In
<caarmm9rvfaxfahsfog3rkhf2dg76g3-a+yweortbeszhcxo...@mail.gmail.com>,
on 02/17/2012
   at 02:37 PM, Tony Harminc <[email protected]> said:

>I very much doubt that a TMP can be invoked other than as the single
>job step task in an address space; certainly not if you want to run
>authorized commands or programs under it.

I seriously doubt that a TMP can be invoked as the single job step
task in an address space, and I seriously doubt that an XCTL from an
authorized program would cause problems, although I also doubt that
there is a need to do that.


>XCTL does not provide sufficient isolation from potentially 
>dangerous unauthorized code.

What is under discussion is authorized code, which is dangerous with
or without the involvement of the TMP.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to