On Tue, 9 Apr 2013 16:17:25 -0500, Kenneth Wilkerson wrote:

>You have to
>be able to acquire key 0 to even examine the DUCT let alone modify the DUCT
>to define the required trap control blocks. This means, of course, that the
>application creating the trap environment must be authorized.

Doesn't that mean that it is difficult at best to ensure system integrity when 
debugging non-authorized code?

-- 
Tom Marchant

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to