IBM SC33-1683-02 Server User Manual


 
User-replaceable programs and the storage protection facility
When you are running CICS with the storage protection facility, there are two points
you need to consider:
v The execution key in which your user-replaceable programs run
v The storage key of data storage obtained for your user-replaceable programs.
Execution key for user-replaceable programs
When you are running with storage protection active, CICS always gives control to
user-replaceable programs in CICS key. Even if you specify EXECKEY(USER) on
the program resource definition, CICS forces CICS key when it invokes the
program. However, if a user-replaceable program itself passes control to another
Link-edit statements for DFHZATDX.
ORDER DFHEAI this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHZATDX this CSECT is in USERTEXT(DFHZATDX)
ORDER DFHEAI0 this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHZATDX)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
NAME DFHZATDX(R)
Link-edit statements for DFHDYP.
ORDER DFHEAI this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHDYP this CSECT is in USERTEXT(DFHDYP)
ORDER DFHEAI0 this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHDYP)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
ENTRY DFHDYP
NAME DFHDYP(R)
Link-edit statements for DFHDBUEX.
ORDER DFHEAI this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHDBUEX this CSECT is in USERTEXT(DFHDBUEX)
ORDER DFHEAI0 this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHDBUEX)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
ENTRY DFHDBUEX
NAME DFHDBUEX(R)
Link-edit statements for DFHXCURM.
ORDER DFHEAI this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHXCURM this CSECT is in USERTEXT(DFHXCURM)
ORDER DFHEAI0 this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHXCURM)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
ENTRY DFHXCURM
NAME DFHXCURM(R)
Figure 13. Link-edit statements for user-replaceable programs (Part 2 of 2)
notes about user-replaceable programs
Chapter 5. General notes about user-replaceable programs 405