On Mon, 16 Mar 2015 18:30:19 +, Cannaerts, Jan jan.cannae...@socmut.be
wrote:
As for my problem;
I have made a small test program that holds a piece of storage paged in
memory, it spits out the virtual address to that piece of memory on sysprint
so that I can easily retrieve it. Calling
All,
See this thread ...Charles this is the one I spoke about...
https://groups.google.com/forum/#!msg/bit.listserv.ibm-main/tR7c3Pi9pFI/tnp_CEFOh-IJ
Regards,
Scott
On Tue, Mar 17, 2015 at 10:52 AM, John McKown john.archie.mck...@gmail.com
wrote:
On Tue, Mar 17, 2015 at 9:43 AM, Binyamin
Well, the temp-dsn pattern will probably only change with z/OS releases, so it
will (only) be another item on that checklist.
Kees.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Lizette Koehler
Sent: Tuesday, March 17, 2015 3:34
Lizette and Elardus ,
The article I skimmed and will read more later. I agree. Sometimes one
learns bad habits or techniques because of exposure and rush to get things
done .
I suffer from this horrible illness and have been trying to correct it
through questions and research.
Regards,
Scott
On
On Tue, 17 Mar 2015 09:14:56 -0500, John McKown john.archie.mck...@gmail.com
wrote:
I just had a thought (and it's lonely). You start off APF authorized,
key 8 as a normal APF program. You want to run program B from the
STEPLIB, but without APF authorization. Perhaps the simplest way is to
use
In 1169475919541461.wa.paulgboulderaim@listserv.ua.edu, on
03/16/2015
at 04:52 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu said:
I don't think so; if I were to relink IEBCOPY with AC(1) into an
authorized library, it would work equally well when called from an
On Tue, 17 Mar 2015 08:40:51 -0500, John McKown john.archie.mck...@gmail.com
wrote:
On Tue, Mar 17, 2015 at 8:18 AM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
In 5c91d5e7-95b6-439d-87a7-111003a2f...@comcast.net, on 03/16/2015
at 10:52 PM, Ed Gould edgould1...@comcast.net
On Tue, 17 Mar 2015 11:19:56 -0400, Tony Harminc t...@harminc.net wrote:
On 17 March 2015 at 10:52, John McKown john.archie.mck...@gmail.com wrote:
Of course, after this snippet the authorized section cannot trust the
contents
of any key8 storage.
Yes, I can see how that can be true. Of
On Tue, Mar 17, 2015 at 10:18 AM, Walt Farrell walt.farr...@gmail.com wrote:
On Tue, 17 Mar 2015 09:14:56 -0500, John McKown
john.archie.mck...@gmail.com wrote:
I just had a thought (and it's lonely). You start off APF authorized,
key 8 as a normal APF program. You want to run program B from
In
d3571c7d425590479eb3adb197bfc47b03932...@m4ukex02.intranet.macro4.com,
on 03/17/2015
at 09:45 AM, Steve Austin steve.aus...@macro4.com said:
any quotes I put around the dsn are ignored
Presumably the command operand of bpxwunix is subject to shell
parsing, for which quotes and apostrophes
On Mon, 16 Mar 2015 15:05:37 -0500, Paul Gilmartin paulgboul...@aim.com wrote:
When I whined about the (how?) in connection with SMP/E a few years ago,
before I knew even what little I now suspect about the nature of the weakness,
Walt replied with words similar to reasonable caution. I take
On 17 March 2015 at 10:52, John McKown john.archie.mck...@gmail.com wrote:
Of course, after this snippet the authorized section cannot trust the
contents
of any key8 storage.
Yes, I can see how that can be true. Of course, I don't know of a
_good_ method to ensure memory protection from a
In 9542953551899120.wa.m42tomibmmainyahoo@listserv.ua.edu, on
03/16/2015
at 02:25 PM, Tom Marchant
000a2a8c2020-dmarc-requ...@listserv.ua.edu said:
Furthermore, if it were not designed to be invoked in an
authorized environment, it should not be
included in an APF authorized load
On Tue, 17 Mar 2015 23:30:33 -0400, Shmuel Metz (Seymour J.) wrote:
SMP/E has a head start: the DDDEF list could be passed to the child process,
And those allocations that are in the JCL?
Are any necessary?
-- gil
--
For
In b08549f0b5dc9644a4b897a29c64751a6640e...@monexch01.na.lzb.hq, on
03/17/2015
at 04:12 PM, Jerry Criste jerry.cri...@la-z-boy.com said:
KBMS, has been unsupported since 2000, and is critical to the
business.
Why didn't you replace it while you had time?
Here's some detail pulled from Fault
In 8873067969180921.wa.m42tomibmmainyahoo@listserv.ua.edu, on
03/17/2015
at 12:09 PM, Tom Marchant
000a2a8c2020-dmarc-requ...@listserv.ua.edu said:
If that is the case, it is loaded into key zero storage that is
not retch protected. If that is the case, you will S0C1 when you
store
In 0281165305245017.wa.paulgboulderaim@listserv.ua.edu, on
03/17/2015
at 12:10 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu said:
SMP/E has a head start: the DDDEF list could be passed to the child
process,
And those allocations that are in the JCL?
--
Shmuel
In
caajsdjhnouonkoeeao9-eccqp5obuypxwnhdo5c+v8vzbgd...@mail.gmail.com,
on 03/17/2015
at 01:01 PM, John McKown john.archie.mck...@gmail.com said:
SVC 3 (EXIT) does not return to R15 in the RSA,
Of course not
but (I think, likely more)
And documented.
Now that I think on it, one could mess
Has anybody figure out a way to actively do run some process to identify the
IDC31378I GDG BASE EXTENSION RECORD COUNT IS ZERO, BUT GDG EXTENSION
condition in catalog? with gdg base name
I see with diagnose we do see this message however there's definately a name
which is needed for the GDG
This will depend on your z/OS Level
I found two APARs that might be of interest
OA44642: IDC31379I DOES NOT LIST THE GDG WITH THE EXTENSION CELL COUNT MISMATCH
DFSMS V21 users affect.
MSGIDC31378I and MSGIDC31379I do not display the GDG BASE name in error, users
could not determine which GDG
You can test it with the test-mode of ISMF option 7.4.
Kees.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Lizette Koehler
Sent: 17 March, 2015 1:02
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMS ACS and TEMP DSN Parsing
I am trying
Thanks to those who suggested checking for pop-ups etc.
None of that worked.
After seeing the post about an open PMR where IBM acknowledged problems with
JAVA 8 I uninstalled it and went back to JAVA7_21.
Now my integrated console and operating system messages are available again.
Alan
The listing indicates the @MEMALOC csect is AMODE 31. The calling program is
listed as AMODE 24. Assuming the LINK in the first program is to @MEMALOC, it
seems the contents of R2 at the time of the abend is part of some sort of save
area passed by the AMODE 24 program, but now interpreted as a
Would checking the DDNAME and/or PROGRAM help?
On 17 March 2015 at 15:10, Vernooij, CP (ITOPT1) - KLM
kees.verno...@klm.com wrote:
Well, the temp-dsn pattern will probably only change with z/OS releases,
so it will (only) be another item on that checklist.
Kees.
-Original Message-
Listers please forgive me for using the list for this purpose but I am
looking to contact Miklos Szigetvari and his email address is now rejected.
Miklos, if you are still monitoring the list would you please email me. Or,
if anyone else knows a new email address for him that you could share,
On Tue, 17 Mar 2015 10:43:14 -0500, John McKown john.archie.mck...@gmail.com
wrote:
All of the above is very true. But as I understand the original
problem, it is how to run untrusted code in the same address space as
APF authorized code. IMO, this, in and of itself, is a possible?
integrity
On Tue, 17 Mar 2015 13:28:29 -0500, John McKown john.archie.mck...@gmail.com
wrote:
On Tue, Mar 17, 2015 at 10:43 AM, John McKown
john.archie.mck...@gmail.com wrote:
Being a paranoid heretic, I would go the UNIX route and figure out a
way to run the untrusted code in a child process in
On Tue, 17 Mar 2015 13:01:42 -0500, John McKown wrote:
SVC 3 (EXIT) does not return to R15 in the RSA, but (I think, likely more) ...
OK. I had it backwards. Dredging my memory, I believe the subtask is
entered with R14 pointing to an SVC 3. And some rogue vendors,
I have heard, modify that
On Tue, 17 Mar 2015 17:58:16 +0100, Thomas Berg thomas.b...@swedbank.se wrote:
May an ignorant peek in here... :)
Just as a concept and theoretically; wouldn't a way to secure that the key 8
storage is untouched is to save a hash of the content in system key area
(with a random salt) ? Then
CA-Masterpiece is a full blown z/OS accounting package.
Dun Bradstreet also had the Millennium software. Not sure if still
available.
SAP also cover off financials.
Mincom (now Ventyx) also have an offering (Ellipse).
On Tue, Mar 17, 2015 at 4:08 PM, Timothy Sipples sipp...@sg.ibm.com wrote:
I'm using bpxwunix with tsocmd to run an XMIT (see below). This works,
but I've been unable to prevent the TSO PREFIX, being added to dataset
name; any quotes I put around the dsn are ignored. Neither have I been
able to set NOPREFIX. Is there a way to prevent the suffix being added?
Thanks
Steve Austin wrote:
I'm using bpxwunix with tsocmd to run an XMIT (see below). This works, but
I've been unable to prevent the TSO PREFIX, being added to dataset name; any
quotes I put around the dsn are ignored. Neither have I been able to set
NOPREFIX. Is there a way to prevent the suffix
For decades, the IBM standard initiator has used a special form of
ATTACH to allow Authorized programs to execute via JCL. The
replacement JCL and Clist language I invented (Jol - see
www.Oscar-Jol.com) and a more recent set of programs I wrote to allow
Long Parms (3,000 characters) and Symbolic
On Tue, Mar 17, 2015 at 12:10 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu wrote:
snip
Sigh. Cf. UNIX, which certainly doesn't let exit() branch to a
user-modifiable address.
A better designed END SVC would branch, not to the R15 in a key 8 RSA, but to
a
caller's
On Tue, 17 Mar 2015 13:01:42 -0500, John McKown john.archie.mck...@gmail.com
wrote:
On Tue, Mar 17, 2015 at 12:10 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu wrote:
snip
Sigh. Cf. UNIX, which certainly doesn't let exit() branch to a
user-modifiable address.
A better
it is loaded into key zero storage that is not retch protected. If that is
the case, you will S0C1 when you store into it.
Which will definitely make it retch.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Tom Marchant
On Tue, 17 Mar 2015 10:14:33 -0700, Charles Mills wrote:
it is loaded into key zero storage that is not retch protected. If that is
the case, you will S0C1 when you store into it.
Oops. I meant to write S0C4
--
Tom Marchant
Which will definitely make it retch.
Charles
-Original
The PSW which is contained in the Fault Analyser Reports shows that
the AMODE at the time of error is 31 (see 99... at the leftmost part of
the instruction address), so the address in R2 is in fact treated as a
31 bit address. But the main task seems to be at RMODE 24 and
was probably AMODE 24.
I opened a PMR and found that IBM is working on a Java 8 issue. They do not
have an ETA for a fix.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
On Behalf Of Ambros, Thomas
Sent: Monday, March 09, 2015 2:56 PM
To: IBM-MAIN@LISTSERV.UA.EDU
On Tue, Mar 17, 2015 at 10:43 AM, John McKown
john.archie.mck...@gmail.com wrote:
Being a paranoid heretic, I would go the UNIX route and figure out a
way to run the untrusted code in a child process in another address
space by using fork() and, likely, attach_execmvs(). And I again
On Tue, 17 Mar 2015 13:01:42 -0500, John McKown john.archie.mck...@gmail.com
wrote:
Now that I think on it, one could mess up the rogue programs
attempts to modify an RSA by deliberately messing up the savearea
chain pointers in the save area pointed to by TCBFSA to defeat forward
save area
On 3/17/2015 12:17 PM, Alan Field wrote:
After seeing the post about an open PMR where IBM acknowledged problems with
JAVA 8 I uninstalled it and went back to JAVA7_21.
Now my integrated console and operating system messages are available again.
I had the same issue just yesterday. I tried
In
caajsdjgyexftzmrwu-geynan_9wbojog1jk35qbebr8mfp3...@mail.gmail.com,
on 03/17/2015
at 09:14 AM, John McKown john.archie.mck...@gmail.com said:
I just had a thought (and it's lonely).
It's not my dog.
Violating system integrity is easy. Safely doing what Charlesv wanted
is much more
In
caajsdjijjgpxfxevytorprbl-qzj7tqphpswo9bw3g_gjje...@mail.gmail.com,
on 03/17/2015
at 08:53 AM, John McKown john.archie.mck...@gmail.com said:
I think the original design was to allow an type 3 or 4 SVC to
invoke some used supplied code, and do so in TCB key / problem
state. And then still
I am looking to find any remaining Mainframe systems in the Department
of Energy?
If you are running one, please let me know who you are.
/Thomas Kern
/On Contract to DOE Headquarters
/301-903-2211
--
For IBM-MAIN subscribe /
On Tue, Mar 17, 2015 at 2:04 PM, Walt Farrell walt.farr...@gmail.com wrote:
But TCBFSA points to one of the more interesting areas for the rogue program
to modify :)
That is why you copy the 72 bytes pointed to by it to another area and
zero those 72 bytes while other perhap rogue is running.
On Tue, 17 Mar 2015 17:58:16 +0100 Thomas Berg thomas.b...@swedbank.se
wrote:
: -Original Message-
: From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of
: Walt Farrell
: Sent: Tuesday, March 17, 2015 4:18 PM
: To: IBM-MAIN@LISTSERV.UA.EDU
: Subject: Re:
At our site we use DATACLAS=special to direct a dataset to a specific
storage group.
On Tue, Mar 17, 2015 at 2:37 PM, Graham Harris harris...@gmail.com wrote:
Would checking the DDNAME and/or PROGRAM help?
On 17 March 2015 at 15:10, Vernooij, CP (ITOPT1) - KLM
kees.verno...@klm.com wrote:
In
CAAJSdjgEqM=ny94cfmkafhue_fbtvv7tueaphy8284_2m5u...@mail.gmail.com,
on 03/17/2015
at 08:40 AM, John McKown john.archie.mck...@gmail.com said:
IMO, it would be easier to just use ATTACHX with the JSCB= pointing
to a copy of the current task's JSCB with the APF bit flipped off.
Why? You
On Tue, Mar 17, 2015 at 7:06 AM, Steve Austin steve.aus...@macro4.com wrote:
Thanks Elardus, but however many quotes I insert they are appear to be
ignored. I've tried the command from OMVS and get the same result (see below).
Steve
Example output from an actual UNIX command line prompt (not
Thanks Elardus, but however many quotes I insert they are appear to be ignored.
I've tried the command from OMVS and get the same result (see below).
Steve
/bin/tsocmd XMIT ZOS113.SA 'DS('SA2.DMXPORT.F5')
£ /bin/tsocmd XMIT ZOS113.SA 'DS('SA2.DMXPORT.F5')'
XMIT
On Tue, 17 Mar 2015 05:39:49 -0500, Elardus Engelbrecht wrote:
Old trap for anyone trying string parsing... I sometimes fall in that trap
too. ;-)
I did, several times, trying to find a solution.
And you can't do a TRACE to see how lines are parsed and resolved... ouch...
trace R helps for
Steve Austin wrote:
Thanks Elardus, but however many quotes I insert they are appear to be
ignored. I've tried the command from OMVS and get the same result (see below).
So I see after that IKJ message. I assume you do it interactively.
Replace /bin/tsocmd XMIT ZOS113.SA
Paul Gilmartin wrote:
And you can't do a TRACE to see how lines are parsed and resolved... ouch...
trace R helps for Rexx, but not entirely'
set -x works for shell.
Thanks. So I found out the hard way...
It's even worse. I got it to work with:
cmd = set -x; /bin/tsocmd XMIT target
/bin/tsocmd XMIT ZOS113.SA DS('SA2.DMXPORT.F5')
Gives;
£ /bin/tsocmd XMIT ZOS113.SA DS('SA2.DMXPORT.F5')
FSUM7332 syntax error: got (, expecting Newline
£
DDNAME is not an option, as ultimately I want this to work using bpwxunix and
the dataset will not be allocated in the address spaces
Don't quote me, but I now have it working as described.
Thanks for your help!
Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Elardus Engelbrecht
Sent: 17 March 2015 12:37
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: using
Steve Austin wrote:
Don't quote me, but I now have it working as described.
Thanks for your help!
You're most welcome, but I believe Paul should get the credits for helping out.
About quotes, it reminds me of this old school joke:
Teacher: 'Hey, Pete, why are all your answers in quotes?'
In 5c91d5e7-95b6-439d-87a7-111003a2f...@comcast.net, on 03/16/2015
at 10:52 PM, Ed Gould edgould1...@comcast.net said:
Legally no but it can be done .
You can, legally, turn APF off and later turn it off. It should be
done the way porcupines make love: very carefully.
--
Shmuel
On Tue, Mar 17, 2015 at 8:18 AM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
In 5c91d5e7-95b6-439d-87a7-111003a2f...@comcast.net, on 03/16/2015
at 10:52 PM, Ed Gould edgould1...@comcast.net said:
Legally no but it can be done .
You can, legally, turn APF off and later turn
Shmuel Metz (Seymour J.) wrote:
Legally no but it can be done .
You can, legally, turn APF off and later turn it off.
Turn it off and then again off? Or is there a typo in what you wrote?
It should be done the way porcupines make love: very carefully.
Or if you're male and in a wrong specie,
Interesting article that covers both midrange and mainframe platforms
http://www.globalknowledge.com/training/generic.asp?pageid=3750
http://www.globalknowledge.com/training/generic.asp?pageid=3750country=Uni
ted+Statesutm_medium=emailutm_source=email
In
ca+qm759umgfno+gbxqsgyni1r5uej7dkcdkdzdbnkai...@mail.gmail.com,
on 03/16/2015
at 07:10 PM, Scott Ford idfzos...@gmail.com said:
I did a quick google on JSCBAUTH and long thread in 2010...very
interesting several people mentioned to SYNC and LINK to perform
authorized calls unless I
In
CA+qM75_YCpXgMjXrqx=hcbif-qhjktvhz7eunmkcej56pxj...@mail.gmail.com,
on 03/16/2015
at 06:20 PM, Scott Ford idfzos...@gmail.com said:
can you turn off APF authorization and turn back on ?
Easily? Yes. Safely? Only with great care.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
On Mon, Mar 16, 2015 at 8:15 PM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
In
ca+qm759umgfno+gbxqsgyni1r5uej7dkcdkdzdbnkai...@mail.gmail.com,
on 03/16/2015
at 07:10 PM, Scott Ford idfzos...@gmail.com said:
I did a quick google on JSCBAUTH and long thread in
In 2128103613061808.wa.paulgboulderaim@listserv.ua.edu, on
03/17/2015
at 07:19 AM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu said:
cmd = set -x; /bin/tsocmd XMIT target DS('dsn')
I see it now; your original code had the apostrophes around DS(foo)
instead of just
I don't think there's anything wrong with the logic, but you know that most
attributes of a DATACLAS can be overridden.
Greg Shirey
Ben E. Keith Company
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Lizette Koehler
Sent: Monday,
Lizette Koehler wrote:
However, I have always been reluctant to set any TEMP DSN different than other
TEMP DSNs.
I will also be reluctant.
The other issue is the consistency for the temp DSN pattern. If anything
changes, this code will no longer work. (Sigh)
Can you force them to be not
On Mon, Mar 16, 2015 at 5:31 PM, Charles Mills charl...@mcn.org wrote:
I don't really know but my logic goes like this:
You can only turn JCSBAUTH back on if you are key 0, otherwise you will S0C4.
So you could set key 0, and then turn JSCBAUTH off, do stuff, and then turn
it back on again
Of course, after this snippet the authorized section cannot trust the contents
of any key8 storage.
On Tue, 17 Mar 2015 09:14:56 -0500 John McKown john.archie.mck...@gmail.com
wrote:
:On Mon, Mar 16, 2015 at 5:31 PM, Charles Mills charl...@mcn.org wrote:
: I don't really know but my logic goes
On Tue, 17 Mar 2015 09:27:53 -0400, Shmuel Metz (Seymour J.) wrote:
on 03/17/2015 at 07:19 AM, Paul Gilmartin said:
cmd = set -x; /bin/tsocmd XMIT target DS('dsn')
I see it now; your original code had the apostrophes around DS(foo)
instead of just around the dsn.
And the parentheses
Yes, that I understand. However, I have always been reluctant to set any
TEMP DSN different than other TEMP DSNs. But this is a unique case and I am
hoping this will resolve the issue.
The other issue is the consistency for the temp DSN pattern. If anything
changes, this code will no longer
Lizette Koehler wrote:
Interesting article that covers both midrange and mainframe platforms
Indeed. Some of my old skills should be staying in prehistoric times like
programming in Clarion and Clipper. You've gotta move on, just what that
article suggests. I had to drop them because of
Thanks.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of John McKown
Sent: Tuesday, March 17, 2015 7:15 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was:
APF-authorized
Overriding DC space can be prevented by the 'override space' attribute (yes/no).
Kees.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Greg Shirey
Sent: Tuesday, March 17, 2015 3:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SMS
On Tue, Mar 17, 2015 at 9:43 AM, Binyamin Dissen
bdis...@dissensoftware.com wrote:
Of course, after this snippet the authorized section cannot trust the contents
of any key8 storage.
Yes, I can see how that can be true. Of course, I don't know of a
_good_ method to ensure memory protection
Hello,
We are experiencing an S0C4 abend after upgrading to z/OS 1.13. The
application is known as KBMS, has been unsupported since 2000, and is critical
to the business. We are working on a replacement, but full implementation is
still several months away.
We have experienced problems with
The problem is R2: R2: 4F1D6048 (Storage invalid)
If you have a dump that you can actually look at, see if there is
something reasonable at 001D6048. Otherwise, you'll need to try to
backtrack where this value came from. If the data at address 001D6048
looks reasonable, then you need to figure
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of
Walt Farrell
Sent: Tuesday, March 17, 2015 4:18 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was:
APF-authorized
...))
On Tue, 17 Mar 2015 16:12:53 +, Jerry Criste wrote:
Hello,
We are experiencing an S0C4 abend after upgrading to z/OS 1.13.
I can't read your Fault Analyzer report because of the formatting.
You didn't say what release of z/OS you were coming from, but one
possibility is that your code is
On Tue, 17 Mar 2015 10:07:37 -0500, Walt Farrell walt.farr...@gmail.com wrote:
It is not specifically that the programs may misbehave, but that the users may
misbehave. If you trust the users not to misbehave, then you can safely let
them run the program. If you don't trust them, then you
80 matches
Mail list logo