I suspect that using the STEPLIB or JOBLIB mutually exclusively within one step was influenced heavily by the cost of "core" way back when the TCB and the initiator were being designed, maximum machine memory sizes were MUCH smaller than today, CPU cycle time was much longer, etc. Many other design decisions were forced by those constraints, also. Bill Fairchild Franklin, TN
----- Original Message ----- From: "Rex Pommier" <rpomm...@sfgmembers.com> To: IBM-MAIN@LISTSERV.UA.EDU Sent: Monday, December 23, 2013 1:50:52 PM Subject: Re: APF authorization and JOBLIB DD card Peter, I'm asking this follow-up question, not to be confrontational, but because I would really like to know... You mention below that the way MVS loads APF modules (bypassing an unauthorized JOBLIB/STEPLIB module to load the same-named module from an APF library in the LNKLST) is needed for system integrity. Would integrity be compromised somehow more by (from my simplistic thinking) if I have a non-APF member in JOBLIB/STEPLIB and the system fails the job with a S306 than it would be compromised by bypassing the non-APF module and loading and executing the same-named module from APF/LNKLST? And to answer (from my own perspective) your question repeated here: "Just curious: how many people are not aware that the STEPLIB/JOBLIB (and TASKLIB) is represented solely by the TCBJLB address?" I knew it is either/or, not both/and, but hadn't had the reason behind the either/or explained to me before, so I thank you for that info. Rex -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Peter Relson Sent: Saturday, December 21, 2013 10:28 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: APF authorization and JOBLIB DD card <stuff snipped that isn't relevant to my question> With respect to the statement with respect to ignoring unauthorized steplib aside from the 306 abend: >That behavior, as you discovered, is more confusing than useful. That erroneous statement has been debunked before. It might be confusing. But it is more than useful. It is necessary for system integrity. Peter Relson z/OS Core Technology Design The information contained in this message is confidential, protected from disclosure and may be legally privileged. If the reader of this message is not the intended recipient or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any disclosure, distribution, copying, or any action taken or action omitted in reliance on it, is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by replying to this message and destroy the material in its entirety, whether in electronic or hard copy format. Thank you. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN