• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Monitoring for System Request Menu Option 2

    October 27, 2004 Hey, Ted

    As part of our Sarbanes-Oxley compliance requirements, I have to write a CL program that temporarily changes the user’s user profile. (Adopted authority is not appropriate in this case.) One concern I have is that the program may end without executing the code that undoes the temporary change. I can use a global Monitor Message (MONMSG) command to trap unexpected errors and prevent an abnormal termination, but I also need to prevent the user from canceling the program by taking option 2 of the System Request menu. Is there a way to disable that option?

    –Paul

    The options that are executed from the System Request menu are stored in message CPX2313 of message file QCPFMSG. There’s no reason why you can’t modify or override the message so that option 2 executes some command other than End Request (ENDRQS), but I don’t recommend it. Let me suggest another approach.

    If your program is a request-processing program, choosing option 2 from the System Request menu will cause your program to receive escape message CPF1907. By monitoring for this message, you will have complete control over the program and can handle the interruption as you please. Your request-processing program will also handle ENDRQS commands from called programs, unless they, too, are request-processing programs.

    To make a program process requests, include the following commands.

    sndpgmmsg msg('Request msg') topgmq(*ext) msgtype(*rqs)
    rcvmsg    pgmq(*ext) msgtype(*rqs) rmv(*no)
    

    There’s nothing magical about the contents of the MSG parameter in the SNDPGMMSG command. I use something that can’t be mistaken for a real command.

    Put the messages at the top of the program, after the global MONMSG. In this way, you will be setting the program to trap the ENDRQS command from the start.


    Here’s a short program by way of example. I hope it helps.

    pgm
    
    monmsg cpf0000 exec(goto CleanUp)
    
    sndpgmmsg msg('Rqs msg') topgmq(*ext) msgtype(*rqs) 
    rcvmsg pgmq(*ext) msgtype(*rqs) rmv(*no)
    
    call SecPgm1 
    call SecPgm2
    
    CleanUp: 
    /* clean up processing goes here */
    endpgm
    

    To learn more about request-processing procedures and programs, see the CL Programming manual at IBM’s iSeries Information Center.

    –Ted

    Click here to contact Ted Holt by e-mail.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    [Webinar] Trends for 2026: ARCAD Software’s strategic vision

    Between the acceleration of artificial intelligence, constant pressure to modernize existing systems, and ever-increasing security requirements, 2026 is shaping up to be a decisive year for legacy platforms.

    At the start of this new year, this webinar offers strategic insight into the future of these critical environments, which are at the heart of information systems.

    Join Philippe Magne, CEO of ARCAD Software, as he shares his analysis of the major trends and structural issues facing organizations:

    • DevSecOps: What are the current trends in DevOps transformation?
    • Generative artificial intelligence: What are the concrete use cases and measurable benefits for application development and maintenance?
    • Critical application security: How to respond to growing and sophisticated threats?
    • Cloud and hybridization: How do legacy applications fit into current cloud strategies?

    Save your seat for March 24 at 11 AM EDT!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Spool Control Authority Is a Security Risk iSeries High Availability Should Be Integrated and Invisible

    Leave a Reply Cancel reply

Volume 4, Number 36 -- October 27, 2004
THIS ISSUE
SPONSORED BY:

WorksRight Software
Advanced Systems Concepts
Guild Companies

Table of Contents

  • Sending E-Mail from RPG, Take Two
  • Spool Control Authority Is a Security Risk
  • Monitoring for System Request Menu Option 2

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • No Joke: Big Memory And Flash Price Hikes Coming April 1
  • Strategic Topics To Think About For 2026, Part 2
  • Guru: IBM i Job Log Detective Brings Structure To Job Log Analysis In VS Code
  • IBM Launches Hybrid Cloud Backup Product With Cobalt Iron
  • IBM i PTF Guide, Volume 28, Number 10
  • Why You Need To Think About Offsite Data Protection
  • IBM Gets Bob 1.0 Off The Ground
  • You Store The Crown Jewels In A Safe, Not In A Bucket
  • More Power Systems Withdrawals, And Some From Red Hat, Too
  • Price Increases Are Here, Or Pending, And For Sure For Memory

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle