I suspect that using the STEPLIB or JOBLIB mutually exclusively within one step 
was influenced heavily by the cost of "core" way back when the TCB and the 
initiator were being designed, maximum machine memory sizes were MUCH smaller 
than today, CPU cycle time was much longer, etc.  Many other design decisions 
were forced by those constraints, also. 
  
Bill Fairchild 
Franklin, TN  

----- Original Message -----

From: "Rex Pommier" <rpomm...@sfgmembers.com> 
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Monday, December 23, 2013 1:50:52 PM 
Subject: Re: APF authorization and JOBLIB DD card 

Peter, 

I'm asking this follow-up question, not to be confrontational, but because I 
would really like to know... 

You mention below that the way MVS loads APF modules (bypassing an unauthorized 
JOBLIB/STEPLIB module to load the same-named module from an APF library in the 
LNKLST) is needed for system integrity.  Would integrity be compromised somehow 
more by (from my simplistic thinking) if I have a non-APF member in 
JOBLIB/STEPLIB and the system fails the job with a S306 than it would be 
compromised by bypassing the non-APF module and loading and executing the 
same-named module from APF/LNKLST?   



And to answer (from my own perspective) your question repeated here: "Just 
curious: how many people are not aware that the STEPLIB/JOBLIB (and 
TASKLIB) is represented solely by the TCBJLB address?"  I knew it is either/or, 
not both/and, but hadn't had the reason behind the either/or explained to me 
before, so I thank you for that info. 


Rex 

-----Original Message----- 
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Peter Relson 
Sent: Saturday, December 21, 2013 10:28 AM 
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: APF authorization and JOBLIB DD card 

<stuff snipped that isn't relevant to my question> 


With respect to the statement with respect to ignoring unauthorized 
steplib aside from the 306 abend: 
>That behavior, as you discovered, is more confusing than useful. 

That erroneous statement has been debunked before. It might be confusing. 
But it is more than useful. It is necessary for system integrity. 


Peter Relson 
z/OS Core Technology Design 

The information contained in this message is confidential, protected from 
disclosure and may be legally privileged.  If the reader of this message is not 
the intended recipient or an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that any disclosure, 
distribution, copying, or any action taken or action omitted in reliance on it, 
is strictly prohibited and may be unlawful.  If you have received this 
communication in error, please notify us immediately by replying to this 
message and destroy the material in its entirety, whether in electronic or hard 
copy format.  Thank you. 

---------------------------------------------------------------------- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to