On Fri, 14 Nov 2014 18:31:23 -0500, Farley, Peter x23353 wrote:

>I have often thought it was a mistaken design by IBM that prohibits 
>non-authorized programmers from exploiting multiple address spaces 
>and instruction-level space-switching facilities.

How would you propose that such non-authorized programs access only 
the other address spaces that they were permitted to access? In other 
words, how would you protect the integrity of all address spaces if 
unauthorized code were able to access other address spaces?

-- 
Tom Marchant

Reply via email to