On Fri, 24 Jun 2005 11:15:58 -0400, Richard Verville wrote: >If what I need to do could be done by the rules, it would done >already ...So far I've received 8 emails , 2 having very good suggestions >and 6 coming from principal of operation manual police officers. > >My problem is this one. > >I have this routine that is notreentrant and needs to be OS loaded (instead >of CICS loaded) and while using storage protection in CICS is has to be in >key9 because the program updating it, is running key9. Right now the key9 >program loads it and it gets in Key 8, fetch protected storage. So there >other programs reading it gets a fetch protection exception.
Well, Richard, the more obvious question is: Why not run the CICS calling (loading) program in CICSKEY instead of USERKEY? Then you would have both sides of the equation in Key=8. Failing that, your design is apparently off where the trains don't run... not a good idea for most purposes (although the view is different out beyond the trees.) -- Tom Schmidt Madison, WI ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

