That's it, right now it is running CICSKEY but It'd be best key9 in case a programmer mess up .... Richard
Tom Schmidt wrote: > On Fri, 24 Jun 2005 11:15:58 -0400, Richard Verville wrote: > > >If what I need to do could be done by the rules, it would done > >already ...So far I've received 8 emails , 2 having very good suggestions > >and 6 coming from principal of operation manual police officers. > > > >My problem is this one. > > > >I have this routine that is notreentrant and needs to be OS loaded (instead > >of CICS loaded) and while using storage protection in CICS is has to be in > >key9 because the program updating it, is running key9. Right now the key9 > >program loads it and it gets in Key 8, fetch protected storage. So there > >other programs reading it gets a fetch protection exception. > > Well, Richard, the more obvious question is: Why not run the CICS calling > (loading) program in CICSKEY instead of USERKEY? Then you would have both > sides of the equation in Key=8. > > Failing that, your design is apparently off where the trains don't run... > not a good idea for most purposes (although the view is different out > beyond the trees.) > > -- > Tom Schmidt > Madison, WI > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

