On Mon, 5 May 2008 09:51:04 -0500, Paul Gilmartin wrote:

>But the hazard is manifest not when an authorized program obtains
>storage in a user key, but when an unauthorized program modifies
>that storage.  Perhaps the solution would be to allocate user key
>CSA only in a subpool that would be segment-protected from
>modification by programs which are not APF authorized.

That's not necessary.  it should be allocated using a non-user key.  There's no 
need to define a new subpool for the purpose.  The program making the 
allocation would still have to be changed.  In any case, it wouldn't help for 
systems that were designed to require that user key programs make some kind 
of update.

-- 
Tom Marchant

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to