Re: Assembler program calling a 'C' program with mixed case long names
Hello Dave, I was hoping the pre-linker would resolve the long names I specified on the call to the 8 byte upper case names to which it renames the target routines, but it does not. To get around this I am using CHANGE statements in the linkedit step. I'm doing this in order to link the program into a PDS rather than a PDSE. Is there something I'm missing? The pre-linker I'm using is EDCPRLNK. Thanks Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thomas David Rivers Sent: 24 December 2009 15:37 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names Steve Austin wrote: Thanks for all your responses. I am now fighting with the pre-linker; it does not pick up the long mixed case names I specified using alias statements. Steve Steve, When you say pick up - what do you mean? And, which pre-linker is this? - Dave Rivers - -- riv...@dignus.comWork: (919) 676-0847 Get your mainframe programming tools at http://www.dignus.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Assembler program calling a 'C' program with mixed case long names
Thanks I should have explained that I'm using the pre-linker so that I can link to a PDS. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Crayford Sent: 25 December 2009 00:48 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names You can't use the pre-linker with GOFF. If I were you I would ditch the pre-linker. It's functionally stabalized and the binder does everything you need and more. Only use the pre-linker if you want to use load modules in a PDS. Steve Austin wrote: Thanks for all your responses. I am now fighting with the pre-linker; it does not pick up the long mixed case names I specified using alias statements. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen Sent: 23 December 2009 18:45 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names On Wed, 23 Dec 2009 15:55:12 - Steve Austin steve.aus...@macro4.com wrote: :Is it possible to persuade the assembler to create mixed case ESD names? :The GOFF option allows long names, but the ESD entries are upper case. Look at the assembler ALIAS statement. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Assembler program calling a 'C' program with mixed case long names
Steve Austin wrote: Thanks I should have explained that I'm using the pre-linker so that I can link to a PDS. Out of curiosity why are you tied to a PDS? You will get much better mileage from a PDSE. GOFF, XPLINK, programs 16MB and future features that will only be supported by PDSE program objects. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Crayford Sent: 25 December 2009 00:48 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names You can't use the pre-linker with GOFF. If I were you I would ditch the pre-linker. It's functionally stabalized and the binder does everything you need and more. Only use the pre-linker if you want to use load modules in a PDS. Steve Austin wrote: Thanks for all your responses. I am now fighting with the pre-linker; it does not pick up the long mixed case names I specified using alias statements. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen Sent: 23 December 2009 18:45 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names On Wed, 23 Dec 2009 15:55:12 - Steve Austin steve.aus...@macro4.com wrote: :Is it possible to persuade the assembler to create mixed case ESD names? :The GOFF option allows long names, but the ESD entries are upper case. Look at the assembler ALIAS statement. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Assembler program calling a 'C' program with mixed case long names
The code I am writing is a prototype, but it is intended that something like it will be shipped to customers in time. I don't know that PDSE usage will be an issue to anyone, but experiece suggests that someone will at least question the requirement, so for the time being I'm avoiding using a PDSE. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Crayford Sent: 04 January 2010 11:52 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names Steve Austin wrote: Thanks I should have explained that I'm using the pre-linker so that I can link to a PDS. Out of curiosity why are you tied to a PDS? You will get much better mileage from a PDSE. GOFF, XPLINK, programs 16MB and future features that will only be supported by PDSE program objects. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Crayford Sent: 25 December 2009 00:48 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names You can't use the pre-linker with GOFF. If I were you I would ditch the pre-linker. It's functionally stabalized and the binder does everything you need and more. Only use the pre-linker if you want to use load modules in a PDS. Steve Austin wrote: Thanks for all your responses. I am now fighting with the pre-linker; it does not pick up the long mixed case names I specified using alias statements. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen Sent: 23 December 2009 18:45 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names On Wed, 23 Dec 2009 15:55:12 - Steve Austin steve.aus...@macro4.com wrote: :Is it possible to persuade the assembler to create mixed case ESD names? :The GOFF option allows long names, but the ESD entries are upper case. Look at the assembler ALIAS statement. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN
Re: ADCD CD
On Thu, 31 Dec 2009 13:31:44 -0600, David Logan loga3...@comcast.net wrote: Since it is a development box, there hasn't been a lot of time given to it. IMHO, development is just as well a customer of systems as any other user... So why not give them the attention they deserve? Jantje. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ADCD CD
It's a bit like being a beer company. We just don't have the budget for mainframes. It's considered secondarily at best. One of the things on my list is to create a quality backup system. I have to minimize DASD usage so that I can find a backup solution that doesn't cost a fortune. That was (and still is) a 1st quarter goal. David Logan -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Jan MOEYERSONS Sent: Monday, January 04, 2010 5:33 AM To: IBM-MAIN@bama.ua.edu Subject: Re: ADCD CD On Thu, 31 Dec 2009 13:31:44 -0600, David Logan loga3...@comcast.net wrote: Since it is a development box, there hasn't been a lot of time given to it. IMHO, development is just as well a customer of systems as any other user... So why not give them the attention they deserve? Jantje. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
I'm still intrigued that the (undocumented) option's name contains the substring 32G. Use2GTo32G: Satisfy this request for n 1M segments using storage in the range 2G to 32G. At some release 64-bit LE moved the CAA and other control blocks from starting at 4G to 32G. I suspect this isn't true. LE has no control whatsoever over the origin (address returned by IARV64) which determines the address at which its above-2G blocks are placed. But RSM's giving the range 2G to 32G to Java likely meant that when LE requested storage from IARV64, it no longer was given an address as low as 4G. Peter Relson z/OS Core Technology Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
One thing that, IMO, is keeping JCL in business is shear inertia. Too many times I've had people, especially programmers, resist doing any unnecessary clean up of JCL. IMO, all COND processing should be done with the new IF/ELSE/ENDIF construct. But I can't even get them to write new JCL using this, much less convert old JCL (It works and it's too much trouble to change, test, and run through change control.) They keep cutting and pasting old JCL into new JCL. The same with the newer constructs in COBOL. They like to cut and paste (supposedly) working code. Relative to this is the internal control blocks created via JCL need to stay the same, or very similar. Why? We couldn't use the new if CA-11 doesn't support it. That is why we don't use UNIX and REXX stuff. CA-11 doesn't support restarting complex shell scripts or REXX programs. I guess doing that would require something akin to checkpoint restart for compiled programs. And who uses that??? -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Clark Morris Sent: Sunday, January 03, 2010 9:28 AM To: IBM-MAIN@bama.ua.edu Subject: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc On 3 Jan 2010 06:49:27 -0800, in bit.listserv.ibm-main you wrote: snip JCL was designed for OS360 on a 256K real machine (the original design point for PCP was 64K). In addition, I suspect that the design was done by engineers or mathematicians for whom not and and not or were familiar concepts. Virtually all of the printers were upper case only and at least in my shop it was a struggle to get a printer that printed the special characters correctly (the 48 character train was adequate FSVO adequate). Lower case was out of the question. Memory and instruction cycles were at a premium. Even on a 1 megabyte mod 65 we were stingy about region sizes. While I share your (Paul's) distaste for JCL, the crime is that IBM hasn't provided a clear migration path for at least new things to either REXX or one of the shells. It also hasn't provided a migration path so that we could have longer member names, longer data set names and a generation data set facility for ESDS data sets. We are stuck on software architecture that was designed for the limitations of the original 360's using work arounds and kludges. It is for this reason that I am not optimistic about the long term viability of the z series and z/OS. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Edward Jaffe Sent: Friday, January 01, 2010 10:42 AM To: IBM-MAIN@bama.ua.edu Subject: Re: dead zone Steve Samson ssam...@dc.rr.com writes: The bar is a thick one, from 2g to 4g, sacrificed to avoid a somewhat unlikely compatibility exposure. Undisciplined use of the high-order bit in 31-bit addresses could have led to unexpected results. The thick bar avoids such a problem. Considering the vast magnitude of 64-bit virtual addresses, why should anyone care or do anything to circumvent the omitted address range? The z/OS RSM developers introduced functionality to allow Java to acquire storage within the previously thick bar for performance reasons. -- Edward E Jaffe Hum, that is very curious to me. But I guess it expands the available/addressable storage without switching from AMODE(31) to AMODE(64) and back. Java is a storage pig. And too much stuff in z/OS still requires AMODE(31) storage (like DCBs et al.) -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
On Mon, 4 Jan 2010 07:26:15 -0600 McKown, John john.mck...@healthmarkets.com wrote: : -Original Message- : From: IBM Mainframe Discussion List : [mailto:ibm-m...@bama.ua.edu] On Behalf Of Edward Jaffe : Sent: Friday, January 01, 2010 10:42 AM : To: IBM-MAIN@bama.ua.edu : Subject: Re: dead zone : Steve Samson ssam...@dc.rr.com writes: : The bar is a thick one, from 2g to 4g, sacrificed to avoid a : somewhat unlikely compatibility exposure. Undisciplined use of the : high-order bit in 31-bit addresses could have led to unexpected : results. The thick bar avoids such a problem. Considering the vast : magnitude of 64-bit virtual addresses, why should anyone care or do : anything to circumvent the omitted address range? : The z/OS RSM developers introduced functionality to allow Java to : acquire storage within the previously thick bar for : performance reasons. :Hum, that is very curious to me. But I guess it expands the available/addressable storage without switching from AMODE(31) to AMODE(64) and back. Java is a storage pig. And too much stuff in z/OS still requires AMODE(31) storage (like DCBs et al.) The storage between 2g and 4g is NOT accessible in 31 bit mode. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen Sent: Monday, January 04, 2010 7:50 AM To: IBM-MAIN@bama.ua.edu Subject: Re: dead zone snip :Hum, that is very curious to me. But I guess it expands the available/addressable storage without switching from AMODE(31) to AMODE(64) and back. Java is a storage pig. And too much stuff in z/OS still requires AMODE(31) storage (like DCBs et al.) The storage between 2g and 4g is NOT accessible in 31 bit mode. -- Binyamin Dissen bdis...@dissensoftware.com You're right! So, why bother and how does it improve performance? I guess we'll never know. It is likely proprietary. Another reason that z/OS is dying. IBM wants it to be as closed as software on the i. Tell the unwashed masses nothing. And make the vendors pay through the nose for that information. Lyrics money, money, MONEY. http://www.lyricsondemand.com/tvthemes/apprenticelyrics.html Still brain dead from New Years, I guess. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 360 programs on a z/10
On 02 Jan 10 14:49:04 -0800, Charlie Gibbs cgi...@kltpzyxm.invalid wrote: At least there was a somewhat reasonable excuse. At one PPOE I recall that my boss and his boss would regularly spend $100 worth of time arguing over a $10 item in the budget. Sometimes that is a worthwhile investment, when we include the benefit of getting them out of the workers' way. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 360 programs on a z/10
On Sun, 3 Jan 2010 18:50:35 -0800 (PST), hanco...@bbs.cpcn.com wrote: Around 1971 the Bell System implemented a major rate reduction and rate structure change. All dialed direct calls became a minute minimum instead of three minutes. Weekend and late-night calls dialed direct calls became quite cheap, as low as 5c a minute for short distances. This was a boon to college kids who were often up late at night. (If direct dialing wasn't available the rates still applied). The competition of free long distance calls for cellular phones and Internet phones hasn't yet finished this process. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Assembler program calling a 'C' program with mixed case long names
I hear the same thing from customers: ooh, I don't like PDSE's. (cf. John McKown's post this morning on why JCL continues to be so bad.) Charles -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Steve Austin Sent: Monday, January 04, 2010 4:24 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names The code I am writing is a prototype, but it is intended that something like it will be shipped to customers in time. I don't know that PDSE usage will be an issue to anyone, but experiece suggests that someone will at least question the requirement, so for the time being I'm avoiding using a PDSE. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Crayford Sent: 04 January 2010 11:52 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names Steve Austin wrote: Thanks I should have explained that I'm using the pre-linker so that I can link to a PDS. Out of curiosity why are you tied to a PDS? You will get much better mileage from a PDSE. GOFF, XPLINK, programs 16MB and future features that will only be supported by PDSE program objects. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Crayford Sent: 25 December 2009 00:48 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names You can't use the pre-linker with GOFF. If I were you I would ditch the pre-linker. It's functionally stabalized and the binder does everything you need and more. Only use the pre-linker if you want to use load modules in a PDS. Steve Austin wrote: Thanks for all your responses. I am now fighting with the pre-linker; it does not pick up the long mixed case names I specified using alias statements. Steve -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen Sent: 23 December 2009 18:45 To: IBM-MAIN@bama.ua.edu Subject: Re: Assembler program calling a 'C' program with mixed case long names On Wed, 23 Dec 2009 15:55:12 - Steve Austin steve.aus...@macro4.com wrote: :Is it possible to persuade the assembler to create mixed case ESD names? :The GOFF option allows long names, but the ESD entries are upper case. Look at the assembler ALIAS statement. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. .
Re: 360 programs on a z/10
On 3 Jan 2010 10:27:51 GMT, Huge h...@nowhere.much.invalid wrote: When I worked for Xerox, my boss made an international telephone call to query a 20c discrepancy on my expenses. When I worked for EDS, I got called up because my meal expenses were whole dollar amounts.We were expected to calculate tips to the penny instead of rounding them.Who does that? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Bookshelves under BookMangler
On Sun, 3 Jan 2010 21:09:47 -0800, Charles Mills wrote: Does this http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/dz9zr002/B.0 work for you? (Watch out for the fold.) It is kinda stale: Title: z/Architecture Principles of Operation Document Number: SA22-7832-02 Build Date: 04/24/03 14:06:49 Build Version: 1.3.0 of BUILD/VM Version: UG03921 DropDate: Tuesday, October 2, 2001 IBM seems determined to drop HTML support for at least this manual. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Rick Fochtman Sent: Sunday, January 03, 2010 7:20 PM Can someone out there point me to what bookshelf contains the PoPs manual? All I've been able to find is a PDF and I need the instruction tables from Appendix B in an editable format. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 360 programs on a z/10
On Sun, 03 Jan 2010 20:29:41 -0700, Joe Pfeiffer pfeif...@cs.nmsu.edu wrote: Note that both Patton and Montgomery agreed that the best approach was a spearhead across Europe into Germany. They disagreed on who should lead it, each wanted to be the sole leader of the action. Eisenhower overruled both and ordered a broad approach. Was Eisenhower or Patton correct? Again, Hindsight is 20/20. And we do know that Eisenhower was correct enough. And that's what really counts. Unless we were one of the casualties who might have been better off with a better way. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 360 programs on a z/10
On Mon, 04 Jan 2010 06:02:41 -0500, Anne Lynn Wheeler l...@garlic.com wrote: one of boyd's stories about ww2 ... was US running ww2 on mass hordes, overwhelming resources, and logistics (because it didn't people to run it based on skills). one example he used was sherman tank that was significantly overmatched ... but US could produce them at ten times the rate of german tanks ... and so could win via attrition (modulo issue with morale among tank crews that were being used as cannon fodder). Even more important than out-tanking the enemy was out-Jeeping them. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Seymour's signature
In 003901ca8bd0$35157ea0$9f407b...@org, on 01/02/2010 at 09:22 AM, Charles Mills charl...@mcn.org said: New decade; time for a new signature. Yes, and as soon as Congress changes the law I will change my sig to match :-( -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CAPS Fantasia (was: argv for z/OS C++ batch)
In 201001022133.o02lxeva031...@imr-mb02.mx.aol.com, on 01/02/2010 at 02:33 PM, Paul Gilmartin paulgboul...@aim.com said: Are you suggesting that diacritical marks should be considered embellishments, lacking semantic significance? I suspect that he's suggesting transforming to a locale-dependent canonical form for sorting. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CAPS Fantasia (was: argv for z/OS C++ batch)
In listserv%201001011741487253.0...@bama.ua.edu, on 01/01/2010 at 05:41 PM, Paul Gilmartin paulgboul...@aim.com said: So, in some environments, font sensitivity is with us; ITYM code-page sensitivity, and if we ever switch to Unicode[1] then that issue should disappear as well. (OS X and OSol both appear to have used UTF-8. In which case your Russian file names should be rendered properly without font sensitivity. [1] Raw, e.g., UCS-4, or with a transform, e.g., UTF-8 -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Basic question on passing JCL set symbol to proc
In listserv%201001030048166875.0...@bama.ua.edu, on 01/03/2010 at 12:48 AM, Paul Gilmartin paulgboul...@aim.com said: Your problem in this instance is that JCL makes the colossal design blunder of interpreting metacharacters _after_ symbol substitution. Rexx, for example, knows better. There are two ways to design syntax for symbol substitution; expressions and interpolation. Rexx uses the former, and has no need to recognize metacharacters inside quoted strings, other than recognizing doubled framing characters. JCL, like BASH, CLIST, Perl and Script, uses interpolation. Each approach has advantages and disadvantages. The blunders in JCL, IMHO, are not in the design but in implementation details, e.g., the default for SPACE=. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Seymour's signature
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Shmuel Metz (Seymour J.) In 003901ca8bd0$35157ea0$9f407b...@org, on 01/02/2010 at 09:22 AM, Charles Mills charl...@mcn.org said: New decade; time for a new signature. Yes, and as soon as Congress changes the law I will change my sig to match :-( I certainly wouldn't hold my breath waiting for any such change. :-( -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: VSAM LSR
Paul, I have an application that has several VSAM datasets. These datasets currently use NSR (Non Shared Resources). The Application is written in assembler. I want to switch some of the Files to use LSR. If two files share a buffer pool do I need to concern my self with the contents of the buffer pool or is the Access Method handling that. In other words If I issue a VSAM GET for File A, is VSAM managing the contents of the LSR buffer pool with respect to the two files that may or may nor have records in the buffer pool ? Do I need to use any additional Assembler VSAM macros to manage the contents of the buffer pool ? I believe someone else mentioned batch LSR but you could use system managed buffering if the vsam datasets are SMS managed. It would be even less work than implementing batch LSR. My testing showed very good results such that I would problably not bother to setup LSR in an assembler program again. Regards, John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Seymour's signature
On Fri, 1 Jan 2010 21:45:42 -0800, David Alcock wrote: Every year I hope in vain that he changes his email signature... Ted's is much worse, IMO. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com wrote: I was told that compressed pointers for storage below 32GB fit into a smaller space, so more compressed pointers fit in a cache line, leading to more effective cache utilization. Performance is all about the caches these days. I am not a Java person. I don't know what a compressed pointer is. From what (I think) I understand / remember from what I heard at SHARE, it is addresses of large object pages. And since they are in 1M increments / boundaries, the lower 3 bytes aren't needed as long as the thing that needs those addresses understands what they are. (So obviously you need z/OS 1.9 or above and a z10 with large page support turned on take advantage of this new function). I'm still intrigued that the (undocumented) option's name contains the substring 32G. Is 32GiB the size of a particular granule in 64-bit storage management? Or might the 32 refer to a fictitious 32-bit addressing capability? How many 32bit pointers can fit in 30G? I think 4026531840 - which would represent 3840T of virtual storage (if my math is correct - which it probably isn't). I'm getting dizzy thinking about these large numbers. The range from 2GB to 32GB is set aside for a particular intended user, which is the JVM. On Mon, 4 Jan 2010 07:58:37 -0600, McKown, John john.mck...@healthmarkets.com wrote: The storage between 2g and 4g is NOT accessible in 31 bit mode. You're right! So, why bother and how does it improve performance? I guess we'll never know. It is likely proprietary. Since it was talked about at SHARE, I don't think it's proprietary. It's just not GUPI. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com wrote: I was told that compressed pointers for storage below 32GB fit into a smaller space, so more compressed pointers fit in a cache line, leading to more effective cache utilization. Performance is all about the caches these days. I am not a Java person. I don't know what a compressed pointer is. Just a wild guess. If all pointers are to storage on a doubleword boundary, the address can be shifted right three bits. Then you can point to any doubleword below 32 GB using an unsigned 32-bit address. How that might help performance is a mystery to me. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: argv for z/OS C++ batch
You can do precisely this with the Dignus Systems/C++ compiler and our Direct CALL environment. - Dave Rivers - Charles Mills wrote: Sam - Thanks and thanks. I'm trying to write a C++ program that will allow standard z/OS utility linkage. It wants to look as much as possible like other programs that expect a parm 1 and a parm 2 passed via R1 - words 0 and 1. I can do whatever I want on the C++ side but I would like the caller to be able to use standard linkage. The C++ program is big and involved and I really can't afford to give up the C/C++ library. I just ran an experiment and determined two things: 1. The C++ program can be loaded via standard assembler macros absent any CEE routines with no problems. I used LINKMVS from Rexx because it was easy to do. 2. However ... argv[0] = the C program's name; argv[1] = the first parameter passed on LINKMVS; the second parameter was nowhere to be found. This is a problem. I see writing an assembler stub to get control first, establish the LE environment, and then call the C++ main (or a pseudo- main), passing the two arguments somehow, probably as a list passed as argv[1]. Does anyone know an easier way? Seems like a pretty obvious need: write a C++ program that starts up with standard z/OS multiple-parameter-pointers-pointed-to-by-R1 linkage. Charles -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Sam Siegel Sent: Saturday, December 26, 2009 4:55 PM To: IBM-MAIN@bama.ua.edu Subject: Re: argv for z/OS C++ batch Charles, The other option you have is to look at METAL C or system C. Or a third party compiler. Regards, Sam On Sat, Dec 26, 2009 at 9:14 PM, Charles Mills charl...@mcn.org wrote: Trying to figure out this subject. The C/C++ Language Reference on p. 207 says Under z/OS batch . argv[0] Returns the program name in uppercase argv[1 to n] Returns the arguments as you enter them. Not the most useful documentation - I don't think as you enter them is terribly clear as it pertains to z/OS batch. The C/C++ User's Guide on p. 70 says When NOARGPARSE is in effect, arguments on the invocation line are not parsed, argc has a value of 2, and argv contains a pointer to the string. Question: Does anyone know if a NOARGPARSE C++ program called via LINK or ATTACH would receive parm 2 - the second word pointed to by R1 - anywhere? Is there a recommended way to do this? What I'd like to end up with is a C program that did me no favors - if invoked from JCL EXEC, then argv[1] would point to the PARM= string if any (as is) and if called via LINK or ATTACH would get the vector pointed to by the caller's R1 as argv[1, 2, 3 .]. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- riv...@dignus.comWork: (919) 676-0847 Get your mainframe programming tools at http://www.dignus.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
On Mon, 4 Jan 2010 09:27:48 -0600, Mark Zelden wrote: How many 32bit pointers can fit in 30G? I think 4026531840 - which would represent 3840T of virtual storage (if my math is correct - which it probably isn't). I'm getting dizzy thinking about these large numbers. Well, 32768 1MiB pages fit below 32GiB, so those can be identified by 15-bit pointers (reserving 1 bit for ?). I surmise this allows compaction of the page table by a factor of 2. I'd say abbreviated rather than compressed. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 360 programs on a z/10
On Mon, 04 Jan 2010 09:18:21 -0500, jmfbahciv jmfbah...@aol wrote: Note that both Patton and Montgomery agreed that the best approach was a spearhead across Europe into Germany. They disagreed on who should lead it, each wanted to be the sole leader of the action. Eisenhower overruled both and ordered a broad approach. Was Eisenhower or Patton correct? Again, Hindsight is 20/20. And we do know that Eisenhower was correct enough. And that's what really counts. Is it really enough??? If *many* more lives could have been saved by doing things a different way and *still* succeeding... would that *not* have been better??? You are unbelievable. Do you really wish that Europe dithered until after Germany had the atomic bomb? He implied nothing of the kind. The question was - if, say, Patton and Montgomery were right, that the war could have been won quicker with fewer casualties - wouldn't that have been better? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
OT: World War 2
Subject line changed. -jc- -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Howard Brazee Sent: Monday, January 04, 2010 9:53 AM To: IBM-MAIN@bama.ua.edu Subject: Re: 360 programs on a z/10 On Mon, 04 Jan 2010 09:18:21 -0500, jmfbahciv jmfbah...@aol wrote: Note that both Patton and Montgomery agreed that the best approach was a spearhead across Europe into Germany. They disagreed on who should lead it, each wanted to be the sole leader of the action. Eisenhower overruled both and ordered a broad approach. Was Eisenhower or Patton correct? Again, Hindsight is 20/20. And we do know that Eisenhower was correct enough. And that's what really counts. Is it really enough??? If *many* more lives could have been saved by doing things a different way and *still* succeeding... would that *not* have been better??? You are unbelievable. Do you really wish that Europe dithered until after Germany had the atomic bomb? He implied nothing of the kind. The question was - if, say, Patton and Montgomery were right, that the war could have been won quicker with fewer casualties - wouldn't that have been better? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: OT: World War 2
In a message dated 1/4/2010 10:05:14 A.M. Central Standard Time, jch...@ussco.com writes: Subject line changed Thankfully, get back on track some of early computers were used for calculating artillery trajectories. Remember at coffee break Admiral Hopper told us, Nimitz figured out U-Boats were being deployed in 'optimal coverage patterns'. So guess where you send the destroyers? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad?
About JCL, Paul Gilmartin wrote: . . . Its objectives make JCL more like a macro processor than a programming language, but it failed to incorporate much of the current assembler's macro processing capability, and neither JCL nor HLASM conditional assembly has graceful branching nor [sic] clean iteration. Statements of this sort are and should be constitutionally protected, but this one is without much redeeming technical merit. JCL has been criticized by those who have not mastered it since the time of OS PCP. Its syntax, borrowed from that of then current assemblers, is said to be difficult to learn, for reasons that I have never understood; but it is not indefensible. In particular, it is more powerful than the alternatives to it that I have seen. He begins here by attempting to distinguish a macro processor and a programming language, implying it would seem that a macro processor is not a programming language; but he then proceeds immediately to criticize, a little ungrammatically but unambiguously enough, both JCL and the HLASM as lacking two of the important attributes of programming languages, viz., graceful branching and clean iteration. Now grace and cleanliness are in the eyes of their beholders. Consider |baid setc 'macname'.'__boolean_array__' | gblb (baid)(1) |nbae seta n'(baid) |iseta 0 |.reiz_loop anop |iseta i+1 |eoasetb (i gt nbae) | aif (eola).reiz_lend |(baid)(i) setb 0 | ago .reiz_loop |.reiz_lend anop This HLASM macro-language statement group resets the elements of an array of created global binary/boolean set symbols to their default value, boolean 0. Someone unfamiliar with the HLASM macro language would find it unintelligible; and there is a familiar, now tedious perspective from which it is judged long-winded and/or detail-ridden; but there is nothing unclean about it. Examples of this sort could be proliferated ad infinitum et nauseam, but they would not persuade Mr. Gilmartin to my views, and that is as well. What distresses me about these views is not their substance, with which I expect usually to disagree. It is his perspective. He judges that his needs, which I often judge to be whims, should be satisfiable all but immediately, without much programming, by a tool that he is using and that the machinery employed to do so should conform to his particular, municipal notions of cleanliness and grace. These requirements ensure that he will always be dissatisfied with every tool he uses that was designed and implemented by others. We are all creatures of our own very different experiences. John Gilmore Ashland, MA 01721-1817 USA _ Hotmail: Trusted email with powerful SPAM protection. http://clk.atdmt.com/GBL/go/177141665/direct/01/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
hfs VS zfs
Hello all, we are planning to migrate from z/os 1.7 to 1.11. In our planning we are trying to decide if we want to go to zfs instead of the hfs. Is there anyone out there that can think of any good reasons not to go to zfs when we do our upgrade? == This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to which they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad?
Are you saying JCL is not so bad? Charles -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of john gilmore Sent: Monday, January 04, 2010 8:30 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Why is JCL so bad? About JCL, Paul Gilmartin wrote: . . . Its objectives make JCL more like a macro processor than a programming language, but it failed to incorporate much of the current assembler's macro processing capability, and neither JCL nor HLASM conditional assembly has graceful branching nor [sic] clean iteration. Statements of this sort are and should be constitutionally protected, but this one is without much redeeming technical merit. JCL has been criticized by those who have not mastered it since the time of OS PCP. Its syntax, borrowed from that of then current assemblers, is said to be difficult to learn, for reasons that I have never understood; but it is not indefensible. In particular, it is more powerful than the alternatives to it that I have seen. He begins here by attempting to distinguish a macro processor and a programming language, implying it would seem that a macro processor is not a programming language; but he then proceeds immediately to criticize, a little ungrammatically but unambiguously enough, both JCL and the HLASM as lacking two of the important attributes of programming languages, viz., graceful branching and clean iteration. Now grace and cleanliness are in the eyes of their beholders. Consider |baid setc 'macname'.'__boolean_array__' | gblb (baid)(1) |nbae seta n'(baid) |iseta 0 |.reiz_loop anop |iseta i+1 |eoasetb (i gt nbae) | aif (eola).reiz_lend |(baid)(i) setb 0 | ago .reiz_loop |.reiz_lend anop This HLASM macro-language statement group resets the elements of an array of created global binary/boolean set symbols to their default value, boolean 0. Someone unfamiliar with the HLASM macro language would find it unintelligible; and there is a familiar, now tedious perspective from which it is judged long-winded and/or detail-ridden; but there is nothing unclean about it. Examples of this sort could be proliferated ad infinitum et nauseam, but they would not persuade Mr. Gilmartin to my views, and that is as well. What distresses me about these views is not their substance, with which I expect usually to disagree. It is his perspective. He judges that his needs, which I often judge to be whims, should be satisfiable all but immediately, without much programming, by a tool that he is using and that the machinery employed to do so should conform to his particular, municipal notions of cleanliness and grace. These requirements ensure that he will always be dissatisfied with every tool he uses that was designed and implemented by others. We are all creatures of our own very different experiences. John Gilmore Ashland, MA 01721-1817 USA _ Hotmail: Trusted email with powerful SPAM protection. http://clk.atdmt.com/GBL/go/177141665/direct/01/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
LE Task termination ECB
Is there a way to get LE user abends U4083/U4082 in an ECB? My application is this, I have an Assembler program (Non-LE). This attaches a C++ pgm (LE). When I run with heapchk(on) I get U4082 abend. The problem here is the C++ task doesnt get ended as the U4042 return code is not present in the ECB. Each time I have to manually cancel the job. Thanks in advance -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
IIRC, this is the type of thing they are doing, and as Jim mentioned: it improves performance because more pointers fit in a cache line, and therefor use less cache. With today's processor designs, using cache effectively can have huge performance benefits. Tom Marchant m42tom-ibmm...@yahoo.com 1/4/2010 10:45 AM On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com wrote: I was told that compressed pointers for storage below 32GB fit into a smaller space, so more compressed pointers fit in a cache line, leading to more effective cache utilization. Performance is all about the caches these days. I am not a Java person. I don't know what a compressed pointer is. Just a wild guess. If all pointers are to storage on a doubleword boundary, the address can be shifted right three bits. Then you can point to any doubleword below 32 GB using an unsigned 32-bit address. How that might help performance is a mystery to me. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
scott.r...@joann.com (Scott Rowe) writes: Just a wild guess. If all pointers are to storage on a doubleword boundary, the address can be shifted right three bits. Then you can point to any doubleword below 32 GB using an unsigned 32-bit address. How that might help performance is a mystery to me. don't laugh, I've actually done that for an application ... which involves huge number of pointers (significantly reduced storage required before needing to roll over to 64-bit pointers). -- 40+yrs virtualization experience (since Jan68), online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM BCDS is going larger
Hi Dave and Lizette, I did another BCDS cds reorg last sunday, now it has: STATISTICS REC-TOTAL4650469 SPLITS-CI--0 REC-DELETED0 SPLITS-CA--0 REC-INSERTED---0 FREESPACE-%CI--0 REC-UPDATED0 FREESPACE-%CA--0 REC-RETRIEVED---16310129 FREESPC---2024644608 ALLOCATION SPACE-TYPE--CYLINDER HI-A-RBA--3428352000 SPACE-PRI---4650 HI-U-RBA--1403781120 SPACE-SEC--0 ARC0148I BCDS TOTAL SPACE=3348000 K-BYTES, CURRENTLY 422 ARC0148I (CONT.) ABOUT 67% FULL, WARNING THRESHOLD=80%, TOTAL ARC0148I (CONT.) FREESPACE=59%, EA=NO, CANDIDATE VOLUMES=0 Besides of runing every day, EXPIREBV job: HSEND WAIT EXPIREBV EXECUTE SYSOUT(J) I checked backup log and saw this: DFSMSHSM BACKUP LOG, TIME 19:03:20, DATE 10/01/03 ARC0680I EXPIRE BACKUP VERSIONS STARTING AT 19:03:21 ON 2010/01/03, SYSTEM SYB1 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR PDFHSM.BACK.T392220.SYS3.DV.J1295, RC=0004 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 4, REASON=0, AGE=2993, DSN=PDFHSM.BACK.T392220.SYS3.DV.J1295 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR PDFHSM.BACK.U122420.SYS3.DV.J1295, RC=0004 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 4, REASON=0, AGE=2993, DSN=PDFHSM.BACK.U122420.SYS3.DV.J1295 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 28, REASON=0, AGE=2509, DSN=SYS3.DV.PROJCL.BACKUP.DBRM ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 28, REASON=0, AGE= 0, DSN=SYS3.DV.PROJCL.BACKUP.DBRM however, I now did a HSEND WAIT EXPIREBV DISPLAY SYSOUT(J) and it's generating a lot of records. At this time, job is still running and the backup log has 28.761 lines. Is it possible that the EXPIREBV EXECUTE is not working at all after giving above errors ?? Any h'int is welcome Many thx once more, A.Cecilio. On Mon, Dec 28, 2009 at 12:19 PM, O'Brien, David W. (NIH/CIT) [C] obrie...@mail.nih.gov wrote: Antonio, One other question - When was the last time you ran Expirebv? I'm just wondering if you have extraneous rescords in your BCDS. Thank You, Dave O'Brien NIH Contractor From: Lizette Koehler [stars...@mindspring.com] Sent: Monday, December 28, 2009 7:16 AM To: IBM-MAIN@bama.ua.edu Subject: Re: DFHSM BCDS is going larger Antonio, At this point, you may wish to open an ETR to IBM to identify why your files are growing so quickly. I would not think it should grow that fast unless there is a lot of backup functions running. How many volumes/datasets do you do HSM backup for? It maybe that 4320 Cylinders is insufficient for your DFHSM Backups. We do not do many. We have daily full volume dumps for our critical system/application files. We typically use DFHSM backups for TSO and Roscoe pools. Not much else. I am not sure if there is a rule of thumb as to what makes good candidate volumes for backup. Maybe others might have a suggestion. Lizette Hi Lizette and David, thx once more for your sugestions, here is a not so good upd: - My bcds today: ARC0148I BCDS TOTAL SPACE=3132000 K-BYTES, CURRENTLY 188 ARC0148I (CONT.) ABOUT 87% FULL, WARNING THRESHOLD=80%, TOTAL ARC0148I (CONT.) FREESPACE=44%, EA=NO, CANDIDATE VOLUMES=0 STATISTICS REC-TOTAL4611413 SPLITS-CI--20950 REC-DELETED---232332 SPLITS-CA---1512 REC-INSERTED--346063 FREESPACE-%CI-10 REC-UPDATED---613409 FREESPACE-%CA-10 REC-RETRIEVED--273730657 FREESPC---1439428608 ALLOCATION SPACE-TYPE--CYLINDER HI-A-RBA--3207168000 SPACE-PRI---4350 HI-U-RBA--2788392960 SPACE-SEC--0 VOLUME VOLSERCPS096 PHYREC-SIZE12288 DEVTYPE--X'3010200F' PHYRECS/TRK4 VOLFLAGPRIME TRACKS/CA-15 EXTENTS: LOW-CCHH-X'002E' LOW-RBA0 HIGH-CCHHX'027E' HIGH-RBA---426885119 LOW-CCHH-X'1866' LOW-RBA426885120 HIGH-CCHHX'272E' HIGH-RBA--3207167999 So, I must schedule an DFHSM intervention soon, and decide if I'll alocate bcds with EA or use multicluster cds (I have Z/OS V1.8 and I don't know how to implement these func. I must read the manuals). Remember that I did the BCDS reorg on December 13th, and it becomes with 52% of free space. So after 15 days it grew 35%. I'ts very strange, we never had to reorg or augment the cds so often, So, any hints are welcome. Many thx once more, A.Cecilio. -- For IBM-MAIN subscribe / signoff / archive access instructions,
Re: dead zone
Here is an IBM document that answers many of the questions raised in this thread. Match 31-bit WebSphere Application Server performance with new features in 64-bit Java on System z http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf Doug On Mon, 4 Jan 2010 12:00:25 -0500, Scott Rowe scott.r...@joann.com wrote: IIRC, this is the type of thing they are doing, and as Jim mentioned: it improves performance because more pointers fit in a cache line, and therefor use less cache. With today's processor designs, using cache effectively can have huge performance benefits. Tom Marchant m42tom-ibmm...@yahoo.com 1/4/2010 10:45 AM On Sat, 2 Jan 2010 15:37:15 -0500, Jim Mulder d10j...@us.ibm.com wrote: I was told that compressed pointers for storage below 32GB fit into a smaller space, so more compressed pointers fit in a cache line, leading to more effective cache utilization. Performance is all about the caches these days. I am not a Java person. I don't know what a compressed pointer is. Just a wild guess. If all pointers are to storage on a doubleword boundary, the address can be shifted right three bits. Then you can point to any doubleword below 32 GB using an unsigned 32-bit address. How that might help performance is a mystery to me. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Where have the control blocks gone?
I've been debugging applications in z/OS and its predecessors since 1975, and feel I have a pretty good idea how to use a SYSUDUMP. But things are getting a little mysterious right now. I'm getting lots of dumps as I create and debug a new application, and suddenly I've noticed: * Instead of three (or more) SVRBs, there are only two * When I force an abend right after OPEN the DCB does not show up as formatted in the dump (I can find the storage location and figure it out, but I'm surprised at this development). Have there been some changes in SYSUDUMP formatting in recent years? (I'm running z/OS 1.10 currently). -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques == Ask about being added to our opt-in list: == == * Early announcement of new courses == == * Early announcement of new techincal papers == == * Early announcement of new promotions == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
McKown, John wrote: The storage between 2g and 4g is NOT accessible in 31 bit mode. -- Binyamin Dissen bdis...@dissensoftware.com You're right! So, why bother and how does it improve performance? I guess we'll never know. It is likely proprietary. -- John McKown Systems Engineer IV IT Administrative Services Group -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html It improves performance by avoiding the extra level of indirection when translating the virtual address to a real address on a TLB miss. Doesn't have to reference the region-table entry. -- | Jim Phoenix | Voice: (310) 338-0400 x316 | | Senior Software Developer| Fax: (310) 338-0801| | Phoenix Software International | Alt fax: (310) 337-2685| | 831 Parkview Drive North | jimphoe...@phoenixsoftware.com | | El Segundo, CA 90245 | http://www.phoenixsoftware.com | Opinions expressed by this individual are not necessarily those of the Company. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Does ISQL works for remote UDB(DB2) on Linux ?
Are you refering to the VSE DB2 CICS transaction ISQL? If so, then yes you can. -- Frank Swarbrick Applications Architect - Mainframe Applications Development FirstBank Data Corporation - Lakewood, CO USA P: 303-235-1403 On 1/3/2010 at 10:06 AM, in message listserv%201001031106289777.0...@bama.ua.edu, Arye Shemer aryeshe...@gmail.com wrote: Hello Forumers, Can I use the CICS transaction ISQL for remote UDB(DB2) database on Linux ? Thanks, Arye, Shemer. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html The information contained in this electronic communication and any document attached hereto or transmitted herewith is confidential and intended for the exclusive use of the individual or entity named above. If the reader of this message is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any examination, use, dissemination, distribution or copying of this communication or any part thereof is strictly prohibited. If you have received this communication in error, please immediately notify the sender by reply e-mail and destroy this communication. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM BCDS is going larger
A. Expirebv has two modes: Display and Execute. If this is the first time you've run the command, I would strongly urge you to run Display first and make sure that the backups being deleted are the ones you want deleted in accordance with your SMS Management class policies. B.Isyour log set up to issue all msgs. or only error msgs.? see HSM.Parmlib ARCCMDxx SETSYS- ACTLOGTYPE(DASD) - ACTLOGMSG(FULL) I hold issue a Hold Expirebv immediately Re-run Listcat for BCDS to see if any records have been deleted. Check ACTLOGMSG value. Release Expirebv and run Expirebv display to see what remains to be deleted and whether those backups ought to be deleted. Lizette, Your thoughts? Thank You, Dave O'Brien NIH Contractor From: af dc [acbi...@gmail.com] Sent: Monday, January 04, 2010 12:20 PM To: IBM-MAIN@bama.ua.edu Subject: Re: DFHSM BCDS is going larger Hi Dave and Lizette, I did another BCDS cds reorg last sunday, now it has: STATISTICS REC-TOTAL4650469 SPLITS-CI--0 REC-DELETED0 SPLITS-CA--0 REC-INSERTED---0 FREESPACE-%CI--0 REC-UPDATED0 FREESPACE-%CA--0 REC-RETRIEVED---16310129 FREESPC---2024644608 ALLOCATION SPACE-TYPE--CYLINDER HI-A-RBA--3428352000 SPACE-PRI---4650 HI-U-RBA--1403781120 SPACE-SEC--0 ARC0148I BCDS TOTAL SPACE=3348000 K-BYTES, CURRENTLY 422 ARC0148I (CONT.) ABOUT 67% FULL, WARNING THRESHOLD=80%, TOTAL ARC0148I (CONT.) FREESPACE=59%, EA=NO, CANDIDATE VOLUMES=0 Besides of runing every day, EXPIREBV job: HSEND WAIT EXPIREBV EXECUTE SYSOUT(J) I checked backup log and saw this: DFSMSHSM BACKUP LOG, TIME 19:03:20, DATE 10/01/03 ARC0680I EXPIRE BACKUP VERSIONS STARTING AT 19:03:21 ON 2010/01/03, SYSTEM SYB1 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR PDFHSM.BACK.T392220.SYS3.DV.J1295, RC=0004 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 4, REASON=0, AGE=2993, DSN=PDFHSM.BACK.T392220.SYS3.DV.J1295 ARC0184I ERROR WHEN READING THE DFSMSHSM CONTROL DATA SET C RECORD FOR PDFHSM.BACK.U122420.SYS3.DV.J1295, RC=0004 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 4, REASON=0, AGE=2993, DSN=PDFHSM.BACK.U122420.SYS3.DV.J1295 ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 28, REASON=0, AGE=2509, DSN=SYS3.DV.PROJCL.BACKUP.DBRM ARC0734I ACTION=EXBACKV FRVOL=** TOVOL=** TRACKS= *** RC= 28, REASON=0, AGE= 0, DSN=SYS3.DV.PROJCL.BACKUP.DBRM however, I now did a HSEND WAIT EXPIREBV DISPLAY SYSOUT(J) and it's generating a lot of records. At this time, job is still running and the backup log has 28.761 lines. Is it possible that the EXPIREBV EXECUTE is not working at all after giving above errors ?? Any h'int is welcome Many thx once more, A.Cecilio. On Mon, Dec 28, 2009 at 12:19 PM, O'Brien, David W. (NIH/CIT) [C] obrie...@mail.nih.gov wrote: Antonio, One other question - When was the last time you ran Expirebv? I'm just wondering if you have extraneous rescords in your BCDS. Thank You, Dave O'Brien NIH Contractor From: Lizette Koehler [stars...@mindspring.com] Sent: Monday, December 28, 2009 7:16 AM To: IBM-MAIN@bama.ua.edu Subject: Re: DFHSM BCDS is going larger Antonio, At this point, you may wish to open an ETR to IBM to identify why your files are growing so quickly. I would not think it should grow that fast unless there is a lot of backup functions running. How many volumes/datasets do you do HSM backup for? It maybe that 4320 Cylinders is insufficient for your DFHSM Backups. We do not do many. We have daily full volume dumps for our critical system/application files. We typically use DFHSM backups for TSO and Roscoe pools. Not much else. I am not sure if there is a rule of thumb as to what makes good candidate volumes for backup. Maybe others might have a suggestion. Lizette Hi Lizette and David, thx once more for your sugestions, here is a not so good upd: - My bcds today: ARC0148I BCDS TOTAL SPACE=3132000 K-BYTES, CURRENTLY 188 ARC0148I (CONT.) ABOUT 87% FULL, WARNING THRESHOLD=80%, TOTAL ARC0148I (CONT.) FREESPACE=44%, EA=NO, CANDIDATE VOLUMES=0 STATISTICS REC-TOTAL4611413 SPLITS-CI--20950 REC-DELETED---232332 SPLITS-CA---1512 REC-INSERTED--346063 FREESPACE-%CI-10 REC-UPDATED---613409 FREESPACE-%CA-10 REC-RETRIEVED--273730657 FREESPC---1439428608 ALLOCATION SPACE-TYPE--CYLINDER HI-A-RBA--3207168000 SPACE-PRI---4350 HI-U-RBA--2788392960 SPACE-SEC--0 VOLUME VOLSERCPS096 PHYREC-SIZE12288 DEVTYPE--X'3010200F'
Re: ADCD CD
Since you are accessing the 1.4 disks from another system, Just re-run the compress from the other system. I have had this happen in the past, and recovered with no issues. HTH, -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Logan Sent: Thursday, December 31, 2009 11:54 AM To: IBM-MAIN@bama.ua.edu Subject: ADCD CD I need to get a copy of one of the ADCD CDs onto our mainframe so that I can get a file off of it. It's designed for the Flex, so it's the PC CKD two-file thing that goes into the emulator to then be copied to internal DASD. Is there any way to load these files from the CD right onto an empty volume? FTP them up and use DITTO or something, perhaps? Basically, I am running an old z/OS on a z9, and I need to reload one of the systems files from S4RES1 and I am hoping I don't have to find and fire up a flex or MP3000 and create an OS, set up communications just to TSO XMIT and FTP a single PDS. Any ideas? Thanks! David Logan -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
VSE has better symbolic substitution and much better conditional logic. -- Frank Swarbrick Applications Architect - Mainframe Applications Development FirstBank Data Corporation - Lakewood, CO USA P: 303-235-1403 On 1/3/2010 at 4:25 PM, in message 00fb01ca8ccb$f99b8890$ecd299...@org, Charles Mills charl...@mcn.org wrote: I tell my students, OS/360 Job Control Language is the worst programming language ever designed anywhere by anybody for any purpose and it was done under my management. Don't brag; it's always possible to do worse. I recall that DOS/360 had a series of file-to-file utilities (no device independence so you needed a disk to tape utility, a card to tape utility, a tape to disk utility, ...) whose control card syntax was way worse than OS/360 JCL. DOS/VSE JCL is arguably worse than OS/MVS JCL: the DLBL statement with its umpteen positional parameters makes the DD statement look downright user-friendly. And VSE is much more dependent on POWER control cards than MVS is on JES control cards, and the syntax is totally different from JCL -- JES statements are at least closer to JCL in syntax. And anyone else ever write IV-Phase assembler? 5-character symbols, of which only three (24 bit word machine) were significant, so NOTAG was the same symbol as NOTUP. And it did not flag duplicates, it just silently redefined the symbol. Nor did it flag undefined symbols -- just passed them to the linker as externs. The JCL was pretty bad too ... Charles -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Paul Gilmartin Sent: Sunday, January 03, 2010 1:51 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc On Sun, 3 Jan 2010 19:01:00 +0100, Lindy Mayfield wrote: -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html The information contained in this electronic communication and any document attached hereto or transmitted herewith is confidential and intended for the exclusive use of the individual or entity named above. If the reader of this message is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any examination, use, dissemination, distribution or copying of this communication or any part thereof is strictly prohibited. If you have received this communication in error, please immediately notify the sender by reply e-mail and destroy this communication. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Doug Henry Sent: Monday, January 04, 2010 11:33 AM To: IBM-MAIN@bama.ua.edu Subject: Re: dead zone Here is an IBM document that answers many of the questions raised in this thread. Match 31-bit WebSphere Application Server performance with new features in 64-bit Java on System z http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf Doug Very interesting! Thanks for posting that URL. Using the bar for storage avoids out-of-memory errors in 31 bit Java and the overhead in 64 bit Java. The 31 bit Java pointer is 24 bytes, but 48 bytes (with some padding bytes) in 64 bit. So that reduces the storage overhead and page tables and TLB usage. At least, as best as I can tell. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CAPS Fantasia (was: argv for z/OS C++ batch)
Good point. I'm definitely Anglophone biased, as the only language I know is English or rather American English. While I did ponder about code pages for other languages, I felt that any comment would probably be opening my mouth and inserting my foot. It seems I managed to do that anyway. Early in my career, I was stationed in Germany. I learned that foreign programmers were required to program in English, because the major languages of the time (COBOL, FORTRAN, etc.) all used keywords spelled in English. As a young kid, that seemed quite unfair, but when I asked those programmers they thought nothing of it. They inferred that my question was trivial and even the thought of supporting multi-lingual programming languages would be counter-productive. Of course, they spoke English, so any English keywords posed no problem; so they were likely biased. This kind of reasoning, seems to lead to the question: is imposing a standard code page that only contains ISO Latin characters fair? No, but it is expedient. Of course, most code pages have many characters with no standard translation to other code pages. Therefore allowing multiple code pages is likely to have challenges. However, fonts and code pages are not quite the same thing. Fonts can have characteristics like color, boldness, size, etc. that are independent of the code page. Based on the assumption that fonts and code pages are different (perhaps a bad assumption) I figured that you could translate all colors to black, remove boldness, etc. such that those kinds of font characteristics would be independent of the code page. So when you ignore font characteristics, a file called foo [in blue] would be same file as foo [in red], etc. It might mean that the file system might need to have two fields, one without font attributes for functional access, and another with font attributes for display purposes. Of course, having two fields to keep in sync is not expedient, but it would allow people to be expressive. Case is different. As best as I can tell, case is not really a font attribute. Case is a character attribute. Changing the case of a character, is really changing the character; whereas changing the color of a character does not. I don't know, but I expect there are many languages that don't have the concept of case. I expect that in some languages, case is important. The meaning of a word can significantly change when the case is changed. In other languages, changing case may be insignificant. Has it been discussed what to do about writing orientation. Languages like English are left to right, top to bottom. I believe that Chinese can be bottom to top, right to left. I expect some other languages have still different orientations. My conclusion, there is probably no solution that will make everybody happy. Therefore, a choice than is only expedient is probably the best we can do. Don Make everything as simple as possible, but no simplier. - Albert Einstein -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Why 2GTO32G in the IARV64?
Is answered in the PDF which Doug Henry specified: http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf quote APAR OA26294 provides a direct assembler interface to z/OS Real Storage Manager (RSM), which allows memory allocations in the 2 GB (2^31) to 32 GB (2^35) virtual address range. The IBM JVM uses this API to allocate the Java heap in this virtual address range. It is noted that memory allocated using the RSM API can be backed by either 4 KB pages or large pages. /quote Why 2^35 (32G)? Because that is the upper limit on Java's heap for using compressed pointers. Above 32G of heap, Java does not compress pointers. John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
On Mon, 4 Jan 2010 11:32:36 -0600, Doug Henry doug_he...@usbank.com wrote: Here is an IBM document that answers many of the questions raised in this thread. Match 31-bit WebSphere Application Server performance with new features in 64-bit Java on System z http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf Thanks! I've been trying to find something like this since last week when this thread started. I couldn't even determine what Java level had the function added when looking at the Java APARs. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ward, Mike S Sent: Monday, January 04, 2010 8:41 AM To: IBM-MAIN@bama.ua.edu Subject: hfs VS zfs Hello all, we are planning to migrate from z/os 1.7 to 1.11. In our planning we are trying to decide if we want to go to zfs instead of the hfs. Is there anyone out there that can think of any good reasons not to go to zfs when we do our upgrade? Most noticeable issue will be if you use indirect cataloging of the systems HFS files (for example locating them on the system res packs set). This is not available for zFS at this time. Due to this we have a mix of zFS and HFS files. SMPE owned and maintained files are HFS and roll with the system res vols. User and Application files are zFS Email Firewall made the following annotations. -- Warning: All e-mail sent to this address will be received by the corporate e-mail system, and is subject to archival and review by someone other than the recipient. This e-mail may contain proprietary information and is intended only for the use of the intended recipient(s). If the reader of this message is not the intended recipient(s), you are notified that you have received this message in error and that any review, dissemination, distribution or copying of this message is strictly prohibited. If you have received this message in error, please notify the sender immediately. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Jerry Whitteridge Sent: Monday, January 04, 2010 12:21 PM To: IBM-MAIN@bama.ua.edu Subject: Re: hfs VS zfs -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ward, Mike S Sent: Monday, January 04, 2010 8:41 AM To: IBM-MAIN@bama.ua.edu Subject: hfs VS zfs Hello all, we are planning to migrate from z/os 1.7 to 1.11. In our planning we are trying to decide if we want to go to zfs instead of the hfs. Is there anyone out there that can think of any good reasons not to go to zfs when we do our upgrade? Most noticeable issue will be if you use indirect cataloging of the systems HFS files (for example locating them on the system res packs set). This is not available for zFS at this time. Due to this we have a mix of zFS and HFS files. SMPE owned and maintained files are HFS and roll with the system res vols. User and Application files are zFS I cheat. I never do a DASD copy of my DASD. I do a logical DSN copy from DASD to DASD, and I change some of the names as they are copies. What I do it make my system UNIX files have the system name and res volume in the DSN. OMVS.SYSNAME..SYSR1..ROOT for example. That way, I don't need indirect cataloging. in BPXPRMnn ROOT FILESYSTEM('OMVS.SYSNAME..SYSR1..ROOT') TYPE(ZFS) MODE(RDWR) The same with some PARMLIBs, which I put as the __first__ PARMLIB in the concatenation. Like: SYS1.SYSNAME..PARMLIB. Ditto for special LPALIBs and LINKLIBs. Which, again, I put __first__ so that modules in them override the IBM modules of the same name. Things like ICEAMn. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
On Mon, 4 Jan 2010 09:39:35 -0800, Jim Phoenix wrote: McKown, John wrote: The storage between 2g and 4g is NOT accessible in 31 bit mode. Binyamin Dissen bdis...@dissensoftware.com You're right! So, why bother and how does it improve performance? I guess we'll never know. It is likely proprietary. It improves performance by avoiding the extra level of indirection when translating the virtual address to a real address on a TLB miss. Doesn't have to reference the region-table entry. What? Addresses above 2 GiB need the region third index to translate them. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Where have the control blocks gone?
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Steve Comstock Sent: Monday, January 04, 2010 11:38 AM To: IBM-MAIN@bama.ua.edu Subject: Where have the control blocks gone? I've been debugging applications in z/OS and its predecessors since 1975, and feel I have a pretty good idea how to use a SYSUDUMP. But things are getting a little mysterious right now. I'm getting lots of dumps as I create and debug a new application, and suddenly I've noticed: * Instead of three (or more) SVRBs, there are only two * When I force an abend right after OPEN the DCB does not show up as formatted in the dump (I can find the storage location and figure it out, but I'm surprised at this development). Have there been some changes in SYSUDUMP formatting in recent years? (I'm running z/OS 1.10 currently). SNIP Check PARMLIB settings for dumps. Someone may have changed them on you. Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Where have the control blocks gone?
Steve: I have been debugging dumps since OS/360 days (around 1967). While it is possible to have three SVRBs as the last active elements in the RB queue, it is far more typical in the case of an ABEND in an application program to have only two SVRBs. This assumes that the application program is running under a PRB (as is typical). When it ABENDs, an SVRB is created under which the ABEND process (SVC D) will run, followed by a second SVRB under which SNAP (SVC 33x - 51 decimal) runs to produce the dump. In the case you cite, where there are three SVRBs, that would occur if the application (running under a PRB) were to call a system service (such as OPEN) and caused it to ABEND by passing bad parameters. While this latter case is certainly possible, it is usually the former case which is most likely to occur for an application ABEND. As for the DCB, I don't ever recall it being formatted in a dump, except possibly one produced by ABENDAID. It may not have even been formatted there either, as I personally had little contact with ABENDAID. I can't say I recall one being formatted in a SYSUDUMP. While it may have been present in the dump, I can only recall ever seeing it laid out as a block of data, but not formatted into firlds. I do know that the formatter in IPCS (TCBEXIT IECDAFMT - at least I think that's the right exit - if not, then it's probably IECIOFMT) will display the DCB as a block of data, but does not format its fields either. Mike Myers Mentor Services Corporation Steve Comstock wrote: I've been debugging applications in z/OS and its predecessors since 1975, and feel I have a pretty good idea how to use a SYSUDUMP. But things are getting a little mysterious right now. I'm getting lots of dumps as I create and debug a new application, and suddenly I've noticed: * Instead of three (or more) SVRBs, there are only two * When I force an abend right after OPEN the DCB does not show up as formatted in the dump (I can find the storage location and figure it out, but I'm surprised at this development). Have there been some changes in SYSUDUMP formatting in recent years? (I'm running z/OS 1.10 currently). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dead zone
Hi Mark and John, Your welcome. As always Bob Rogers was great when presenting this information. Doug On Mon, 4 Jan 2010 12:22:02 -0600, Mark Zelden mark.zel...@zurichna.com wrote: On Mon, 4 Jan 2010 11:32:36 -0600, Doug Henry doug_he...@usbank.com wrote: Here is an IBM document that answers many of the questions raised in this thread. http://www-03.ibm.com/servers/enable/site/education/wp/1d71a/1d71a.pdf Thanks! I've been trying to find something like this since last week when this thread started. I couldn't even determine what Java level had the function added when looking at the Java APARs. Mark -- Mark Zelden -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Movin' on Up!
You're obviously charging too much for your software if you can afford a place like this! Ok, just kidding, .. maybe ... :-) On Tue, Dec 22, 2009 at 11:24 AM, Edward Jaffe edja...@phoenixsoftware.comwrote: http://www.phoenixsoftware.com/newlocation.htm -- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Guy Gardoit z/OS Systems Programming -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TSSO and z/OS 1.11.
Hello Brian, I downloaded TSSO from the UPDATES section and it assembled fine. When TSSO traps a message on the syslog and fires off a command, I now get this from TSSO: TSSA305E TSSO COMMANDS MAY NOT BE ISSUED FROM THIS ENVIRONMENT Any ideas on what I may have missed or need to do? I do not really understand what TSSO is fussing about unless it is console related.. Here is a snippet from a 'D C' command; CDCUSYSA TYPE=SUBSYS STATUS=ACT-CDCU COMPID=TSSO ASID=0020 DEFINED=(*ALL) MATCHED=(*ALL) ATTRIBUTES ON CDCU AUTH=(MASTER) CDCUSYS1 TYPE=SUBSYS STATUS=ACT-CDCU COMPID=TSSO ASID=0020 DEFINED=(*ALL) MATCHED=(*ALL) ATTRIBUTES ON CDCU AUTH=(MASTER) CDCUSYS2 TYPE=SUBSYS STATUS=ACT-CDCU COMPID=TSSO ASID=0020 DEFINED=(*ALL) MATCHED=(*ALL) ATTRIBUTES ON CDCU AUTH=(MASTER) Any and all help would be much appreciated by you or someone you know who may have the key. Regards, Claude -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Brian Westerman Sent: Saturday, December 26, 2009 10:30 PM To: IBM-MAIN@bama.ua.edu Subject: Re: TSSO and z/OS 1.11. It had to be re-assembled, but appears to work correctly. Brian -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ADCD CD
David Logan wrote: HAHA yes, getting a backup strategy in place is a key deliverable Q1 of next year :) Since it is a development box, there hasn't been a lot of time given to it. Re another question, it's not running. I'm using another partition to get at the z/OS 1.4 volumes, and yes, I know it may be out of sync, but I'd rather it running and out of sync than not running. snip It might not run if out of sync. Or worse, it might *appear* to run but cause problems you don't see until they are widespread. You really need the library you lost _at the level you lost it_ to be certain all will be well. Mismatched levels of code are a support nightmare, too. -- John Eells z/OS Technical Marketing IBM Poughkeepsie ee...@us.ibm.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ADCD CD
I just had a thought, shouldn't you be able to use SMP/E GENERATE to re-build the target from the DLIBs, and then re-apply the maintenance? John Eells ee...@us.ibm.com 1/4/2010 2:39 PM David Logan wrote: HAHA yes, getting a backup strategy in place is a key deliverable Q1 of next year :) Since it is a development box, there hasn't been a lot of time given to it. Re another question, it's not running. I'm using another partition to get at the z/OS 1.4 volumes, and yes, I know it may be out of sync, but I'd rather it running and out of sync than not running. snip It might not run if out of sync. Or worse, it might *appear* to run but cause problems you don't see until they are widespread. You really need the library you lost _at the level you lost it_ to be certain all will be well. Mismatched levels of code are a support nightmare, too. -- John Eells z/OS Technical Marketing IBM Poughkeepsie ee...@us.ibm.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ADCD CD
Or, ACCEPT all maintenance that was applied, then GENERATE to a new target, then copy SYS1.LINKLIB back? Sure, it's no 10 second fix, but it should work. Scott Rowe scott.r...@joann.com 1/4/2010 2:43 PM I just had a thought, shouldn't you be able to use SMP/E GENERATE to re-build the target from the DLIBs, and then re-apply the maintenance? John Eells ee...@us.ibm.com 1/4/2010 2:39 PM David Logan wrote: HAHA yes, getting a backup strategy in place is a key deliverable Q1 of next year :) Since it is a development box, there hasn't been a lot of time given to it. Re another question, it's not running. I'm using another partition to get at the z/OS 1.4 volumes, and yes, I know it may be out of sync, but I'd rather it running and out of sync than not running. snip It might not run if out of sync. Or worse, it might *appear* to run but cause problems you don't see until they are widespread. You really need the library you lost _at the level you lost it_ to be certain all will be well. Mismatched levels of code are a support nightmare, too. -- John Eells z/OS Technical Marketing IBM Poughkeepsie ee...@us.ibm.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ADCD CD
Scott Rowe wrote: I just had a thought, shouldn't you be able to use SMP/E GENERATE to re-build the target from the DLIBs, and then re-apply the maintenance? snip It might be better to ACCEPT all the maintenance first so the generated library matches the rest of the system from the outset. If Dave has a running system this is a good way to go. Note that any usermods will need to be reinstalled unless they were also accepted (which is rarely if ever recommended). And he might need some STEPLIBs to the target system's MIGLIB and SASMMOD1 to get the right levels of SMP/E and HLASM. See the z/OS Program Directory for the release you're working on to see what STEPLIBs are needed if you are running from a different level. (e.g., for R11, see 6.1.3 Using High Level Assembler, Program Management Binder, and SMP/E for Subsequent z/OS V1.11.0 Installs.) -- John Eells z/OS Technical Marketing IBM Poughkeepsie ee...@us.ibm.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
On a z9 BC running z/OS 1.8, there is a noticeable (~2 minutes) pause in the IPL sequence while zFS initializes, accompanied by a non-scrollable message on the log that eventually does clear. We don't IPL that often so it is not a big deal for us. Since zFS is VSAM, we had to adjust our pack cloning procedures but once we worked out the kinks it became a non-issue. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ward, Mike S Sent: Monday, January 04, 2010 8:41 AM To: IBM-MAIN@bama.ua.edu Subject: hfs VS zfs Hello all, we are planning to migrate from z/os 1.7 to 1.11. In our planning we are trying to decide if we want to go to zfs instead of the hfs. Is there anyone out there that can think of any good reasons not to go to zfs when we do our upgrade? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad?
JCL has been criticized by those who have not mastered it since the time of OS PCP. I've been using JCL since February 1981. I started in this business as a JCL jockey in Production Support for a Canadian Railway Company that was building a new data centre in Toronto. While we were moving from Montreal to Toronto, we had a lot of spare time in the new Control Room. So, I spent a lot of time learning JCL, utilities, CLISTs, and ISPF (then SPF) dialogues. That helped jump-start my career when I moved on to a better job 6 months later. While kludgy, and (possibly) inelegant, I don't find JCL that difficult. Can it be improved? Yes. Will it be? Business Case it! But, stop b*tching about it. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
Is there anyone out there that can think of any good reasons not to go to zfs when we do our upgrade? I would do z/FS as a separate project, either before or after. Moving from an unsupported release level to a bigger jump than supported by IBM will be complex enough. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Regina REXX under W/XP
I am attempting to solve a problem I have with some special files that get used to drive some work under z/OS. So I thought the best thing to do is write the REXX code to run under Windows. So when I execute the code, REXX comes back and says: Error 13 running fully qualified path and file name, line 1: Invalid character in program Error 13.1 Invalid character in program ('ff'X) [Where fully qualified path and file name is the actual fully qualified Window's file name] I can not find any doc for Error 13 (I have the manual for Regina REXX printed and as a PDF). And I'm not seeing any odd characters in this file (editing it with NOTEPAD). Can anyone give me a clue as to where these errors are documented (I've been to sourceforge, no joy. No joy with http://www.rexxla.org/ either). Even better, what would cause this to think there is an X'FF' byte in this record (the following is actually the first several records)? /* Read CONFIG files for QC and insert today's date as needed. This initial area is to define all the things that must be set up for the rest of the exec to work. In particular the names of files and the handle to associate them with. */ Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
24 members of IBM-Main on Academia.edu
Dear IBM-Main members, There was a great reaction by the IBM-Main members to the new mailing list feature on Academia.edu. There are now 24 members of IBM-Main on Academia.edu listing 43 research interests such as Physics, Accelerator Physics and Particle Physics. They have also listed followers and photos. There are over a thousand people listing the same research interests as the IBM-Main members on Academia.edu, so there are lots of researchers for IBM-Main members to discover. To see the 24 members of IBM-Main on Academia.edu, and their research interests and papers, follow the link below: http://lists.academia.edu/See-members-of-IBM-Main Richard Dr. Richard Price, post-doc, Philosophy Dept, Oxford University. Founder of Academia.edu -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
2010/1/4 Thompson, Steve steve_thomp...@stercomm.com: So I thought the best thing to do is write the REXX code to run under Windows. So when I execute the code, REXX comes back and says: Error 13 running fully qualified path and file name, line 1: Invalid character in program Error 13.1 Invalid character in program ('ff'X) It's probably part of a Unicode Byte Order mark (BOM) X'FEFF' or X'FFFE', which Notepad will not show you. How did you create/save the file? Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
Just to be sure, you have written a REXX program for Windows before? You can make a program run and 'SAY' some jibberish on the screen? I don't want to assume too much and I'm not trying to be patronizing :) Are you opening a file inside the REXX? If so, how are you accessing that file? What are you using to edit the REXX program? What format is the file? UTF-8 or ASCII? What line-endings did you specify? Windows uses CR+LF, while UNIX uses LF, and z/OS uses steam-powered wooden cogs. If none of my suggestions work, I suggest including (at least part of) your code in a zip file, uploaded somewhere so we can download and inspect it. Alternatively, you may smoke some peyote and speak to Cowlishaw's spirit for the answers you seek. Wait, he's still alive?? Scott On Mon, Jan 4, 2010 at 12:29 PM, Thompson, Steve steve_thomp...@stercomm.com wrote: I am attempting to solve a problem I have with some special files that get used to drive some work under z/OS. So I thought the best thing to do is write the REXX code to run under Windows. So when I execute the code, REXX comes back and says: Error 13 running fully qualified path and file name, line 1: Invalid character in program Error 13.1 Invalid character in program ('ff'X) [Where fully qualified path and file name is the actual fully qualified Window's file name] I can not find any doc for Error 13 (I have the manual for Regina REXX printed and as a PDF). And I'm not seeing any odd characters in this file (editing it with NOTEPAD). Can anyone give me a clue as to where these errors are documented (I've been to sourceforge, no joy. No joy with http://www.rexxla.org/ either). Even better, what would cause this to think there is an X'FF' byte in this record (the following is actually the first several records)? /* Read CONFIG files for QC and insert today's date as needed. This initial area is to define all the things that must be set up for the rest of the exec to work. In particular the names of files and the handle to associate them with. */ Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony Harminc Sent: Monday, January 04, 2010 2:37 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Regina REXX under W/XP 2010/1/4 Thompson, Steve steve_thomp...@stercomm.com: So I thought the best thing to do is write the REXX code to run under Windows. So when I execute the code, REXX comes back and says: Error 13 running fully qualified path and file name, line 1: Invalid character in program Error 13.1 Invalid character in program ('ff'X) It's probably part of a Unicode Byte Order mark (BOM) X'FEFF' or X'FFFE', which Notepad will not show you. How did you create/save the file? SNIP I wrote it using TSO/ISPF. I then copied it via Windows (Copy/Paste operation) into Notepad -- paying particular attention to NOT capturing attribute bytes. Then I manually deleted all the follow-on bytes in Notepad specifically to avoid any such issue. Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thompson, Steve Sent: Monday, January 04, 2010 2:29 PM To: IBM-MAIN@bama.ua.edu Subject: Regina REXX under W/XP I am attempting to solve a problem I have with some special files that get used to drive some work under z/OS. So I thought the best thing to do is write the REXX code to run under Windows. So when I execute the code, REXX comes back and says: Error 13 running fully qualified path and file name, line 1: Invalid character in program Error 13.1 Invalid character in program ('ff'X) [Where fully qualified path and file name is the actual fully qualified Window's file name] I can not find any doc for Error 13 (I have the manual for Regina REXX printed and as a PDF). And I'm not seeing any odd characters in this file (editing it with NOTEPAD). Can anyone give me a clue as to where these errors are documented (I've been to sourceforge, no joy. No joy with http://www.rexxla.org/ either). Even better, what would cause this to think there is an X'FF' byte in this record (the following is actually the first several records)? snip Regards, Steve Thompson Any chance that the file is UTF? If so, it might have a BOM (Byte Order Mark) as the first two (or 4) bytes of the file. The BOM is 'FFFE'x for a UTF-16 little endian UTF file. A BOM of 'FE'x is for UTF-32 Little Endian files. Windows is Little Endian. IIRC, normal Windows programs know to look for and ignore BOMs. http://unicode.org/faq/utf_bom.html#BOM -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Scott Sent: Monday, January 04, 2010 2:44 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Regina REXX under W/XP Just to be sure, you have written a REXX program for Windows before? You can make a program run and 'SAY' some jibberish on the screen? SNIP Yes, a few years ago using NT. SNIP I don't want to assume too much and I'm not trying to be patronizing :) Are you opening a file inside the REXX? If so, how are you accessing that file? SNIP Yes, I am opening a file, but we haven't even gotten to the first line of executable code, which is TRACE I. snip What are you using to edit the REXX program? What format is the file? UTF-8 or ASCII? What line-endings did you specify? Windows uses CR+LF, while UNIX uses LF, and z/OS uses steam-powered wooden cogs. SNIP (editing it with NOTEPAD) SNIPPAGE Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
Go into Notepad and do a Save As... In the bottom pull-down box, is it ANSI or something else? Rather than using your TRACE statement in the REXX code, just call regina with the -tI flag. That should work, according to the documentation: http://voxel.dl.sourceforge.net/project/regina-rexx/regina-documentation/3.3/regina33.pdf Scott On Mon, Jan 4, 2010 at 12:47 PM, Thompson, Steve steve_thomp...@stercomm.com wrote: -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Scott Sent: Monday, January 04, 2010 2:44 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Regina REXX under W/XP Just to be sure, you have written a REXX program for Windows before? You can make a program run and 'SAY' some jibberish on the screen? SNIP Yes, a few years ago using NT. SNIP I don't want to assume too much and I'm not trying to be patronizing :) Are you opening a file inside the REXX? If so, how are you accessing that file? SNIP Yes, I am opening a file, but we haven't even gotten to the first line of executable code, which is TRACE I. snip What are you using to edit the REXX program? What format is the file? UTF-8 or ASCII? What line-endings did you specify? Windows uses CR+LF, while UNIX uses LF, and z/OS uses steam-powered wooden cogs. SNIP (editing it with NOTEPAD) SNIPPAGE Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Monday, January 04, 2010 2:46 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Regina REXX under W/XP -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thompson, Steve Sent: Monday, January 04, 2010 2:29 PM To: IBM-MAIN@bama.ua.edu Subject: Regina REXX under W/XP I am attempting to solve a problem I have with some special files that get used to drive some work under z/OS. So I thought the best thing to do is write the REXX code to run under Windows. So when I execute the code, REXX comes back and says: Error 13 running fully qualified path and file name, line 1: Invalid character in program Error 13.1 Invalid character in program ('ff'X) SNIPPAGE Any chance that the file is UTF? SNIP BINGO! I went back to notepad and did a Save AS and it showed UNICODE. So I changed it to ANSI and retried it and it took right off. Thanx. I'd been battling this between meetings for most of the morning. Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
If I were you, I'd ftp upload the file in BINARY back to the mainframe, then look at it using ISPF/BROWSE to see what the beginning of the file looks like. What version of Windows are you using? I tried the same as you on Win XP Pro, using notepad and doing a cut'n'paste from my Hummingbird emulator. The file did __not__ have a BOM, just as you said. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thompson, Steve Sent: Monday, January 04, 2010 2:48 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Regina REXX under W/XP -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Scott Sent: Monday, January 04, 2010 2:44 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Regina REXX under W/XP Just to be sure, you have written a REXX program for Windows before? You can make a program run and 'SAY' some jibberish on the screen? SNIP Yes, a few years ago using NT. SNIP I don't want to assume too much and I'm not trying to be patronizing :) Are you opening a file inside the REXX? If so, how are you accessing that file? SNIP Yes, I am opening a file, but we haven't even gotten to the first line of executable code, which is TRACE I. snip What are you using to edit the REXX program? What format is the file? UTF-8 or ASCII? What line-endings did you specify? Windows uses CR+LF, while UNIX uses LF, and z/OS uses steam-powered wooden cogs. SNIP (editing it with NOTEPAD) SNIPPAGE Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Regina REXX under W/XP
Steve, You may want to contact Mark Hessling directly, he is the person (last I heard anyway) that maintains it: Regina REXX Interpreter -- By Mark Hessling email: hessl...@lightlink.com Regards, Herman Stocker It is impossible to make anything foolproof, because fools are so ingenious. -- Robert Heinlein -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Thompson, Steve Sent: Monday, January 04, 2010 3:29 PM To: IBM-MAIN@bama.ua.edu Subject: Regina REXX under W/XP I am attempting to solve a problem I have with some special files that get used to drive some work under z/OS. So I thought the best thing to do is write the REXX code to run under Windows. So when I execute the code, REXX comes back and says: Error 13 running fully qualified path and file name, line 1: Invalid character in program Error 13.1 Invalid character in program ('ff'X) [Where fully qualified path and file name is the actual fully qualified Window's file name] I can not find any doc for Error 13 (I have the manual for Regina REXX printed and as a PDF). And I'm not seeing any odd characters in this file (editing it with NOTEPAD). Can anyone give me a clue as to where these errors are documented (I've been to sourceforge, no joy. No joy with http://www.rexxla.org/ either). Even better, what would cause this to think there is an X'FF' byte in this record (the following is actually the first several records)? /* Read CONFIG files for QC and insert today's date as needed. This initial area is to define all the things that must be set up for the rest of the exec to work. In particular the names of files and the handle to associate them with. */ Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - -- The sender believes that this E-mail and any attachments were free of any virus, worm, Trojan horse, and/or malicious code when sent. This message and its attachments could have been infected during transmission. By reading the message and opening any attachments, the recipient accepts full responsibility for taking protective and remedial action about viruses and other defects. The sender's employer is not liable for any loss or damage arising in any way from this message or its attachments. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
PCI and Auditors perceptions thereof
Trying to do some due diligence in planning some data transfers and getting really confused. Many seem to be saying that all FTP traffic has to be encrypted to meet PCI standards. And yet I cannot find any such statement in the PCI standards. But I did find a requirement for firewall packet inspection which, I am told, is impossible if the traffic is encrypted. Did I read that right? NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PCI and Auditors perceptions thereof
Hal, Try 1.1.5, 2.2.2 and 6.5.9 PCI DSS Requirement coupled with http://en.wikipedia.org/wiki/File_Transfer_Protocol#Security Most of the PCI stuff is done generally to allow for as much as possible instead of documenting each specific protocol and remediation. Although if you have engaged a PCI Qualified Security Assessor .. they should be able to point to everything the PCI folks care about. -Rob Schramm Sirius Computer Solutions -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
On Mon, 4 Jan 2010 12:07:22 -0800, Schwarz, Barry A barry.a.schw...@boeing.com wrote: On a z9 BC running z/OS 1.8, there is a noticeable (~2 minutes) pause in the IPL sequence while zFS initializes, accompanied by a non-scrollable message on the log that eventually does clear. We don't IPL that often so it is not a big deal for us. This is probably cause becaue the file system hadn't been properly shutdown. This causes the file system to be verified when starting. If you issue F OMVS,STOPPFS=ZFS before you finish shutting the system down, I think it will come up faster. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Richard Peurifoy Sent: Monday, January 04, 2010 3:27 PM To: IBM-MAIN@bama.ua.edu Subject: Re: hfs VS zfs On Mon, 4 Jan 2010 12:07:22 -0800, Schwarz, Barry A barry.a.schw...@boeing.com wrote: snip This is probably cause becaue the file system hadn't been properly shutdown. This causes the file system to be verified when starting. If you issue F OMVS,STOPPFS=ZFS before you finish shutting the system down, I think it will come up faster. -- Richard Is that needed even if I do F OMVS,SHUTDOWN ?? -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 360 programs on a z/10
On Mon, 4 Jan 2010 13:22:24 -0800 (PST), hanco...@bbs.cpcn.com wrote: Many government agencies add very hefty surcharges to collect calls placed by inmates in jails and prisons. They claim it's to cover security costs but IMHO it's just a way to raise revenue. Usually the families of prison inmates are quite poor. Even if they weren't poor to start with, the loss of the main breadwinner to prison makes them poor. Family contacts go a long way to reduce re-offending. Making such contacts harder increases the chances an inmate will re-offend when he gets out. Not smart policy. It's starting to backfire, though - now that cell phones are so widespread (and rates are dropping), more and more people choose to use their cell phone instead of the room phone. Smuggled cell phones is a security problem in prisons. They let gangsters conduct business while on the inside. Could it be that making such contacts harder decreases the chance that an inmate will re-offend when he gets out? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PCI and Auditors perceptions thereof
Packet inspection? Weird. You can, with FTPS, open up the control channel so the Firewall can monitor the control connection (port 21), which lets it dynamically assign ports that the server/client negotiate for the data connection (aka port 20). SFTP (SSH) is entirely encrypted and cannot have its activity monitored. Scott On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com wrote: Trying to do some due diligence in planning some data transfers and getting really confused. Many seem to be saying that all FTP traffic has to be encrypted to meet PCI standards. And yet I cannot find any such statement in the PCI standards. But I did find a requirement for firewall packet inspection which, I am told, is impossible if the traffic is encrypted. Did I read that right? NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
On Mon, 4 Jan 2010 15:30:36 -0600, McKown, John john.mck...@healthmarkets.com wrote: -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Richard Peurifoy Sent: Monday, January 04, 2010 3:27 PM To: IBM-MAIN@bama.ua.edu Subject: Re: hfs VS zfs On Mon, 4 Jan 2010 12:07:22 -0800, Schwarz, Barry A barry.a.schw...@boeing.com wrote: snip This is probably cause becaue the file system hadn't been properly shutdown. This causes the file system to be verified when starting. If you issue F OMVS,STOPPFS=ZFS before you finish shutting the system down, I think it will come up faster. -- Richard Is that needed even if I do F OMVS,SHUTDOWN I think so, but am not positive. We haven't been runnuing ZFS very long, and I have not experimented a great deal. If the file system has not been properly shutdown, you get the following sequence of messages for each file that was open: IOEZ00397I recovery statistics for ETC: IOEZ00391I Elapsed time was 14 ms IOEZ00392I 1 log pages recovered consisting of 2 records IOEZ00393I Modified 1 data blocks IOEZ00394I 1 redo-data records, 0 redo-fill records IOEZ00395I 0 undo-data records, 0 undo-fill records IOEZ00396I 0 not written blocks IOEZ00400I 0 blocks zeroed -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: hfs VS zfs
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Richard Peurifoy Sent: Monday, January 04, 2010 3:53 PM To: IBM-MAIN@bama.ua.edu Subject: Re: hfs VS zfs snip Is that needed even if I do F OMVS,SHUTDOWN I think so, but am not positive. We haven't been runnuing ZFS very long, and I have not experimented a great deal. If the file system has not been properly shutdown, you get the following sequence of messages for each file that was open: IOEZ00397I recovery statistics for ETC: IOEZ00391I Elapsed time was 14 ms IOEZ00392I 1 log pages recovered consisting of 2 records IOEZ00393I Modified 1 data blocks IOEZ00394I 1 redo-data records, 0 redo-fill records IOEZ00395I 0 undo-data records, 0 undo-fill records IOEZ00396I 0 not written blocks IOEZ00400I 0 blocks zeroed -- Richard Thanks for the info. I've never seen those messages. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Where have the control blocks gone?
Thompson, Steve wrote: -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Steve Comstock Sent: Monday, January 04, 2010 11:38 AM To: IBM-MAIN@bama.ua.edu Subject: Where have the control blocks gone? I've been debugging applications in z/OS and its predecessors since 1975, and feel I have a pretty good idea how to use a SYSUDUMP. But things are getting a little mysterious right now. I'm getting lots of dumps as I create and debug a new application, and suddenly I've noticed: * Instead of three (or more) SVRBs, there are only two * When I force an abend right after OPEN the DCB does not show up as formatted in the dump (I can find the storage location and figure it out, but I'm surprised at this development). Have there been some changes in SYSUDUMP formatting in recent years? (I'm running z/OS 1.10 currently). SNIP Check PARMLIB settings for dumps. Someone may have changed them on you. Regards, Steve Thompson Nope. -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques == Ask about being added to our opt-in list: == == * Early announcement of new courses == == * Early announcement of new techincal papers == == * Early announcement of new promotions == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
GSE Security Meeting 4th Feb 2010, London UK
All, The next meeting of the GSE Enterprise Security Working group will take place on Thursday 4th February at the Logicalis Office in Central London. The address for the venue is:- 2nd Floor 18 King William Street London EC4N 7BP Please find below the agenda for the day. Would you reply to this e-mail if you would like to attend. Regards Mark AGENDA 09:00 09:30 Arrive at meeting coffee 09:30 10:00 Introduction GSE Working Group Business: · Membership · Annual Conference · Future Venues · Future Topics 10:00 11:00 CICS Security Expanded Following on from her well received session at the GSE conference, Julie will delve deeper into some of the areas of CICS security that caused most discussion. Julie-Ann Williams (Millenia) 11:00 11:15 Coffee 11:15 12:30 Time for a spring clean of your RACF database? This session will provide you with practical hints and tips on cleaning up your RACF database and how to keep it clean. Rob van Hoboken (IBM) 12:30 13:30 Lunch 13:30 14:00 RACF Authorisation Checking The Jigsaw Puzzle This is an interactive session to refresh or even test your knowledge. 14:00 15:00 z/OS Unix Security This session contains the following highlights:- § Describe best practices for UID and GID definition § Understand what superuser means in the z/OS implementation and how to minimise its use § Implement control of z/OS Unix logical resources § Explain why unowned files and directories are to be avoided § Discuss extended ACLs pitfalls Paul Arnerich (TSD UK) 15:00 15:15 Coffee 15:15 16:15 TBC 16:15 16:30 Round Up Finish -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Where have the control blocks gone?
Mike Myers wrote: Steve: I have been debugging dumps since OS/360 days (around 1967). While it is possible to have three SVRBs as the last active elements in the RB queue, it is far more typical in the case of an ABEND in an application program to have only two SVRBs. This assumes that the application program is running under a PRB (as is typical). When it ABENDs, an SVRB is created under which the ABEND process (SVC D) will run, followed by a second SVRB under which SNAP (SVC 33x - 51 decimal) runs to produce the dump. In the case you cite, where there are three SVRBs, that would occur if the application (running under a PRB) were to call a system service (such as OPEN) and caused it to ABEND by passing bad parameters. While this latter case is certainly possible, it is usually the former case which is most likely to occur for an application ABEND. Right. Went back to my notes and that's what I have; should have checked first. My mantra has been third RB from the bottom is the villain and I knew it could be (and usually is) a PRB, but got tangled up in recall as third SVRB. As for the DCB, I don't ever recall it being formatted in a dump, except possibly one produced by ABENDAID. It may not have even been formatted there either, as I personally had little contact with ABENDAID. I can't say I recall one being formatted in a SYSUDUMP. While it may have been present in the dump, I can only recall ever seeing it laid out as a block of data, but not formatted into firlds. Ah, the ever-wonderful firlds. :-) Anyway, you're right on this count, too. Guess I've been concentrating too deeply on one area and not paying attention to what I already know but mis-remembered. Thanks for your note. I'll go back to my code now. I do know that the formatter in IPCS (TCBEXIT IECDAFMT - at least I think that's the right exit - if not, then it's probably IECIOFMT) will display the DCB as a block of data, but does not format its fields either. Mike Myers Mentor Services Corporation Steve Comstock wrote: I've been debugging applications in z/OS and its predecessors since 1975, and feel I have a pretty good idea how to use a SYSUDUMP. But things are getting a little mysterious right now. I'm getting lots of dumps as I create and debug a new application, and suddenly I've noticed: * Instead of three (or more) SVRBs, there are only two * When I force an abend right after OPEN the DCB does not show up as formatted in the dump (I can find the storage location and figure it out, but I'm surprised at this development). Have there been some changes in SYSUDUMP formatting in recent years? (I'm running z/OS 1.10 currently). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques == Ask about being added to our opt-in list: == == * Early announcement of new courses == == * Early announcement of new techincal papers == == * Early announcement of new promotions == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PCI and Auditors perceptions thereof
Until recently, I was using FTPS to send data from MVS to zLinux then it broke. Apparently somebody (re)configured a firewall so it now stops the AUTH TLS portion of the negotiation or something the symptom is the authentication negotiation fails... I'm told it's because the firewall mangles the digital certificate. SFTP works fine using USS... but I don't have USS on all the MVS systems I need to send data from... Is there a way to run SFTP (FTP/SSH) from MVS without USS? (If I can do that, I can avoid tracking down the firewall people to get the FTP/TLS thing working I PREFER to use SFTP, but FTPS is acceptable... and I want the process to be the same on all the MVS systems, not sftp here, ftps there...) Cheers On Mon, Jan 4, 2010 at 13:50, Scott sc...@aitrus.org wrote: Packet inspection? Weird. You can, with FTPS, open up the control channel so the Firewall can monitor the control connection (port 21), which lets it dynamically assign ports that the server/client negotiate for the data connection (aka port 20). SFTP (SSH) is entirely encrypted and cannot have its activity monitored. Scott On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com wrote: Trying to do some due diligence in planning some data transfers and getting really confused. Many seem to be saying that all FTP traffic has to be encrypted to meet PCI standards. And yet I cannot find any such statement in the PCI standards. But I did find a requirement for firewall packet inspection which, I am told, is impossible if the traffic is encrypted. Did I read that right? NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
In listserv%201001031756492921.0...@bama.ua.edu, on 01/03/2010 at 05:56 PM, Paul Gilmartin paulgboul...@aim.com said: Why are there TPUT/TGET/PUTLINE/GETLINE (whatever) rather than just doing QSAM I/O to SYSTSPRT and SYSTSIN? Because they provide functionality not present in QSAM. And JCL and Rexx both leave an undefined symbol as it appeared in the source, with no warning. The first is necessary because symbols were an afterthought and IBM overloaded the when they added symbols. Both behaviors are actually useful. I take it that you adhere to the philosophy of always enabling NOVALUE in Rexx? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
In listserv%201001031108554432.0...@bama.ua.edu, on 01/03/2010 at 11:08 AM, Paul Gilmartin paulgboul...@aim.com said: Does anyone know a plausible design rationale for the current restrictions on symbol substitution? The fact that things were added after the original design, including symbols. Rather, I ascribe it to Conway's law at its perniciousest. Design and coding of parsers for the various JCL operands was parceled out to different programmers. Each could decide independently whether to support symbol substitution. Most of the coding was done before there were symbols. Once again, the deficiencies I perceive in Rexx are: OS issues rather than REXX issues. If z/OS had the suuport it would be easy for Rexx to exploit it. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
In 0377b9a583fd0e4aacd676ee33ee994b2aa61...@sdkmail13.emea.sas.com, on 01/03/2010 at 07:01 PM, Lindy Mayfield lindy.mayfi...@ssf.sas.com said: This is what Fred Brooks said about JCL: As in his book, there are statements there that suggest he was not in touch with his own projects. Whereas what you really want is a schedule time operation in whatever language you're working in. That, of course, assumes that the job only uses programs written in a single language. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
In a6d1k5hsqsjkmo5c9ues4h18tktqlta...@4ax.com, on 01/03/2010 at 11:28 AM, Clark Morris cfmpub...@ns.sympatico.ca said: JCL was designed for OS360 on a 256K real machine (the original design point for PCP was 64K). 256 KiB? We ran OS/360 PCP on a 128 KiB machine[1]. With 256 KiB we were able to run MFT II for production. Virtually all of the printers were upper case only and at least in my shop it was a struggle to get a printer that printed the special characters correctly Why? The TN train was available[2] for the 1403-N1. Did you have only 1443 printers or 1403 printers older than the Nancy One? Lower case was out of the question. Why? [1] Well, we did IPL on a 64 KiB machine, but not for production. [2] Yes, it was slower than AN, HN or PN. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PCI and Auditors perceptions thereof
Donald, what troubleshooting have you done? I'm happy to help you work through the issues, as there's a few solutions/workarounds for you to try. I've worked through our own firewall issue and even some instances where two firewalls were at play. It's not mangling the Digital Certificate. Rather, it cannot monitor the control channel and the client/server connection drops after negotiation. Scott On Mon, Jan 4, 2010 at 2:54 PM, Donald Russell russell@gmail.comwrote: Until recently, I was using FTPS to send data from MVS to zLinux then it broke. Apparently somebody (re)configured a firewall so it now stops the AUTH TLS portion of the negotiation or something the symptom is the authentication negotiation fails... I'm told it's because the firewall mangles the digital certificate. SFTP works fine using USS... but I don't have USS on all the MVS systems I need to send data from... Is there a way to run SFTP (FTP/SSH) from MVS without USS? (If I can do that, I can avoid tracking down the firewall people to get the FTP/TLS thing working I PREFER to use SFTP, but FTPS is acceptable... and I want the process to be the same on all the MVS systems, not sftp here, ftps there...) Cheers On Mon, Jan 4, 2010 at 13:50, Scott sc...@aitrus.org wrote: Packet inspection? Weird. You can, with FTPS, open up the control channel so the Firewall can monitor the control connection (port 21), which lets it dynamically assign ports that the server/client negotiate for the data connection (aka port 20). SFTP (SSH) is entirely encrypted and cannot have its activity monitored. Scott On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com wrote: Trying to do some due diligence in planning some data transfers and getting really confused. Many seem to be saying that all FTP traffic has to be encrypted to meet PCI standards. And yet I cannot find any such statement in the PCI standards. But I did find a requirement for firewall packet inspection which, I am told, is impossible if the traffic is encrypted. Did I read that right? NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
On Mon, 4 Jan 2010 11:46:20 -0500, Shmuel Metz (Seymour J.) wrote: coding of parsers for the various JCL operands was parceled out to different programmers. Each could decide independently whether to support symbol substitution. Most of the coding was done before there were symbols. Does that mean before there were PROCs? PROCs are little use without symbols. Or was everything done with overrides? Once again, the deficiencies I perceive in Rexx are: OS issues rather than REXX issues. If z/OS had the suuport it would be easy for Rexx to exploit it. For most of what I cited, JCL/initiator exploits it. That suggests that something is in initiator that would more properly be in allocation. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Where have the control blocks gone?
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Steve Comstock Sent: Monday, January 04, 2010 4:27 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Where have the control blocks gone? Thompson, Steve wrote: -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Steve Comstock Sent: Monday, January 04, 2010 11:38 AM To: IBM-MAIN@bama.ua.edu Subject: Where have the control blocks gone? I've been debugging applications in z/OS and its predecessors since 1975, and feel I have a pretty good idea how to use a SYSUDUMP. But things are getting a little mysterious right now. I'm getting lots of dumps as I create and debug a new application, and suddenly I've noticed: * Instead of three (or more) SVRBs, there are only two * When I force an abend right after OPEN the DCB does not show up as formatted in the dump (I can find the storage location and figure it out, but I'm surprised at this development). Have there been some changes in SYSUDUMP formatting in recent years? (I'm running z/OS 1.10 currently). SNIP Check PARMLIB settings for dumps. Someone may have changed them on you. Regards, Steve Thompson Nope. SNIP Yeah, I was deep in thought on IPCS -- somehow the SYSUDUMP didn't register right. And then I have to remember, we have written our own formatting tools for various CBs... Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PCI and Auditors perceptions thereof
The troubleshooting *I've* done is quite minimal. I'm not an MVS sys prog. I developed a TSO clist (REXX) that runs as a batch process (PGM=IKJEFT1A) to send files to a zLinux system. It was all working fine, I saw the messages about successful negotiation, and the transfer continued successfully. A few weeks ago, that changed... now I get negotiation failed, and the required authentication causes FTP to exit. (At first I thought my cert had expired... I went through all that...) In reporting this to our MVS people, they did a trace and determined the cause to be a firewall issue. They say the cert is being mangled... you say it's due to not being able to monitor the control channel. FTP fails with TLS negotion Failed. Now that the holidays are past, I hope to get to the correct people to find out when things changed. As I mentioned, this was working fine at one point. I'm told the firewall has to be specifically configured for FTP/SSL... and those requests were never done... (So, why did it ever work? hmmm) On Mon, Jan 4, 2010 at 15:29, Scott sc...@aitrus.org wrote: Donald, what troubleshooting have you done? I'm happy to help you work through the issues, as there's a few solutions/workarounds for you to try. I've worked through our own firewall issue and even some instances where two firewalls were at play. It's not mangling the Digital Certificate. Rather, it cannot monitor the control channel and the client/server connection drops after negotiation. Scott On Mon, Jan 4, 2010 at 2:54 PM, Donald Russell russell@gmail.comwrote: Until recently, I was using FTPS to send data from MVS to zLinux then it broke. Apparently somebody (re)configured a firewall so it now stops the AUTH TLS portion of the negotiation or something the symptom is the authentication negotiation fails... I'm told it's because the firewall mangles the digital certificate. SFTP works fine using USS... but I don't have USS on all the MVS systems I need to send data from... Is there a way to run SFTP (FTP/SSH) from MVS without USS? (If I can do that, I can avoid tracking down the firewall people to get the FTP/TLS thing working I PREFER to use SFTP, but FTPS is acceptable... and I want the process to be the same on all the MVS systems, not sftp here, ftps there...) Cheers On Mon, Jan 4, 2010 at 13:50, Scott sc...@aitrus.org wrote: Packet inspection? Weird. You can, with FTPS, open up the control channel so the Firewall can monitor the control connection (port 21), which lets it dynamically assign ports that the server/client negotiate for the data connection (aka port 20). SFTP (SSH) is entirely encrypted and cannot have its activity monitored. Scott On Mon, Jan 4, 2010 at 1:01 PM, Hal Merritt hmerr...@jackhenry.com wrote: Trying to do some due diligence in planning some data transfers and getting really confused. Many seem to be saying that all FTP traffic has to be encrypted to meet PCI standards. And yet I cannot find any such statement in the PCI standards. But I did find a requirement for firewall packet inspection which, I am told, is impossible if the traffic is encrypted. Did I read that right? NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send
Re: Where have the control blocks gone?
Steve: Good mantra third RB I've used the same one many times when teaching dump reading. Mike Steve Comstock wrote: Mike Myers wrote: Steve: I have been debugging dumps since OS/360 days (around 1967). While it is possible to have three SVRBs as the last active elements in the RB queue, it is far more typical in the case of an ABEND in an application program to have only two SVRBs. This assumes that the application program is running under a PRB (as is typical). When it ABENDs, an SVRB is created under which the ABEND process (SVC D) will run, followed by a second SVRB under which SNAP (SVC 33x - 51 decimal) runs to produce the dump. In the case you cite, where there are three SVRBs, that would occur if the application (running under a PRB) were to call a system service (such as OPEN) and caused it to ABEND by passing bad parameters. While this latter case is certainly possible, it is usually the former case which is most likely to occur for an application ABEND. Right. Went back to my notes and that's what I have; should have checked first. My mantra has been third RB from the bottom is the villain and I knew it could be (and usually is) a PRB, but got tangled up in recall as third SVRB. As for the DCB, I don't ever recall it being formatted in a dump, except possibly one produced by ABENDAID. It may not have even been formatted there either, as I personally had little contact with ABENDAID. I can't say I recall one being formatted in a SYSUDUMP. While it may have been present in the dump, I can only recall ever seeing it laid out as a block of data, but not formatted into firlds. Ah, the ever-wonderful firlds. :-) Anyway, you're right on this count, too. Guess I've been concentrating too deeply on one area and not paying attention to what I already know but mis-remembered. Thanks for your note. I'll go back to my code now. I do know that the formatter in IPCS (TCBEXIT IECDAFMT - at least I think that's the right exit - if not, then it's probably IECIOFMT) will display the DCB as a block of data, but does not format its fields either. Mike Myers Mentor Services Corporation Steve Comstock wrote: I've been debugging applications in z/OS and its predecessors since 1975, and feel I have a pretty good idea how to use a SYSUDUMP. But things are getting a little mysterious right now. I'm getting lots of dumps as I create and debug a new application, and suddenly I've noticed: * Instead of three (or more) SVRBs, there are only two * When I force an abend right after OPEN the DCB does not show up as formatted in the dump (I can find the storage location and figure it out, but I'm surprised at this development). Have there been some changes in SYSUDUMP formatting in recent years? (I'm running z/OS 1.10 currently). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 360 programs on a z/10
-snip--- Note that both Patton and Montgomery agreed that the best approach was a spearhead across Europe into Germany. They disagreed on who should lead it, each wanted to be the sole leader of the action. Eisenhower overruled both and ordered a broad approach. Was Eisenhower or Patton correct? Again, Hindsight is 20/20. And we do know that Eisenhower was correct enough. And that's what really counts. Is it really enough??? If *many* more lives could have been saved by doing things a different way and *still* succeeding... would that *not* have been better??? You are unbelievable. Do you really wish that Europe dithered until after Germany had the atomic bomb? He implied nothing of the kind. The question was - if, say, Patton and Montgomery were right, that the war could have been won quicker with fewer casualties - wouldn't that have been better? unsnip-- Since none of us were likely there, and since the principal decision makers have all met their maker, it doesn't really matter. I'm sure that these are all questions that caused a LOT of lost sleep, not to mention the political concerns. War itself is a stupendous waste of men and material; anything that reduces the amount of these costs is goodness. And having been involved in combat, in Viet Nam, I can tell you that the suffering inflicted on non-combatants in the area is emminently more terrible and senseless. Now let's get back on-topic. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PCI and Auditors perceptions thereof
The following specifies what you can and can't do with FTP (Link is from the PCI SSC site - FAQ section): http://selfservice.talisma.com/display/2n/index.aspx?c=58cpc=MSdA03B2IfY15uvLEKtr40R5a5pV2lnCUb4i1Qj2q2gcid=81cat=catURL=r=0.577978789806366 Is it permissible to use FTP if proper security measures are implemented? PCI DSS requirement 1.1.7 states that any risky protocols such as FTP must have documentation in place that defines the business justification for use and that appropriate security measures must be implemented. For example, secure FTP should be used, and FTP passwords and TELNET passwords used for non-console administrative access should be encrypted in transmission and in storage as prescribed in PCI DSS requirement 8.4 and 2.3 respectively. The documentation as well as implemented security measures should be reviewed by a Qualified Security Assessor (QSA) to ensure full effectiveness. The QSA will determine, among other things, that the selected approach is robust enough to withstand common attacks. For questions about whether a specific implementation is consistent with the standard or is compliant with a requirement, please contact a Qualified Security Assessor (QSA). A list of QSAs can be found at www.pcisecuritystandards.org/pdfs/pci_qsa_list.pdfhttp://www.pcisecuritystandards.org/pdfs/pci_qsa_list.pdf. As Rob Schramm noted, FTP is called out in the PCI DSS 1.2.1 Standard: Requirement 1.1.5, and Test 1.1.5b 1.1.5.b Identify insecure services, protocols, and ports allowed; and verify they are necessary and that security features are documented and implemented by examining firewall and router configuration standards and settings for each service. An example of an insecure service, protocol, or port is FTP, which passes user credentials in clear-text. Requirement 2.2.2 and Test 2.2.2 2.2.2 For a sample of system components, inspect enabled system services, daemons, and protocols. Verify that unnecessary or insecure services or protocols are not enabled, or are justified and documented as to appropriate use of the service. For example, FTP is not used, or is encrypted via SSH or other technology. More generally however, its ALL of Requirement 4 of the standard applies: Requirement 4: Encrypt transmission of cardholder data across open, public networks e.g. Requirement 4.1 and Test 4.1.a 4.1.a Verify the use of encryption (for example, SSL/TLS or IPSEC) wherever cardholder data is transmitted or received over open, public networks * Verify that strong encryption is used during data transmission * For SSL implementations: * Verify that the server supports the latest patched versions. * Verify that HTTPS appears as a part of the browser Universal Record Locator (URL). * Verify that no cardholder data is required when HTTPS does not appear in the URL. * Select a sample of transactions as they are received and observe transactions as they occur to verify that cardholder data is encrypted during transit. * Verify that only trusted SSL/TLS keys/certificates are accepted. * Verify that the proper encryption strength is implemented for the encryption methodology in use. (Check vendor recommendations/best practices.) -- ...phsiii Phil Smith III p...@voltage.com Voltage Security, Inc. www.voltage.com (703) 476-4511 (home office) (703) 568-6662 (cell) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Why is JCL so bad was Re: Basic question on passing JCL set symbol to proc
On 4 Jan 2010 15:22:46 -0800, in bit.listserv.ibm-main you wrote: In a6d1k5hsqsjkmo5c9ues4h18tktqlta...@4ax.com, on 01/03/2010 at 11:28 AM, Clark Morris cfmpub...@ns.sympatico.ca said: JCL was designed for OS360 on a 256K real machine (the original design point for PCP was 64K). 256 KiB? We ran OS/360 PCP on a 128 KiB machine[1]. With 256 KiB we were able to run MFT II for production. Virtually all of the printers were upper case only and at least in my shop it was a struggle to get a printer that printed the special characters correctly Why? The TN train was available[2] for the 1403-N1. Did you have only 1443 printers or 1403 printers older than the Nancy One? The trains were available. The management desire for the fastest print speed dictated the 48 character chain. I think that it was the 1980's before we got the QNC chain which had 60 characters where 45 of them were in all of the sets (5 I think) and 15 were scattered 3 to a set. The name and exact details are subject to hazy recollection. In any case the problems with obtaining the chains were management objectives and values, not technical ones. Lower case was out of the question. Why? Low print speed, no programs to take advantage of it and no perceived business value. [1] Well, we did IPL on a 64 KiB machine, but not for production. [2] Yes, it was slower than AN, HN or PN. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html