On Tue, 12 Apr 2011 11:32:12 -0400, Tony Harminc wrote:
>
>This has been a fundamental ingredient in the preservation of MVS
>System Integrity from the very earliest days, and was a marked
>difference from what came to be called SVS. If every module expecting
>or willing to get control in an authorized state had to check that its
>caller was the right one, or that the calling environment and passed
>arguments were suitable and safe, the IBM and ISV worlds would grind
>to a halt for years of remediation.
>
???

Every such module must so check before performing any operation which
would not be allowed to a nonauthorized program.  The worlds have not
ground to a halt, but only because the checks are made.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to