Summary of changes for z/OS Version 2 Release 2 (V2R2)
The following changes are made in z/OS Version 2 Release 2 (V2R2).
New
- A usage note was added to the attach_exec service about UNIX set-user-ID or set-group-ID privileged programs. A restriction was also documented for sticky bit programs that have the set-user-ID or set-group-ID attributes. See Usage notes for attach_exec.
- A usage note was added to the attach_execmvs service about UNIX set-user-ID or set-group-ID privileged programs. See Usage notes for attach_execmvs.
- A usage note was added to the exec service about UNIX set-user-ID or set-group-ID privileged programs. A restriction was also documented for external links and sticky bit programs that have the set-user-ID or set-group-ID attributes. See Usage notes for exec.
- A usage note was added to the execmvs service about UNIX set-user-ID or set-group-ID privileged programs. See Usage notes for execmvs.
- A usage note was added to the fork service about UNIX set-user-ID or set-group-ID privileged programs. See Usage notes for fork.
- Usage notes were added to the _getthent service. See Usage notes for __getthent.
- A usage note was added to the loadHFS service about UNIX set-user-ID or set-group-ID privileged programs. See Usage notes for loadhfs.
- A usage note was added to the loadHFS extended service about UNIX set-user-ID or set-group-ID privileged programs. See Usage notes for loadHFS.
- Usage notes were added to the pthread_exit_and_get service as a result of APAR OA44404. See Usage notes for pthread_exit_and_get.
- A usage note was added to the seteuid service about UNIX set-user-ID or set-group-ID privileged programs. SeeUsage notes for seteuid.
- A usage note was added to the setreuid service about UNIX set-user-ID or set-group-ID privileged programs. SeeUsage notes for setreuid.
- A usage note was added to the setuid service about UNIX set-user-ID or set-group-ID privileged programs. See Usage notes for setuid.
- A usage note was added to the spawn service about UNIX set-user-ID or set-group-ID privileged programs. A restriction was also documented for external links and sticky bit programs that have the set-user-ID or set-group-ID attributes. See Usage notes for spawn.
- Two new constants were added to the BPXYCON macro.
- PC#MODIFYPFS
- PC#THREADUNDUB
Changed
- APAR OA46726 clarified security requirements in Connecting to and disconnecting from z/OS UNIX.
- APAR OA46726 updated the Accepted_socket parameter of the BPXA1ANR callable service to indicate that the SF_REUSE option for send_file is not supported. See accept_and_recv (BPX1ANR, BPX4ANR) — Accept a connection and receive the first block of data.
- APAR OA46726 updated the BPX1SF callable service to indicate that the SF_REUSE option is not supported. See send_file (BPX1SF, BPX4SF) — Send a file on a socket.
- Updates were made to the w_ioctl service as a result of APAR OA44631. See w_ioctl (BPX1IOC, BPX4IOC) — Control I/O.
- Updates were made to the w_pioctl service as a result of APAR OA44631. w_pioctl (BPX1PIO, BPX4PIO) — Path name I/O control.
- The OAPB address is now obtained from the OTCB. See Overview of callable services available to SRB mode routines.
Deleted
- PT_THREAD_INFO_EXTENDED is not a valid ptrace request parameter. All references to it were deleted.