On 3/28/2011 9:17 AM, Shmuel Metz (Seymour J.) wrote:
In<[email protected]>, on 03/28/2011
    at 04:42 PM, Binyamin Dissen<[email protected]>  said:

The security issue is allowing application programmers to write SRB
code (which implies the ability to update APF datasets).
I was under the impression that the applications being discussed were
already AC(1). Modifying an AC(1) application to schedule an SRB
introduces an additional level of risk.

The biggest obstacle for privileged programs is that SRB mode is more restrictive than task mode. Not all services are allowed in SRB mode; many functions require a TCB. Error recovery for an SRB is nowhere near as flexible as for TCB. Also, debugging is not as easy for SRB as for TCB. There is not even a control block equivalent of the TCB where the operating system keeps information about an SRB while it's running!

In light of these restrictions, I suppose one could argue that more difficult programming means less stable programs. Otherwise, there is little difference in 'security' or 'integrity' between the two modes.

Granted, an SRB is an additional unit of work. But, those familiar with programming multiple TCBs should already be familiar with the necessary concepts.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
[email protected]
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to