On Fri, 24 Jun 2005 11:15:58 -0400, Richard Verville wrote:

>If what I need to do could be done by the rules, it would done
>already ...So far I've received 8 emails , 2 having very good suggestions
>and 6 coming from principal of operation manual police officers.
>
>My problem is this one.
>
>I have this routine that is notreentrant and needs to be OS loaded (instead
>of CICS loaded) and while using storage protection in CICS is has to be in
>key9 because the program updating it, is running key9. Right now the key9
>program loads it and it gets in Key 8, fetch protected storage. So there
>other programs reading it gets a fetch protection exception.

Well, Richard, the more obvious question is: Why not run the CICS calling
(loading) program in CICSKEY instead of USERKEY?  Then you would have both
sides of the equation in Key=8.

Failing that, your design is apparently off where the trains don't run...
not a good idea for most purposes (although the view is different out
beyond the trees.)

--
Tom Schmidt
Madison, WI

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to