I'm looking for advice on the use of IVSK / ISKE instructions, I have this program that loads (SVC 08) a couple of programs. The program that load is running key9 , however SVC08 load them in key8 with fetch protection... I'm trying to turn off the fetch protect bit with sske but when I run IVSK and ISKE I get different key. The program thats read the storage is a CICS program. I pass to ISKE the real address which I obtain from LRA. It makes me wonder if CICS is turning on / off the fetch protect bit because I trace with CEDF & I can browse the loaded program but can't run the user program. Any ideas richard
---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

