Execution key for user-replaceable programs – IBM SC33-1683-02 User Manual
Page 437

User-replaceable programs and the storage protection facility
When you are running CICS with the storage protection facility, there are two points
you need to consider:
v
The execution key in which your user-replaceable programs run
v
The storage key of data storage obtained for your user-replaceable programs.
Execution key for user-replaceable programs
When you are running with storage protection active, CICS always gives control to
user-replaceable programs in CICS key. Even if you specify EXECKEY(USER) on
the program resource definition, CICS forces CICS key when it invokes the
program. However, if a user-replaceable program itself passes control to another
Link-edit statements for DFHZATDX.
ORDER DFHEAI
this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHZATDX
this CSECT is in USERTEXT(DFHZATDX)
ORDER DFHEAI0
this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHZATDX)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
NAME DFHZATDX(R)
Link-edit statements for DFHDYP.
ORDER DFHEAI
this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHDYP
this CSECT is in USERTEXT(DFHDYP)
ORDER DFHEAI0
this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHDYP)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
ENTRY DFHDYP
NAME DFHDYP(R)
Link-edit statements for DFHDBUEX.
ORDER DFHEAI
this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHDBUEX
this CSECT is in USERTEXT(DFHDBUEX)
ORDER DFHEAI0
this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHDBUEX)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
ENTRY DFHDBUEX
NAME DFHDBUEX(R)
Link-edit statements for DFHXCURM.
ORDER DFHEAI
this CSECT is in SDFHLOAD(DFHEAI)
ORDER DFHXCURM
this CSECT is in USERTEXT(DFHXCURM)
ORDER DFHEAI0
this CSECT is in SDFHLOAD(DFHEAI0)
INCLUDE SDFHLOAD(DFHEAI)
INCLUDE USERTEXT(DFHXCURM)
INCLUDE SDFHLOAD(DFHEAI0)
MODE AMODE(31),RMODE(ANY)
ENTRY DFHXCURM
NAME DFHXCURM(R)
Figure 13. Link-edit statements for user-replaceable programs (Part 2 of 2)
notes about user-replaceable programs
Chapter 5. General notes about user-replaceable programs
405