In
<caajsdji6nc2qjhdq2gabj-u7s5jhsqr2jmdegmjlyrapcks...@mail.gmail.com>,
on 03/17/2015
at 09:52 AM, John McKown <[email protected]> said:
>Of course, I don't know of a _good_ method to ensure memory
>protection from a "rogue" program which runs in the same address
>space as a trusted program.
Follow the rules for RSAPF=YES:
Don't use user key storage
Don't share subpool zero
Don't let authorized and unauthorized subtasks run concurrently
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN