I'm looking for advice on the use of IVSK / ISKE instructions, I have
this program that loads (SVC 08) a couple of programs. The program that
load is running key9 , however SVC08 load them in key8 with fetch
protection... I'm trying to turn off the fetch protect bit with sske but
when I run IVSK and ISKE I get different key. The program thats read the
storage is a CICS program. I pass to ISKE the real address which I
obtain from LRA. It makes me wonder if CICS is turning on / off the
fetch protect bit because I trace with CEDF & I can browse the loaded
program but can't run the user program. Any ideas richard

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to