On Sat, 2 Nov 2019 18:53:35 +0000, Jon Perryman wrote:
> ...
>How many people ignore that AOPBATCH and COZBATCH execute in the callers 
>address space and think it's always a good thing! When called from a program, 
>you are exposing anything running in the address space to various problems and 
>security exposures. BPXBATCH eliminates this consideration. If IBM fixes this 
>exposure, then AOPBATCH loses the features you treasure.
> 
I see.  But I need enlightment.
Doesn't any program object invoked by // EXEC PGM= execute in the initiator's
address space?  Else ENQs and DDNAMEs created by the initiator would not be
available to the target program.  Does this create the same exposure?  Does the
initiator protect itself by keeping its own storage all in system key or 
protected
by segment protection?  Is AOPBATCH not protected the same way?  Is there the
same exposure for any user-coded program that uses LINK or ATTACH?  How
does the exposure compare with BPX1SPN BPX_SHAREAS=MUST /bin/sh?

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to