Paul Gilmartin wrote:
On Sat, 10 Jun 2017 07:27:15 -0400, Peter Relson wrote:

REFRPROT extends this to programs that are not loaded from an
APF authorized library.

Actually, REFRPROT extends this to programs that are bound with the REFR
option regardless of module authorization or library authorization.
And it goes further because it page-protects, which would cause the
program to blow up even if were running key 0 if it attempted to store
into itself.

I remain mystified,  Why was not the REFRPROT behavior the default
(or only) behavior ever since the inception of the REFR attribute?
o Is there a performance penalty for REFRPROT that developers
   wanted to circumvent for problem programs?  Contrariwise, it seems
   that coding a test for the authorized status of the load library was
   needless effort.
o Did the developers assume, very incorrectly IMO, that they were
   extending a courtesy to application programmers by permitting
   programs that modified themselves to be marked REFR?

z/OS was not created out of whole cloth in a single release, nor was the hardware architecture on which it runs. In particular, page protection was not there when REFR was first implemented. A quick search indicates the latter was new in the 3090 announcement.

REFR was implemented quite some time before that.

--
John Eells
IBM Poughkeepsie
ee...@us.ibm.com

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to