Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Test privileges for AID

&pagelevel(4)&pagelevel

If data is loaded (dynamically) from a read-protected file and if the read password was not specified, an “execute only” situation exists. Testing with AID is not possible in an “execute-only” situation, regardless of the test privileges set.

Value

Characteristics

1

  • Access to the pages in the user’s own user address space1) and in the system address space2) which are not secret pages3) are readable with the access rights of the normal user

  • Access to the user PCBs of the user’s own task

2

  • Also access to the user TCB of the user’s own task

3

  • Also access to the secret pages in the user’s own user address space which are readable with the access rights of the normal user

4

Not assigned

5

Not assigned

6

  • Also access to the pages in the user’s own user address space which are not secret pages which are readableonly with the access rights of the operating system

  • Also access to the system PCBs of the user’s own task and to the XVT

7

Not assigned

8

  • Also access to all pages in the system address space, all secret pages and all pages
    of other tasks

  • Also access to the user PCBs, system PCBs and TCBs of other tasks

9

Not assigned

Table 51: Read test privileges for AID read accesses

Value

Characteristics

1

  • Access to the pages in the user’s own user address space1) which are not secret pages3) and which can be written with the access rights of the normal user

  • Also access to the user’s local task pages in the user’s own program space which are not secret pages and are “read only”4) with the access rights of the normal user

  • Access to the user PCBs of the user’s own task

2

Not assigned

3

  • Also access to the secret pages in the user’s own user address space which can be written with the access rights of the normal user

  • Also access to the user’s local task secret pages in the user’s own program space which are “read only” with the access rights of the normal user

4

Not assigned

5

Not assigned

6

  • Also access to the pages in the user’s own user address space which are not secret pages and can be written only with the access rights of the operating system

7

Not assigned

8

  • Also access to all pages in the system address space2), all secret pages and all pages of other tasks

  • Also access to the XVT and to the user PCBs, system PCBs and TCBs of all tasks

9

Not assigned

Table 52: Write test privileges for AID write accesses

Key

1) Program space and data spaces of the user
2) System space and data spaces of the system 
3) Pages protected against diagnostic accesses 
4) The page attribute “read only” is ignored by AID in this case.

Note on OWN-UID-DEBUGGING

The “static AID test with low test privilege” can be permitted for other taks which run under the user’s own user ID by means of the OWN-UID-DEBUGGING operand in the MODIFY-TEST-OPTIONS command. If this is the case, the same privileges as for accessing your own user address space are sufficient for the read accesses to this task’s user address space.

A write privilege of at least 2 is required for write accesses to this task’s user address space; in addition, the same test privileges apply as for write accesses to the user address space of the user’s own task. In the case of write accesses to these tasks’ memory pool pages, write privilege 8 is always required.