That's it, right now it is running CICSKEY but It'd be best key9 in case a
programmer mess up .... Richard

Tom Schmidt wrote:

> On Fri, 24 Jun 2005 11:15:58 -0400, Richard Verville wrote:
>
> >If what I need to do could be done by the rules, it would done
> >already ...So far I've received 8 emails , 2 having very good suggestions
> >and 6 coming from principal of operation manual police officers.
> >
> >My problem is this one.
> >
> >I have this routine that is notreentrant and needs to be OS loaded (instead
> >of CICS loaded) and while using storage protection in CICS is has to be in
> >key9 because the program updating it, is running key9. Right now the key9
> >program loads it and it gets in Key 8, fetch protected storage. So there
> >other programs reading it gets a fetch protection exception.
>
> Well, Richard, the more obvious question is: Why not run the CICS calling
> (loading) program in CICSKEY instead of USERKEY?  Then you would have both
> sides of the equation in Key=8.
>
> Failing that, your design is apparently off where the trains don't run...
> not a good idea for most purposes (although the view is different out
> beyond the trees.)
>
> --
> Tom Schmidt
> Madison, WI
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to