On Tue, 9 Apr 2013 16:17:25 -0500, Kenneth Wilkerson wrote: >You have to >be able to acquire key 0 to even examine the DUCT let alone modify the DUCT >to define the required trap control blocks. This means, of course, that the >application creating the trap environment must be authorized.
Doesn't that mean that it is difficult at best to ensure system integrity when debugging non-authorized code? -- Tom Marchant ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
