Joe, Maybe your iPhone scrambled some of your message as I am not 100% sure I understand what you typed - however :
"User Key" when used as a "no-no" in CSA terms is a storage key that allows a problem state program in Key8/9 to alter the storage contents. This is not to be confused with a non-zero key (1-7) that is available for use by non-problem state callers. If you have to front-end ATTACH, then there are much better ways to achieve what you want rather than obtaining Key8 CSA. Rob Scott Developer Rocket Software 275 Grove Street * Newton, MA 02466-2272 * USA Tel: +1.617.614.2305 Email: [email protected] Web: www.rocketsoftware.com -----Original Message----- From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of Joe Reichman Sent: 25 March 2010 16:17 To: [email protected] Subject: Re: Subpools - specifically 241 I recently used a CSA subpool in a user key and I got yelled at From respondents to my problem On the forum The reason I did it was Front ended ATTACH svc 42 And I remember that the JES initiator Does an ATTACH to the problem Program the address of the entry point Name is a The initator subpool which is CSA but has to be KEY 8 Sent from my iPhone On Mar 25, 2010, at 11:45 AM, Tony Lubrano <[email protected]> wrote: > Agreed... You are correct... she could allocate in another key. > > Tony Lubrano > Product Author > NEON Enterprise Software, LLC. > p: 281 207 4922 f: 281 207 4973 > [email protected] > > What is zPrime? Find out at www.zprime.com or just ask us! > > > -----Original Message----- > From: IBM Mainframe Discussion List [mailto:[email protected]] On > Behalf Of Rob Scott > Sent: Thursday, March 25, 2010 10:35 AM > To: [email protected] > Subject: Re: Subpools - specifically 241 > > Tony > > As long as not in fetch-protected storage - what is to stop Key8/9 > program from reading Key2/Key4 common storage ? > > My product actually depends on this as all my "client" code runs > Key8 and all of the "server" anchors are in Key4. > > Rob Scott > Developer > Rocket Software > 275 Grove Street * Newton, MA 02466-2272 * USA > Tel: +1.617.614.2305 > Email: [email protected] > Web: www.rocketsoftware.com > > -----Original Message----- > From: IBM Mainframe Discussion List [mailto:[email protected]] On > Behalf Of Tony Lubrano > Sent: 25 March 2010 15:30 > To: [email protected] > Subject: Re: Subpools - specifically 241 > > Ladies and Gents, > > She needs read access to this storage from unauthorized key 8/9 > programs... the storage must be allocated in key 0. > > Tony Lubrano > Product Author > NEON Enterprise Software, LLC. > p: 281 207 4922 f: 281 207 4973 > [email protected] > > What is zPrime? Find out at www.zprime.com or just ask us! > > > -----Original Message----- > From: IBM Mainframe Discussion List [mailto:[email protected]] On > Behalf Of Rob Scott > Sent: Thursday, March 25, 2010 10:27 AM > To: [email protected] > Subject: Re: Subpools - specifically 241 > > I believe that IBM used to use Key2 for some purpose years ago, but > this is no longer the case. > > Key4 has never been assigned an offical IBM usage. > > There is no "hands off" for Key2 or Key4 as far as I am aware and they > are both frequently used by ISVs to avoid Key0 for the reasons stated > earlier. > > There is nothing to stop in-house code from using these keys either. > > > Rob Scott > Developer > Rocket Software > 275 Grove Street * Newton, MA 02466-2272 * USA > Tel: +1.617.614.2305 > Email: [email protected] > Web: www.rocketsoftware.com > > -----Original Message----- > From: IBM Mainframe Discussion List [mailto:[email protected]] On > Behalf Of Staller, Allan > Sent: 25 March 2010 15:13 > To: [email protected] > Subject: Re: Subpools - specifically 241 > > Key2 and key4 are flagged in the Diag guide as "reserved". I presume > they are flagged as "reserved" for some vendor(IBM or OTHER) reason. > > Can anyone enlighten me? > > <snip> > A frequant usage for this sort of thing is either Key2 or Key4. > > If you store information in the Key2/Key4 block using MVCDK with the > correct key in R1, then you can reduce the likelyhood of storage > overlays even if your pgm is running Sup+Key0. > </snip> > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to [email protected] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to [email protected] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to [email protected] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to [email protected] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to [email protected] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

