What is the cause of the BPXP014I message that I am seeing in the MATSERVR log?

Document ID : KB000005690
Last Modified Date : 14/02/2018
Show Technical Document Details
Issue:

A post-installation customer reported the below error in the MAT server for the GUI.

ERROR: 

$HASP373 MATSERVR STARTED 

IEF403I MATSERVR - STARTED - TIME=14.10.34 

ICH422I THE ENVIRONMENT CANNOT BECOME UNCONTROLLED. 

BPXP014I ENVIRONMENT MUST REMAIN CONTROLLED FOR DAEMON (BPX.DAEMON) PROCESSING. 

CSV042I REQUESTED MODULE TUNGRGIF NOT ACCESSED. THE MODULE IS NOT PROGRAM CONTRO 

CSV028I ABEND306-42 JOBNAME=MATSERVR STEPNAME=MATSERVR 

******************************* Bottom of Data ******************************** 

Below was the suggestion from CA: 

Oh, that...No, I haven`t seen this error in our gui – definitely not when successfully installed. But I think it means one of the modules in MAT_SERVER_DIR/bin/CA doesn’t have the ‘Program Controlled’ extended attribute turned on. Most probably it is module CAVHMT64, which accesses the TUNGRGIF asm module mentioned in the error. I`m not sure how that would happen, but try turning the attribute on by ‘exattr +p <filename>’ command in OMVS (filename must include full path, or you need to cd into the directory first)

<END>

I turned on the external attribute to +p for CAVHMT64 module still getting "ENVIRONMENT CANNOT BECOME UNCONTROLLED" alert, can you please investigate?

Resolution:

According to the description of this error, it means the TUNGRGIF load module is not program controlled. I made a mistake in the recommendation by assuming it was CAVHMT64 (the caller) that needed it, while in fact it is TUNGRGIF (the one being called) that needs to be program controlled. This module is in the main load library of CA MAT, usually found under mat-installation-hlq.CEESPLD.

This is the first time we see this problem at any customer site – I assume it means their security settings are such that the load library isn’t program controlled by default. The instructions on how to set that depends on their security product. For RACF it should be possible using the RALTER PROGRAM command.