 
delivering it to the intended recipient, any dissemination, publication or copying of 
this e-mail is strictly prohibited. The sender does not accept any responsibility for 
any loss, disruption or damage to your data or computer system that may occur while 
using data contained in, or transmitted with, this e-mail.   If you have received this 
e-mail in error, please immediately notify us by return e-mail.  Thank you.

Reply via email to