Acquire the storage first, *then* define the name/token pair.

There is no way to prevent a privileged task from overwriting your storage. 
You're not using key 8-F, are you?


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3

________________________________________
From: IBM Mainframe Discussion List <[email protected]> on behalf of 
scott Ford <[email protected]>
Sent: Sunday, March 3, 2019 2:16 PM
To: [email protected]
Subject: Storage Question

All:

I have a storage related question. I need a running program (STC) to
allocate a piece of storage that has persistence. By this I mean when the
STC shutdowns the storage is still there and available.  The storage is an
area we want to use to store Global options for some of our code running. I
understand I can use the ECVT but we are trying to have the STC start and
based on control parameters store global variables for use in other
programs later, in this case an exit. I want to make sure the Global
storage is protected and can not be overriden. I know there is no
guarantees but I want to be 95% sure.

 Does this mean I place a IEANTCR token pointing to a piece of storage in
SP 229,230, 249 and then do an 'Storage Obtain' for the required storage
and populate it. This where I am a tad confused, its not the concerns its
the technique i need to understand. Can someone be so kind as to help me
out with a bit of an explanation or is there a better way ? I had thought
of a Dataspace but persistence is an issue and the STC is written in
Cobol...So i can use hiperspaces unless I write a routine to go from 31bit
to 64bit and additionally I am not sure if I can use 64bit storage in an
exit.

--



*IDMWORKS *

Scott Ford

z/OS Dev.




“By elevating a friend or Collegue you elevate yourself, by demeaning a
friend or collegue you demean yourself”



http://secure-web.cisco.com/14WWNj6emcJCf9H7trTnNuFhbkPw9ni9ZHKEGfr76RnqAbmvMEcDAKXcrGmZ6XmOHNz6bbz_Y0DGZQCtl6uga0q-EQzkIR6aj20glxE5nAZ1kuRDRCB2ifYCqeUhFl1tT9aVPWOK_rN_PmVbQRvKoAMrVh0VgqQfV7TK6N6Vg87M_ShUm_BONzH0ZSRhIKTaCtE_VHfkzkIglFAG8dEFMgGWdoQjajuKvJ2b6i2kl4P1Ujs0Ag7QrHdoLxYJMV6lBhCWmXRieAKXYfRNi43BrQOvOshadg60B4D8kKoNigcy7iSV6_tiAHNoeYOsytPF060_jMn6sztDWG3q5wISOvrDF_aZdvBVTkueHElIqs_XJm0QJrhTWVJ7SJ0gFrvCR/http%3A%2F%2Fwww.idmworks.com

[email protected]

Blog: 
http://secure-web.cisco.com/1054i5ZMbBs9PJUFl-0FBXKJQKFlYdKbfBcJUCre5YICKGMQ6fwHqNFIaAa5L-7QzRnlaMbgLRqNcZvyu3euV8PG014hLk8-VG7YPnEsCKuMVe4DkNOJCR7axLkyoxIS1o7oyWQkwln--1DJZs33WKc-QcGRiKJ1ZKcD5Jbdm1kBiorKkh5MtTTBdteLXP_-k9bP3Qt8GQaJ6jzE5xu_pi-BuSg5BvkEaaQLj2UauDdXTnePIycKcQVGtBGtt-BJ7eQooGSSRhgEmJ9jQ2fD4Yf0mbCjr-lYwYVhaO9YWlwuJ4bzVUDAEJNCXzW7RuKLD1JQ0OHXhdSQsHvNASRgdcmOhytQflvz26gkVSO6zWCBedxfnzVur_fNdvzX7bnA8/http%3A%2F%2Fwww.idmworks.com%2Fblog





*The information contained in this email message and any attachment may be
privileged, confidential, proprietary or otherwise protected from
disclosure. If the reader of this message is not the intended recipient,
you are hereby notified that any dissemination, distribution, copying or
use of this message and any attachment is strictly prohibited. If you have
received this message in error, please notify us immediately by replying to
the message and permanently delete it from your computer and destroy any
printout thereof.*

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to