On Fri, 27 Jan 2006 14:37:11 -0600 "Craddock, Chris" <[EMAIL PROTECTED]>
wrote:

:>> :>There are mechanisms for doing that which do not violate integrity.
:>> Define what you mean by "integrity".

:>Integrity in this case means making sure you are looking at the address
:>space you think you are looking at. Your definition (below) is only a
:>part of the overall requirement.

How can it be other than what I expect?

:>> I see integrity as preventing a problem state routine from doing
:>something
:>> malicious or outside it's box

:>Yes.

:>> and preventing a supervisor state routine from accidentally doing
:>> something unexpected.

:>This is getting close to the real point. You are asking help to write a
:>supervisor state function to do something that is completely outside of
:>the architecture. The instruction you wanted to use will do what you
:>want, but without the protection of being wrapped in the operating
:>system's service environment, there is a grave risk you will find
:>yourself out in the weeds sooner or later. Make that a certainty. 

"The sky is falling. The sky is falling."

:>> I agree that there is a need to provide a means so that a supervisor
:>state
:>> routine does not unknowingly PT somewhere where integrity might be
:>> violated, but I do see the need for the supervisor state routine to
:>say
:>> even though this PT appears to violate integrity - it does not - so
:>let
:>> me do it anyway.

:>The instruction architecture (i.e. PoPs) allows a supervisor program to
:>do a great many things whether they are "safe" or not. The operating
:>system provides a software architecture in which those things can be
:>done safely and reliably. 

:>The software architecture does not allow you to branch into some
:>arbitrary address space, even though the hardware does allow it. There
:>are good reasons for that and you haven't given any justification at all
:>for ignoring them.

The good reasons being ........?????

:>> :>PT/PTI is the WRONG way to get primary addressability to another
:>space.
 
:>> That is an opinion.
:>> I hope you can accept that reasonable people can disagree.

:>You may call it an opinion if you want, but you will find 100% of the
:>IBM core technology design people agree with that opinion. (Right guys?)


:>Reasonable people may very well disagree, but it would be unwise to
:>disagree without understanding the reasons why the architecture is the
:>way it is.

The reason being....??

:>> :>You have only two legal choices. Your can set up space-switch PC
:>> :>services in the target address space and use a PC to get there, or
:>you
:>> :>can schedule an SRB.
 
:>> Yes, I am aware of the legal choices.
 
:>> The first one involves screwing around with the client address space
:>so
:>> that it might have bad effects, and the second is out of line.

:>Here's where we get into really deep water. I described the two approved
:>ways of getting addressability to another address space. The first one
:>(PC services) is really only available to service providers. It would be
:>irrational to go planting PC routines in random address spaces. 

:>If you are intent on "snooping" in any other address space than your
:>own, then the one and only legal choice you have is to schedule an SRB
:>into that space and snoop to your heart's content. There is NOTHING out
:>of line about that. In fact, that is how most of the monitor products
:>operate. 

It certainly is "out of line".

There is no way to pass control to the SRB and have the SRB pass control back.

Synchronization IS required.

:>> I tend to write supervisor state code carefully. It would take real
:>bad
:>> planning to end up with "a supervisor state PSW pointing to the
:>ozone".

:>It isn't a matter of how careful you are. There is nothing you or anyone
:>else could do in a rational amount of code that would prevent these
:>problems from occurring. Stop for just a moment and ask yourself why the
:>cross memory services architecture is designed the way it is. I promise
:>you it isn't just to frustrate would-be snoopers. 

OK.

Explain to me the reason why z/OS does not support a task level AX.

--
Binyamin Dissen <[EMAIL PROTECTED]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to