Betsy Jeffery said 
> I see, the LE manual I read it in was lying.

[<CLC>] if you saw it in an LE manual, then "yep". LE has always been a
problem state, non-authorized application. LE will never ask for
anything other than low private subpools, i.e. task-owned, fetch
protected storage in the task's storage key (Usually 8). However, it is
possible to run LE applications in an APF authorized environment which
would allow a program running under LE to do whatever it wanted. LE
itself won't though.

CC

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to