Setting up the trap environment requires authorization and can easily be done by a non-space switch PC setup by an authorized server. The execution of a TRAPx instruction is not authorized and executes under the state of the program being trapped. So, NO, there are no system integrity issues when debugging unauthorized programs.
-----Original Message----- From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of Tom Marchant Sent: Wednesday, April 10, 2013 5:33 AM To: [email protected] Subject: Re: Use of the TRAPx Instructions On Tue, 9 Apr 2013 16:17:25 -0500, Kenneth Wilkerson wrote: >You have to >be able to acquire key 0 to even examine the DUCT let alone modify the >DUCT to define the required trap control blocks. This means, of course, >that the application creating the trap environment must be authorized. Doesn't that mean that it is difficult at best to ensure system integrity when debugging non-authorized code? -- Tom Marchant ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
