In
<caarmm9rvfaxfahsfog3rkhf2dg76g3-a+yweortbeszhcxo...@mail.gmail.com>,
on 02/17/2012
at 02:37 PM, Tony Harminc <[email protected]> said:
>I very much doubt that a TMP can be invoked other than as the single
>job step task in an address space; certainly not if you want to run
>authorized commands or programs under it.
I seriously doubt that a TMP can be invoked as the single job step
task in an address space, and I seriously doubt that an XCTL from an
authorized program would cause problems, although I also doubt that
there is a need to do that.
>XCTL does not provide sufficient isolation from potentially
>dangerous unauthorized code.
What is under discussion is authorized code, which is dangerous with
or without the involvement of the TMP.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN