Setting up the trap environment requires authorization and can easily be done 
by a non-space switch PC setup by an authorized server. The execution of a 
TRAPx instruction is not authorized and executes under the state of the program 
being trapped.  So, NO, there are no system integrity issues when debugging 
unauthorized programs.

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf 
Of Tom Marchant
Sent: Wednesday, April 10, 2013 5:33 AM
To: [email protected]
Subject: Re: Use of the TRAPx Instructions

On Tue, 9 Apr 2013 16:17:25 -0500, Kenneth Wilkerson wrote:

>You have to
>be able to acquire key 0 to even examine the DUCT let alone modify the 
>DUCT to define the required trap control blocks. This means, of course, 
>that the application creating the trap environment must be authorized.

Doesn't that mean that it is difficult at best to ensure system integrity when 
debugging non-authorized code?

--
Tom Marchant

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to