On Tue, 9 Apr 2019 07:52:08 -0500 Steve Partlow <[email protected]> wrote:

:>I'll correct myself again:
:>SHAREMEMOBJ is cleaned up when the job step task (ASCBXTCB) terminates. I had 
misunderstood a previous test. I've confirmed that if a subtask issues the 
SHAREMEMOBJ and terminates, the address space still has access. We also tested 
that when the job step ends, it is no longer accessible. Is that what you are 
seeing? I don't see any evidence that this has changed since it was first 
introduced.

Yes, that is how I expected it to work.

I am seeing a failure at job end, but looking at LOGREC I see the problem
occurred earlier (a silent SRB abend attempting an access). 

Given that the SAHREMEMOBJ is issued in supervisor state with

          IARV64 REQUEST=SHAREMEMOBJ,                 
                USERTKN=RANGLIST,                     
                RANGLIST=@RANGLIST,                   
                ALETVALUE=2,                          
                COND=YES,                             
                MF=(E,OIARV64,COMPLETE)     

If the application calls the service to DETACH it, the call is recorded.

How can something else DETACH this object without knowing the token?          

Is there a standard way to trap this?  The problem cannot be reproduced at
will. Seems to only occur under TSO.

--
Binyamin Dissen <[email protected]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to