In
<caajsdji6nc2qjhdq2gabj-u7s5jhsqr2jmdegmjlyrapcks...@mail.gmail.com>,
on 03/17/2015
   at 09:52 AM, John McKown <[email protected]> said:

>Of course, I don't know of a _good_ method to ensure memory 
>protection from a "rogue" program which runs in the same address 
>space as a trusted program.

Follow the rules for RSAPF=YES:

  Don't use user key storage
  Don't share subpool zero
  Don't let authorized and unauthorized subtasks run concurrently
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to