Betsy Jeffery said > I see, the LE manual I read it in was lying. [<CLC>] if you saw it in an LE manual, then "yep". LE has always been a problem state, non-authorized application. LE will never ask for anything other than low private subpools, i.e. task-owned, fetch protected storage in the task's storage key (Usually 8). However, it is possible to run LE applications in an APF authorized environment which would allow a program running under LE to do whatever it wanted. LE itself won't though.
CC ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

