Previous Topic: JES ConsiderationsNext Topic: System Modifications


User SVCs

Your installation can have user‑written SVCs for special functions. Examine the SVC table for authorized SVCs. User‑written SVCs can be an opportunity to defeat security. An SVC can potentially change the privileges of its caller and thus open up a possible security bypass. An audit must verify these user-written SVCs by looking at the nucleus memory for dynamic changes to the operating system after IPL.