Re: RMM EDGRRPTE printing Problem
Mike, Thanks for the info. I am printing to z/VM. I have a job that uses EDGRRPTE for some reports then produces a report14 that I have modified. The o/p from the EDGRRPTE has printer control chars in column 2 and second report has printer control chars in column 1. K00080 DFSZOSAD.DR.PRODZOS.ZARES1 *1 1 K00130 USZOS109.DR.Z9RES1 *1 1 - End of Report. 19 En 1 DFSMSrmm MACRO 4 INTERNAL USE ONLY Movement Repor EDGRPT14 from location M4 - Volume BIN Vol- DSN- Serial Data Set NameNumber Seq. Seq. -- --- - J00186 DFSVMD.LOCAL.DLY.SARES1*1 1 - End of Report. 1 Ent 1Movement Report by Volume Serial- 1 -2010/04/19 1 To Destination / From Location OFFDRM4ATL Job Name Volume Volseq# Dataset Name -- --- -- DFSMSHSM J00305 1 SMSHSM.COPY.HMIGTAPE.DATASET JCL: //EXTRPDT EXEC PGM=IKJEFT01,DYNAMNBR=99,REGION=4096K //SYSTSPRT DD SYSOUT=X //SYSPRINT DD SYSOUT=X //SORTIN DD DISP=SHR,DSN=RMM.HSKP.EXTRACT //SORTOUT DD DSN=TEMP01,DISP=(,PASS,DELETE), // SPACE=(CYL,(200,20),RLSE),UNIT=SYSALLDA, // DCB=*.SORTIN //SYSINDD DSN=TEMP02,DISP=(,PASS,DELETE), // SPACE=(TRK,(1,1),RLSE),UNIT=SYSALLDA, // DCB=(LRECL=80,BLKSIZE=3120,RECFM=FB) //SYSOUT DD SYSOUT=X //REPORT14 DD SYSOUT=Y //SYSTSIN DD * EX 'SYS1.SEDGEXE1(EDGRRPTE)' - '054 MACRO 4 INTERNAL USE ONLY' //* //WRITE1 EXEC PGM=ICETOOL,REGION=0M //SYSPRINT DD SYSOUT=X //TOOLMSG DD SYSOUT=X //DFSMSG DD SYSOUT=X //INDD DD DSN=RMM.HSKP.EXTRACT, //DISP=SHR //OUTDDDD SYSOUT=Y //TEMP DD UNIT=SYSALLDA,SPACE=(TRK,(5,25)) //TOOLIN DD * SORT FROM(INDD) TO(TEMP) USING(INCL) DISPLAY FROM(TEMP) LIST(OUTDD) - TITLE('Movement Report by Volume Serial') - PAGE DATE(4MD/) TIME - HEADER('Job Name') ON(23,8,CH) - HEADER('Volume') ON(32,6,CH) - HEADER('Volseq#') ON(39,4,CH) - HEADER('Dataset Name') ON(44,44,CH) - HEADER('Create Date') ON(89,10,CH) - BTITLE('To Destination / From Location') - BREAK(5,18,CH) - BTOTAL('') - BLANK - TOTAL('REMOVABLE MEDIA MANAGER') //INCLCNTL DD DSN=INCL,DISP=(OLD,PASS) /*...@02c*/ Crispin Hugo Systems Programmer Macro 4 Limited Direct Line: +44 (0)1293 872121, Switchboard: +44 (0)1293 872000, Fax: +44 (0)1293 872001 A Division of the UNICOM Group of Companies www.macro4.com Macro 4 Registered office :The Orangery, Turners Hill Road, Worth, Crawley, West Sussex, RH10 4SS Registered in England no. 927588 Please consider the environment and THINK before you print this email. Email Disclaimer -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mike Wood Sent: 19 April 2010 17:58 To: IBM-MAIN@bama.ua.edu Subject: Re: RMM EDGRRPTE printing Problem Crispin, The reports are LRECL=133,RECFM=FBA - so first char is a ANSI print control character when the records are written by the exec EDGRRPTE. If you are creating a DASD data set then subsequently printing that, be sure the utility you use understands there is an existing print control character in each record. Similarly, if created as a SYSOUT file and now you
Re: Internal (program) start of an STC - MGCRE vs. ASCRE
This is far simplier than a RACROUTE REQUEST=VERIFY or IRRSIA00 in that it does not require supervisor state or APF authorization, but the JrEnvDirty seems to imply the program must be program controlled. I know what that means for PDS resident programs, but not HFS resident programs. At least as far as I can tell from the manual. There is an extended attribute called program control which you set with extattr +p pathname. You'd need READ on BPX.FILEATTR.PROGCTL FACILITY class profile to be allowed to set that bit. If the address space needs to stay clean, all modules loaded must have been loaded from a program controlled library or must have the program control extended attribte set if loaded from the file system. -- Peter Hunkeler Credit Suisse -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: COUPLE DATA SET TIME STAMPS
On Mon, 19 Apr 2010 05:14:09 -0500, Barbara Nitz wrote: You may run into problems with the LOGR CDS. Check out II5 if that applies to you. IIRC, the problem was going forward in time for LOGR. Where can I find II5? Technical help database answer I get is: No documents match your query. Please revise your search criteria. -- Zaromil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: COUPLE DATA SET TIME STAMPS
Where can I find II5? Technical help database answer I get is: No documents match your query. Please revise your search criteria. Strange. Maybe I mistyped the number. Search SIS for LOGR Y2K. This problem came up a lot in Y2K testing. I think yesterdays' search gave me only a handful of hits. Regards, Barbara -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: (slightly OT - Linux) Did IBM bet on the wrong OS?
And what would have been the alternative OS for IBM to have backed? OS/2??? On Mon, Apr 19, 2010 at 10:06 PM, Ed Gould ps2...@yahoo.com wrote: http://www.informationweek.com/news/software/open_source/showArticle.jhtml?articleID=224400309 Linux Graybeards? Yes, But Also A Wisdom Circle -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Bob Goolsby bob.gool...@gmail.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM QUESTION - MOVING TO DASD FROM TAPE - ML2
I did exactly this about two years ago. Yes you can do it. HSM is not very good at it (DASD backups) though. You may want to consider alternatives if you have particularly long-term requirements for keeping your backup data. My reasons were that by then only HSM used tape, and we wanted to get rid of the tape units, to save floor space, power usage, and maintenance costs. The other, most compelling, reason was DR. Our main disk unit is a DS6800 with PPRC to a remote site. It has around 25% FC disk and 75% FATA - cheapear because they're (supposedly) slower, but a blind man would be glad to notice, even they are much quicker than the RVA we had before). Even in asynchronous mode, the PPRC replicates in near-real time, with a latency or around 7 to 8 seconds. There's no way I can replicate tape data in step with that. We've now got our DR cutover - including all network switching, NAT changes etc - down to around 20 minutes all-up, so we're available for end-users to get on and do real work in that time. When we were using tape (even though it was virtual tape) we were hindered by the possibility that ML2 and backup data may not have been replicated yet (in which case we'd have to wait, sometimes up to four hours, for that to happen) or in the event of a real disaster, we might be in the position where the ML2 and/or backup data would not get replicated at all, and we'd have a lot of repairs to make on the production system. For example, if the outage happened between the ML1/Backup data being written and before it (completed) being replicated - you won't have the data, but the HSM CDS's think you have it. All extra work in a DR when you really really want to keep things as simple as possible. The first thing I did was increase the size of the ML1 pool and stop creating ML2 data, leaving it for the rest of its life on ML1 instead. All of the MLx data is now replicated to the DR site over the PPRC. But this is the easy bit really. I wouldn't try putting ML2 on DASD, I can't really think of a good reason to do that. To do backups to DASD is a bit more painful. You have to pre-define daily a set of daily backup volumes - HSM cannot dynamically add them as it will for tape. You need one volume for each backup task that you want to run, plus a couple more in the event that one fills. If one fills during the backup run and no more are available, the backup process issues messasges about the task waiting for a volume, hangs, and moves on to the next task, (which may or may not do the same, depending on whether other tasks have finished and freed up a volume with space on). I've not found a way to recover from this other than shutting down HSM (cancelling), adding volumes, and restarting. You'll need to keep an eye on the backup volume usage, as HSM won't do it for you, or do any housekeeping on them other than EXPIREBV processing. In addition, HSM does not seem to apply any kind of intelligent selection of volumes from the daily set, e.g., which ones have the most space.. It just uses the fi! rst one in the list and goes from there, so the spare capacity you've provided for contingency could (probably will) sit there most of the time 90 or more % empty for most of the time, which might waste precious disk space if you don't have a lot spare. I've also noticed that, for some reason I've not been able to explain, DASD backup seems to take about twice as long as it did on tape. My backup window went from around 1.5 hours on tape, to 2.5-3.0 hours on DASD. I always think there are about three main reasons why you do backups: - DR, for recovering the entire system; - 'idiot' backups, for local, small-volume recoveries of corrupted or accidentally deleted files; - archives, for long-term, usually out-of-sight-out-of-mind copies. So in my case the DR requirement is satisfied by PPRC, and the archives by the combination of PPRC and data management/retention policies in SMS/HSM. The data corruption/accidental deletion is still an issue however, since these kinds of actions will get replicated with PPRC. At a dataset level I mitigate for these with additional backup versions, but at the volume level it's still a problem for certain volumes, notably the HSM daily backup volumes. So I dump those and a few selected other ones daily (at the moment, still to tape, although I'm probably going to change that to DASD too). The difference is, I don't care about replicating that tape data now, there's no need, as it all gets junked and re-written each day anyway. The parameters you've identified are about right, I think. I've got: SETSYS BACKUP( + DASD + INUSE( + RETRY(Y) + DELAY(5) + SERIALIZATION(PREFERRED) + ) + ) SETSYS DSBACKUP( + DASD + TAPE( + TASKS(0) + ) + ) SETSYS TAPEMIGRATION( + NONE + ) And loads of
Re: Link Failure IOS581E
Brian, Thanks, this information will help. Lizette Brian Peterson Wrote: The group that handles the Cisco says they are not seeing any errors on the Cisco. Some fluttering, but no failures. I would call fluttering a failure (albeit one which was recovered). My opinion. Ask your Cisco team to show you the FICON log from the MDS 9509 devices (both local and remote). In similar circumstances on our system, we saw FICON events in the logs in the MDS 9509 devices that exactly correlated to IOS581E messages on z/OS. On our version of Cisco Device Manager 3.3(1c), the path to view the FICON events was Logs -- Switch Resident -- FICON Link Incidents Brian On Mon, 19 Apr 2010 17:46:54 -0400, Lizette Koehler wrote: I am trying to understand what this message is telling me and if it is serious. IOS581E LINK FAILED REPORTING CHPID=11 328 INCIDENT UNIT TM=0MDS9K/509 SER=CSC00-0989C3 IF=00E4 IC=03 INCIDENT UNIT LIF=E4 ATTACHED UNIT TM=0MDS9K/509 SER=CSC00-1A0043 IF=00E4 ATTACHED UNIT LIF=E4 IOS581E LINK FAILED REPORTING CHPID=11 752 INCIDENT UNIT TM=0MDS9K/509 SER=CSC00-1A0043 IF=00E4 IC=04 INCIDENT UNIT LIF=E4 ATTACHED UNIT TM=0MDS9K/509 SER=CSC00-0989C3 IF=00E4 ATTACHED UNIT LIF=E4 We have a z9 connected to a z10 through a Cisco Router and DWMW (Dense Wave?) hardware. The group that handles the Cisco says they are not seeing any errors on the Cisco. Some fluttering, but no failures. I do not know about the Dense Wave device yet. Are these are serious as I assume or are they just something that happens and it does not impact my processes running on the Mainframe? I am thinking it might impact my DASD but I am not sure. We are running a DMX4500 so we have traffic needed for our applications running from the z9 to the z10 and back. Mostly DB2 Stored procedures. I am pulling logrec and trying to see if there is anything interesting there. Just looking for guidance on what the IOS581E is trying to tell me. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
The free MFNetDisk
HI, The coming soon new MFNetDisk features: 1. One code for Linux and Windows. 2. Totally new Linux code. Until now I develop my code using Windows platform only and rarely (long time ago) the Linux platform. This time I install new Linux OpenSUSE 11.2 and I run MFNetDisk with MONO (2.6) product which enable running C# in Linux. I found many bugs with the old MFNetDisk running under Linux especially the PCTool GUI. Now the code is running with Windows and Linux without any problems. People who try to run the code under Linux, I must apology but why to complain if it is free. 3. I rewrite the API to enable reading directly MVS file from Linux or Windows without the involvement of MVS. I also add the source code of a Windows or Linux GUI application (in c#) which include all the main calling to the API which read MVS file from the open System without using MVS. I put many improvement to the new code. Using this sample source code (working code) will easier the use of the API. 4. I need to delete all the LICKEY record to enable free use of my code. This will take few days to comment out some code and testing the new code. 5. I will add some documentation about the Linux and the new MVSAPI to read MVS files from Linux/Windows. I will let you know when the new code is ready. Thanks, Shai -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JOB - etc
From: Peter Nuttall Date: Tue, 20 Apr 2010 07:48:46 +0200 Yes to all of that Puzzled me too ... Never seen it before I am aware of the concatenation restriction on APF authorised load libraries (and the integrity reasoning behind it), but there are no steplibs in the job and the Joblib is, obviously, the same for all steps. What is that integrity reasoning? Doesn't LINKLIST nowadays support a mixture of authorized and unauthorized libraries, with the authorization of the step depending on the status of the individual data set from which the module was loaded? Is it merely that since the programmer controls the content of STEPLIB there's little utility in supporting similar behavior in STEPLIB? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 45 years of Mainframe
This is all very interesting. My first real programming job was as a coop student at a DuPont nylon manufacturing plant in Seaford, Delaware. I was in the Works Engineering Department which was responsible for the onsite power plant, the electricians, the electronics shop, and engineering planning for all those areas. Each quarter I was rotated to a different area. My forth quarter back at work I was in the planning area. The company had just replaced their 1410 system for one of those new fangled 360 computers. They had also gotten a 1620 for the engineering planning group. I became the programmer for the group. In successive quarters back I stayed in that group. My two biggest accomplishments were a fairly simple generalized statistical routine and a planning program for the onsite power plant to track the power usage and plan upgrades. By the way, the nickname of the 1620 was the CADET for Can't Add and Doesn't Even Try. It didn't have the normal addition/multiplication registers of the 360. Instead it did all of it's addition and multiplication via table lookup from tables it kept on the rotating disk. I understand that the same hardware design was used in the first IBM 3890 Check Sorters. The main function of those machines was to determine a sort pocket for the check by looking up the routing transit code and/or account number in a table. Tom Kelman Enterprise Capacity Planner Commerce Bank of Kansas City (816) 760-7632 -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Joel C. Ewing Sent: Monday, April 19, 2010 8:06 PM To: IBM-MAIN@bama.ua.edu Subject: Re: 45 years of Mainframe On 04/19/2010 05:06 PM, Tom Russell wrote: I, alas, started on a much slower machine, the 650, about which I feel *no* nostalgia. I do, however, have fond memories of the 7094. Nice. My first job as a coop student at IBM was to convert a 650 SOAP program that ran the Toronto plant to a 1401 card system Autocoder program. I think I still have the card systems Autocoder compiler decks somewhere. I did read the SOAP program to figure out what the program did, but never wrote any 650 code myself. Not a fond memory, but an interesting one. The 650 we were taking out had a 2 (4?) KB drum memory. The autocoder (think BAL) program I wrote to replace it was for a 4 KB 1401 card system. High/Low/Equal compare was a special feature on a 1401. Tom Russell IBM 650 drum memory was in 40 tracks or 50 words, containing decimal digits, not Bytes. Total capacity was 2000 words, with each word an instruction or data, 10 decimal digits plus sign, each digit represented by bi-quinary encoding (7 bits). It could be thought of as roughly equivalent to 20K decimal digits or 10K characters. Around 1961-1962 as a high school student in Norman, OK, I read the IBM 650 manuals and wrote some simple code examples for the 650 at O.U.; but it was an expensive and temperamental beast with no free time, so I was steered toward a new IBM 1620 that had much idle time, and learned to do my first real programming on that machine. The IBM 650 was replaced not that long after with an IBM 1410. I can still recall people discussing research that was negatively impacted by the need to re-write application code whenever a new machine was acquired. -- Joel C. Ewing, Fort Smith, ARjremoveccapsew...@acm.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html * If you wish to communicate securely with Commerce Bank and its affiliates, you must log into your account under Online Services at http://www.commercebank.com or use the Commerce Bank Secure Email Message Center at https://securemail.commercebank.com NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. * -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the
Re: IEBCOPY losing APF authorisation in middle of JOB.
Peter Nuttal wrote: Just wondered if anybody else has come across this phenomenon. We are z/OS 01.09.00. Have a job running a set of IEBCOPY steps and the 8th step failed with : IEB1099E *** IEBCOPY IS NOT APF AUTHORIZED *** All the other steps worked ... The rerun of the job from the failing step worked successfully Lets see. Rerun works. Without ANY changes at all? Anyone got any ideas ? After reviewing all replies up to now, I'm thinking something changed the APF list just before step 8. Check your SMF and/or RACF records for evidence. HTH! Groete / Greetings Elardus Engelbrecht -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Multiple logon SMCS possibility
We are setting up a few SMCS consoles for remote access. It appears that you can only logon with the same userid once. I can understand that if it were on the same lpar, But is there a way we can reuse the same userid to logon to an SMCS console on different lpars (uid defined on all lpars, different LU's) but on the same sysplex? The RACF db's are different, I can logon to TSO with the same uid on different lpars, so why not to SMCS consoles? Is this a strict SMCS restriction? Regards, Marcel van Ek Atos Origin -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ÿþD i t b e r i c h t i s v e r t r o u w e l i j k e n k a n g e h e i m e i n f o r m a t i e b e v a t t e n e n k e l b e s t e m d v o o r d e g e a d r e s s e e r d e . I n d i e n d i t b e r i c h t n i e t v o o r u i s b e s t e m d , v e r z o e k e n w i j u d i t o n m i d d e l l i j k a a n o n s t e m e l d e n e n h e t b e r i c h t t e v e r n i e t i g e n . A a n g e z i e n d e i n t e g r i t e i t v a n h e t b e r i c h t n i e t v e i l i g g e s t e l d i s m i d d e l s v e r z e n d i n g v i a i n t e r n e t , k a n A t o s O r i g i n n i e t a a n s p r a k e l i j k w o r d e n g e h o u d e n v o o r d e i n h o u d d a a r v a n . H o e w e l w i j o n s i n s p a n n e n e e n v i r u s v r i j n e t w e r k t e h a n t e r e n , g e v e n w i j g e e n e n k e l e g a r a n t i e d a t d i t b e r i c h t v i r u s v r i j i s , n o c h a a n v a a r d e n w i j e n i g e a a n s p r a k e l i j k h e i d v o o r d e m o g e l i j k e a a n w e z i g h e i d v a n e e n v i r u s i n d i t b e r i c h t . O p a l o n z e r e c h t s v e r h o u d i n g e n , a a n b i e d i n g e n e n o v e r e e n k o m s t e n w a a r o n d e r A t o s O r i g i n g o e d e r e n e n / o f d i e n s t e n l e v e r t z i j n m e t u i t s l u i t i n g v a n a l l e a n d e r e v o o r w a a r d e n d e L e v e r i n g s v o o r w a a r d e n v a n A t o s O r i g i n v a n t o e p a s s i n g . D e z e w o r d e n u o p a a n v r a a g d i r e c t k o s t e l o o s t o e g e z o n d e n . T h i s e - m a i l a n d t h e d o c u m e n t s a t t a c h e d a r e c o n f i d e n t i a l a n d i n t e n d e d s o l e l y f o r t h e a d d r e s s e e ; i t m a y a l s o b e p r i v i l e g e d . I f y o u r e c e i v e t h i s e - m a i l i n e r r o r , p l e a s e n o t i f y t h e s e n d e r i m m e d i a t e l y a n d d e s t r o y i t . A s i t s i n t e g r i t y c a n n o t b e s e c u r e d o n t h e I n t e r n e t , t h e A t o s O r i g i n g r o u p l i a b i l i t y c a n n o t b e t r i g g e r e d f o r t h e m e s s a g e c o n t e n t . A l t h o u g h t h e s e n d e r e n d e a v o u r s t o m a i n t a i n a c o m p u t e r v i r u s - f r e e n e t w o r k , t h e s e n d e r d o e s n o t w a r r a n t t h a t t h i s t r a n s m i s s i o n i s v i r u s - f r e e a n d w i l l n o t b e l i a b l e f o r a n y d a m a g e s r e s u l t i n g f r o m a n y v i r u s t r a n s m i t t e d . O n a l l o f f e r s a n d a g r e e m e n t s u n d e r w h i c h A t o s O r i g i n s u p p l i e s g o o d s a n d / o r s e r v i c e s o f w h a t e v e r n a t u r e , t h e T e r m s o f D e l i v e r y f r o m A t o s O r i g i n e x c l u s i v e l y a p p l y . T h e T e r m s o f D e l i v e r y s h a l l b e p r o m p t l y s u b m i t t e d t o y o u o n y o u r r e q u e s t . A t o s O r i g i n N e d e r l a n d B . V . / U t r e c h t K v K U t r e c h t 3 0 1 3 2 7 6 2
Re: COUPLE DATA SET TIME STAMPS
On Mon, 19 Apr 2010 05:14:09 -0500, Barbara Nitz nitz-...@gmx.net wrote: If there are WLM problems, it is fairly easy to unload the current WLM policy, come up after IPL with an empty, freshly formatted WLM CDS, and then 'load' the policy into it from your saved copy. There may even be a programmatic interface to do that so you don't need to come up with an empty WLM CDS. AFAIK, WLM, like Logger, only allows policy updates to the active (IPLd) couple datasets. There is no DSName keyword to point to an inactive dataset, like there is with SFM and CFRM. Also, AFAIK, there is no CFRMPOL- like keyword to activate a new policy. You could set something up during IPL to install and activate a policy (SystemRexx?), but I believe you'd still have to IPL with an empty dataset. Regards, Art Gutowski Ford Motor Company -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 45 years of Mainframe
I started in college in 1969, a few months before we got our 360. But I don't have so much experience having taken time off as a USAF pilot. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Antwort: Multiple logon SMCS possibility
Marcel, we have two separate LPARs and can logon to each SMCS console with the same UID. There is no restriction. However, the 2 LPARs have different system names (SYS1, SYS5) and we use system symbols in SMCS definitions to differentiate between them. Werner Kuehnel IMD-Gesellschaft für Informatik und Datenverarbeitung mbH Augustaanlage 66 68165 Mannheim Tel: +49.621.457-4885, Fax: -4046 IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu schrieb am 20.04.2010 14:54:53: We are setting up a few SMCS consoles for remote access. It appears that you can only logon with the same userid once. I can understand that if it were on the same lpar, But is there a way we can reuse the same userid to logon to an SMCS console on different lpars (uid defined on all lpars, different LU's) but on the same sysplex? The RACF db's are different, I can logon to TSO with the same uid on different lpars, so why not to SMCS consoles? Is this a strict SMCS restriction? Regards, Marcel van Ek Atos Origin -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html [Anhang disclaimer.txt gelöscht von Werner KUEHNEL/DIR/MANNHEIMER/DE] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
supervisory state vs. authorized program
Hi all, I'm a little confused - is there a difference (and if so, what is the difference) between an assembler program that is in supervisory state and an assembler program that is authorized? Thanks in advance for your time. Diane M. Goodwin IT System Adminstration Specialist Amica Insurance Company email: dgood...@amica.com I'm not a cynic. I'm a disappointed optimist. - George Carlin -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: supervisory state vs. authorized program
GOODWIN, DIANE M. dgood...@amica.com wrote in message news:33a9a3874f87c24aab996586c367def805bf2...@hoex01.amica.com... Hi all, I'm a little confused - is there a difference (and if so, what is the difference) between an assembler program that is in supervisory state and an assembler program that is authorized? Thanks in advance for your time. Diane M. Goodwin If a program is APF authorized, it is allowed to execute 'authorized' functions, a.o. put itself into 'supervisor state'. Kees. For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
3494 EOM date
Is EOM (End of Marketing) announced for IBM 3494 tape library? Where such date can be found? -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sąd Rejonowy dla m. st. Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, nr rejestru przedsiębiorców KRS 025237 NIP: 526-021-50-88 Według stanu na dzień 01.01.2009 r. kapitał zakładowy BRE Banku SA (w całości wpłacony) wynosi 118.763.528 złotych. W związku z realizacją warunkowego podwyższenia kapitału zakładowego, na podstawie uchwały XXI WZ z dnia 16 marca 2008r., oraz uchwały XVI NWZ z dnia 27 października 2008r., może ulec podwyższeniu do kwoty 123.763.528 zł. Akcje w podwyższonym kapitale zakładowym BRE Banku SA będą w całości opłacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: supervisory state vs. authorized program
Diane, An authorized program is entered in problem state and has the ability to get into supervisor state using a MODESET macro. Even though the program is authorized, it is not allowed to execute certain priviledged instructions or invoke certain priviledged system services until it is in supervisor state. So, from a 70k foot level, an authorized program runs like an unauthorized program until it enters supervisor state. Tony Lubrano Product Author NEON Enterprise Software, LLC. p: 281.207.4922 f: 281.207.4973 What is zPrime? Find out at www.zprime.com or just ask us! From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of GOODWIN, DIANE M. [dgood...@amica.com] Sent: Tuesday, April 20, 2010 8:45 AM To: IBM-MAIN@bama.ua.edu Subject: supervisory state vs. authorized program Hi all, I'm a little confused - is there a difference (and if so, what is the difference) between an assembler program that is in supervisory state and an assembler program that is authorized? Thanks in advance for your time. Diane M. Goodwin IT System Adminstration Specialist Amica Insurance Company email: dgood...@amica.com I'm not a cynic. I'm a disappointed optimist. - George Carlin -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: supervisory state vs. authorized program
On Tue, 20 Apr 2010 09:45:07 -0400 GOODWIN, DIANE M. dgood...@amica.com wrote: :Hi all, :I'm a little confused - is there a difference (and if so, what is the :difference) between an assembler program that is in supervisory state :and an assembler program that is authorized? An authorized program has the potential to get into supervisor state but will 0C2 on instructions that require supervisor state. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 45 years of Mainframe
re: http://www.garlic.com/~lynn/2010h.html#29 45 years of Mainframe http://www.garlic.com/~lynn/2010h.html#30 45 years of Mainframe a little x-over from this thread http://www.garlic.com/~lynn/2010h.html#18 as mentioned in the above ... as undergraduate, I had done a lot of work on os/360 and cp67 ... made presentation on some of the work at aug68 share meeting in boston. also was involved in univ. clone controller project. also, jun68, science center had one week cp67 class held at Beverley hills hilton(?). the friday before the class, one of the people that was to teach much of the class, gave notice that they were leaving for a new (virtual machine based) commercial time-sharing service bureau. When I show up for the class ... I was asked if I would teach part of it. spring break '69, i got talked into giving one week class for the boeing ibmers and the growing technical staff for the emerging boeing computer system. summer of '69, i was talked into spending at boeing ... setting up cp67 system (part of boeing computer system also offering computer services outside boeing). would periodically visit renton data center ... massive multiple football fields ... they had at least one 360/75 (it had black rope around the perimeter and there was black cloth that was pulled down over the front panel and 1403 windows had black cloth ... when running classified work) ... but the main workhorse was 360/65s ... the place was full of them. They pointed out that 360/65s were arriving so fast that summer, they constantly had pieces of two or three of the systems staged in the hallways ... waiting to be installed on the floor. I considered that the largest datacenter I had ever been in (several hundred millions in ibm 360s, although it was being partially duplicated at 747 plant in everett; part of everett datacenter was disaster planning; renton was in the path of potential massive mudslide if Mt. Rainier was to warm up). Later I would sponsor John Boyd's briefings at IBM ... and he would make some mention having done a year stint in 1970 running spook base. Later one of John's biographies mentions that spook base was $2.5B windfall for IBM. By the time John was buried at Arlington ... the USAF had somewhat disowned him ... but he had been adopted by the Marines (and his effects and papers went to Quantico). Since he died, the USAF has somewhat acknowledged him; reference to dedication of Boyd Hall at USAF Weapons School, Nellis Air Force Base, 1999. http://www.garlic.com/~lynn/2000e.html#35 and reference to SECDEF lecture at USAF academy earlier this month (that mentions Boyd) http://www.garlic.com/~lynn/2010h.html#20 misc. past posts URLs mentioning Boyd http://www.garlic.com/~lynn/subboyd.html -- 42yrs virtualization experience (since Jan68), online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JOB.
quote All the other steps worked ... The rerun of the job from the failing step worked successfully Lets see. Rerun works. Without ANY changes at all? Anyone got any ideas ? After reviewing all replies up to now, I'm thinking something changed the APF list just before step 8. Check your SMF and/or RACF records for evidence. HTH! Groete / Greetings Elardus Engelbrecht /quote Yep ... We had another one today ... The rerun works with the only change being that we rerun it from the failing step (we don't want to rerun the steps that worked) I don't believe I have access to the SMF records :-( ... Which is a pity ... It is with our Sysprog team at the moment, and I have chased them today ... Will post when/if we find the culprit. Cheers, Peter This e-mail message, including any attachments transmitted with it, is CONFIDENTIAL and may contain legally privileged information. This message is intended solely for the use of the individual or entity to whom it is addressed. If you have received this message in error, please notify us immediately and delete it from your system. Please visit our website to read the full disclaimer: http://www.euroclear.com/site/public/disclaimer
Re: RMM EDGRRPTE printing Problem
Crispin, I'm confused by your JCL below. What is the source of the RMM.HSKP.EXTRACT data set? Is it the REPTEXT DD output from running program EDGHSKP? If so, I'm don't see how the ICETOOL step reads it and produces a usable report. For one thing, at least in our extract file, there are no data set names that begin in column 44. I'm wondering if you haven't edited the output from one EDGRRPTE run and are using that to input into the EDGRRPTE step you've included below. Greg Shirey Ben E. Keith Co. -Original Message- From: IBM Mainframe Discussion List On Behalf Of Crispin Hugo Sent: Tuesday, April 20, 2010 1:49 AM To: IBM-MAIN@bama.ua.edu Subject: Re: RMM EDGRRPTE printing Problem snip JCL: //EXTRPDT EXEC PGM=IKJEFT01,DYNAMNBR=99,REGION=4096K //SYSTSPRT DD SYSOUT=X //SYSPRINT DD SYSOUT=X //SORTIN DD DISP=SHR,DSN=RMM.HSKP.EXTRACT //SORTOUT DD DSN=TEMP01,DISP=(,PASS,DELETE), // SPACE=(CYL,(200,20),RLSE),UNIT=SYSALLDA, // DCB=*.SORTIN //SYSINDD DSN=TEMP02,DISP=(,PASS,DELETE), // SPACE=(TRK,(1,1),RLSE),UNIT=SYSALLDA, // DCB=(LRECL=80,BLKSIZE=3120,RECFM=FB) //SYSOUT DD SYSOUT=X //REPORT14 DD SYSOUT=Y //SYSTSIN DD * EX 'SYS1.SEDGEXE1(EDGRRPTE)' - '054 MACRO 4 INTERNAL USE ONLY' //* //WRITE1 EXEC PGM=ICETOOL,REGION=0M //SYSPRINT DD SYSOUT=X //TOOLMSG DD SYSOUT=X //DFSMSG DD SYSOUT=X //INDD DD DSN=RMM.HSKP.EXTRACT, //DISP=SHR //OUTDDDD SYSOUT=Y //TEMP DD UNIT=SYSALLDA,SPACE=(TRK,(5,25)) //TOOLIN DD * SORT FROM(INDD) TO(TEMP) USING(INCL) DISPLAY FROM(TEMP) LIST(OUTDD) - TITLE('Movement Report by Volume Serial') - PAGE DATE(4MD/) TIME - HEADER('Job Name') ON(23,8,CH) - HEADER('Volume') ON(32,6,CH) - HEADER('Volseq#') ON(39,4,CH) - HEADER('Dataset Name') ON(44,44,CH) - HEADER('Create Date') ON(89,10,CH) - BTITLE('To Destination / From Location') - BREAK(5,18,CH) - BTOTAL('') - BLANK - TOTAL('REMOVABLE MEDIA MANAGER') //INCLCNTL DD DSN=INCL,DISP=(OLD,PASS) /*...@02c*/ snip -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: supervisory state vs. authorized program
On Tue, 20 Apr 2010 16:56:46 +0300, Binyamin Dissen wrote: On Tue, 20 Apr 2010 09:45:07 -0400 GOODWIN, DIANE M. wrote: :I'm a little confused - is there a difference (and if so, what is the :difference) between an assembler program that is in supervisory state :and an assembler program that is authorized? An authorized program has the potential to get into supervisor state but will 0C2 on instructions that require supervisor state. Summarizing what no one has stated absolutely clearly yet, supervisor state is a hardware state, controlled by a bit in the PSW; authorized is a software state defined by flags set by the OS reflecting bits in the load module and the library from which it was loaded. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: RMM EDGRRPTE printing Problem
Greg, Sorry for not being clear. EDGHSKP creates RMM.HSKP.EXTRACT using XREPTEXT DD. This is the same file that is input to ICETOOL. As I use the XREPTEXT DD, I get the more detailed information I need. All I have done is change the supplied REPORT14 and changed stuff around to how I want it. I am using all the stuff that is 'supplied' by DFSMSRMM report . Crispin Hugo Systems Programmer Macro 4 Limited Direct Line: +44 (0)1293 872121, Switchboard: +44 (0)1293 872000, Fax: +44 (0)1293 872001 A Division of the UNICOM Group of Companies www.macro4.com Macro 4 Registered office :The Orangery, Turners Hill Road, Worth, Crawley, West Sussex, RH10 4SS Registered in England no. 927588 Please consider the environment and THINK before you print this email. Email Disclaimer -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Greg Shirey Sent: 20 April 2010 15:48 To: IBM-MAIN@bama.ua.edu Subject: Re: RMM EDGRRPTE printing Problem Crispin, I'm confused by your JCL below. What is the source of the RMM.HSKP.EXTRACT data set? Is it the REPTEXT DD output from running program EDGHSKP? If so, I'm don't see how the ICETOOL step reads it and produces a usable report. For one thing, at least in our extract file, there are no data set names that begin in column 44. I'm wondering if you haven't edited the output from one EDGRRPTE run and are using that to input into the EDGRRPTE step you've included below. Greg Shirey Ben E. Keith Co. -Original Message- From: IBM Mainframe Discussion List On Behalf Of Crispin Hugo Sent: Tuesday, April 20, 2010 1:49 AM To: IBM-MAIN@bama.ua.edu Subject: Re: RMM EDGRRPTE printing Problem snip JCL: //EXTRPDT EXEC PGM=IKJEFT01,DYNAMNBR=99,REGION=4096K //SYSTSPRT DD SYSOUT=X //SYSPRINT DD SYSOUT=X //SORTIN DD DISP=SHR,DSN=RMM.HSKP.EXTRACT //SORTOUT DD DSN=TEMP01,DISP=(,PASS,DELETE), // SPACE=(CYL,(200,20),RLSE),UNIT=SYSALLDA, // DCB=*.SORTIN //SYSINDD DSN=TEMP02,DISP=(,PASS,DELETE), // SPACE=(TRK,(1,1),RLSE),UNIT=SYSALLDA, // DCB=(LRECL=80,BLKSIZE=3120,RECFM=FB) //SYSOUT DD SYSOUT=X //REPORT14 DD SYSOUT=Y //SYSTSIN DD * EX 'SYS1.SEDGEXE1(EDGRRPTE)' - '054 MACRO 4 INTERNAL USE ONLY' //* //WRITE1 EXEC PGM=ICETOOL,REGION=0M //SYSPRINT DD SYSOUT=X //TOOLMSG DD SYSOUT=X //DFSMSG DD SYSOUT=X //INDD DD DSN=RMM.HSKP.EXTRACT, //DISP=SHR //OUTDDDD SYSOUT=Y //TEMP DD UNIT=SYSALLDA,SPACE=(TRK,(5,25)) //TOOLIN DD * SORT FROM(INDD) TO(TEMP) USING(INCL) DISPLAY FROM(TEMP) LIST(OUTDD) - TITLE('Movement Report by Volume Serial') - PAGE DATE(4MD/) TIME - HEADER('Job Name') ON(23,8,CH) - HEADER('Volume') ON(32,6,CH) - HEADER('Volseq#') ON(39,4,CH) - HEADER('Dataset Name') ON(44,44,CH) - HEADER('Create Date') ON(89,10,CH) - BTITLE('To Destination / From Location') - BREAK(5,18,CH) - BTOTAL('') - BLANK - TOTAL('REMOVABLE MEDIA MANAGER') //INCLCNTL DD DSN=INCL,DISP=(OLD,PASS) /*...@02c*/ snip -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 internal virus protection system. . -
Re: (slightly OT - Linux) Did IBM bet on the wrong OS?
bob.gool...@gmail.com (Bob goolsby) writes: And what would have been the alternative OS for IBM to have backed? OS/2??? at the time, linux was somewhat the stage of the hobbiest personal computers before the advent ibm/pc. the ibm/pc clone market was starting to build massive consumer base ... including gaming market (which wasn't being addressed by the linux hobbiest) ... but only small part of that was bleeding into linux computer hobbiests. os/2 ps2 was industrial strength commercial market ... as well as somewhat helping support the mainstream computing market. this was period of help your brethern ... and terminal emulation (SAA) strategy ... attempting to stave off the client/server that was impacting the communication group (terminal emulation) install base ... misc. posts http://www.garlic.com/~lynn/subnetwork.html#emulation the workstation division had come out with rs/6000 ... and was being told it had to use the ps2 adapter cards (also as part of helping corporate brethern). this strategy makes the rs/6000 only marginally better than ps2. The ps2 microchannel 16mbit T/R card had lower card thruput (as part of terminal emulation strategy ... 300+ ps2 sharing same 16mbit t/r) than the pc/rt (rs/6000 workstation precursor) ISA 4mbit/sec t/r card. The ps2 microchannel scsi card had really high command processing overhead and low thruput. The ps2 graphics adapter card was really, really slow (compared to products in the workstation market). The ps2 graphics adapter countermeasure (since workstation division wasn't allowd to do their own) ... came out with the 730 deskside ... basically a 530 with extra wide cabinet with internal VMEbus with non-IBM VMEbus graphics adapter (the argument being that ps2 wasn't offering a VMEbus graphics adapter). The boca ps2 os2 was off in their own world with regard to where the business was going ... as well as what was happening with commodity pricing with the clones. There were internal documents showing comptition selling best price massive bulk purchase (hundreds of machines) was close to ps2. To try and counteract, I would post (on internal forums) clone quantity-one prices from the sunday newspaper (that were way below what Boca was showing clone large volume best prices in their business plans). the mainstream unix market from the early 80s ... was up until then new computer vendors spent huge amount of money on proprietary computer and proprietary operating system. The advent of single chip processors drastically dropped the cost of developing computer system (in workstation and mini market) ... and doing new proprietary operating system became many times larger than doing the hardware. To drop the cost of operating system to compareable to hardware costs ... required adopting portable, relatively off-the-shelf software ... at the time it was unix. one of the things that the workstation group did was spend an enormous amount of money on proprietary added value additions to unix ... nearly what would have been spent on doing proprietary operating system from scratch (way out of proportion to what was happening in the workstation mini market). in the last two decades, the commodity, high-volume, low-margins ... have allowed that business to pretty much overtake the proprietary low-volume, high-margin market. that also accounts for placing the evolving linux base in competition with the corporate proprietary unix offering. -- 42yrs virtualization experience (since Jan68), online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 3494 EOM date
Hello, The dates that you are looking for can be found on-line on IBM's Sales Manual. Here is a long link to the 3494 listing: http://www-01.ibm.com/common/ssi/ShowDoc.jsp?docURL=/common/ssi/rep_sm/4/897/ENUS3494/index.htmlbreadCrum=DET001PT023url=buttonpressed=DET001PT116page=1000paneltext1=DET001PEF012amp;user+type=EXTlang=en_US Here is a tinyurl to get there more easily: http://tinyurl.com/y7ct662 Robert Harrison I.S. Manager Oklahoma Department of Transportation rharri...@odot.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: supervisory state vs. authorized program
On 20 April 2010 11:01, Paul Gilmartin paulgboul...@aim.com wrote: Summarizing what no one has stated absolutely clearly yet, supervisor state is a hardware state, controlled by a bit in the PSW; authorized is a software state defined by flags set by the OS reflecting bits in the load module and the library from which it was loaded. Right. But it's a bit more muddled than that, because some operating system services required that the caller be authorized, but in many cases this authorization can be APF authorization (regardless of what machine state the program is running with), *or* being in supervisor state. Often enough these services will also accept running in a system key (generally a key 8) as well. The bottom line is that an APF authorized program can get itself into supervisor state and/or a system key, and a program running in supervisor state can do absolutely anything with the machine, including reading or changing any data in main storage or on disk, bypassing all security, and even stopping the entire complex. Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: RMM EDGRRPTE printing Problem
Crispin, our sample JCL for running EDGRRPTE is SAMPLIB member EDGJRPT. It contains //REPORT14 DD SYSOUT=*,RECFM=VBA for report14. This identifies the file as containing ANSI print control characters. I suspect by sending to VM some additional char is inserted after EDGRRPTE has written the record to SYSOUT with the ASA print control character in position 1. Once you amend the DD statement to add RECFM, this should no longer happen. Mike Wood RMM Development -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
PAV Implementation
We are looking into the possibility of implementing PAVs on our HDS USP-V. Our HDS reseller says we have to buy implementation services from them to implement PAVs. Their implementation services are very pricey, as you might imagine. Do you believe implementation services are required or at least highly recommended? Or is the reseller blowing smoke? Know any good documentation for planning PAV implementation? Any lessons learned to be shared from those that have implemented PAVs recently? Thanks Rebecca -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
Do you believe implementation services are required or at least highly recommended? No. Usually, PAV is an added cost, but PAV is so simple, I never saw the need for 'implementation services'. Or is the reseller blowing smoke? I would think so. Know any good documentation for planning PAV implementation? I implemented dynamic PAV in 2000, after the crisis. We used the standard doc -- it was on a Shark. You will have to look at HDS doc, for how to allocate it in their 'Storage Advisor'. The rest is 'simple': Define the alias/base relationship in the IOCDS. Turn on the flag in IODF. Turn on the flag in WLM. Sit back and watch. If you have IOSQ issues before implementation, you will see noticible improvement, afterwards. Otherwise, use the RMF device activity data, before and after. You can do the analysis using an RMF Device Activity Report. But, it will be easier with MICS, MXG, or equivalent. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Stopping zOS
How do you stop zOS? I stop all the subsystems, then stop JES, and finally Z EOD But then what actually stops zOS? SHUTDOWN in z/VM causes VM to go into a disabled wait. Does anything on zOS do the same thing? -- Mark Pace Mainline Information Systems 1700 Summit Lake Drive Tallahassee, FL. 32317 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
On 4/20/2010 12:28 PM, Mark Pace wrote: But then what actually stops zOS? SHUTDOWN in z/VM causes VM to go into a disabled wait. Does anything on zOS do the same thing? QUIESCE Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
On Tue, 20 Apr 2010 12:28:05 -0400, Mark Pace mpac...@gmail.com wrote: How do you stop zOS? I stop all the subsystems, then stop JES, and finally Z EOD But then what actually stops zOS? SHUTDOWN in z/VM causes VM to go into a disabled wait. Does anything on zOS do the same thing? Only in a sysplex of some sort (monoplex, basic, parallel). V XCF,sysname,OFFLINE ... which puts the system in a x'0A2' wait state with reason code 4. The command is invalid in a local sysplex - COUPLExx specifies COUPLE SYSPLEX(LOCAL) Otherwise you have to use the hardware reset function. There is also a QUIESCE command, which puts the system in a x'CCC' wait state that is restartable. You wouldn't want to normally do that these days. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mark Pace Sent: Tuesday, April 20, 2010 11:28 AM To: IBM-MAIN@bama.ua.edu Subject: Stopping zOS How do you stop zOS? I stop all the subsystems, then stop JES, and finally Z EOD But then what actually stops zOS? SHUTDOWN in z/VM causes VM to go into a disabled wait. Does anything on zOS do the same thing? -- Mark Pace VARY XCF,sysname,OFFLINE This will cause z/OS to tell all other systems in the SYSPLEX that it is shutting down. It then goes into a hard wait. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote: There is also a QUIESCE command, which puts the system in a x'CCC' wait state that is restartable. You wouldn't want to normally do that these days. Why? Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
snip Any lessons learned to be shared from those that have implemented PAVs recently? /snip Doesn't look like you're a government agency, so you probably don't have to deal with VION which is a good thing. I implemented PAV on our HDS USP-V and it's pretty much like Ted said, ie simple - once you get the contract stuff out of the way. Their ShadowImage is a different can of worms though, VION doesn't have much support, so that probably clouds my opinion. Jack Kelly 202-502-2390 (Office) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
There is an HDS manual entitled Hitachi TagmaStore(r) Universal Storage Platform and Network Storage Controller Compatible PAV for IBM(r) z/OS(r) User's Guide (Includes PAV and Hyper PAV) which will help. Basically as long as you have someone fluent enough in STORNAV to set up the alias pools (for HYPERPAVs) the manual will help. The other part is that there is a corresponding device definition change that is required on the MVS side. You need to define base devices and alias devices within a single LCU. Personally I would recommend HYPERPAVs but then I don't know your environment. As well you may want to do a performance analysis to determine the optimum base to alias ratio. I hope this helps. Bruce -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Rebecca Martin Sent: Tuesday, April 20, 2010 11:43 AM To: IBM-MAIN@bama.ua.edu Subject: PAV Implementation We are looking into the possibility of implementing PAVs on our HDS USP-V. Our HDS reseller says we have to buy implementation services from them to implement PAVs. Their implementation services are very pricey, as you might imagine. Do you believe implementation services are required or at least highly recommended? Or is the reseller blowing smoke? Know any good documentation for planning PAV implementation? Any lessons learned to be shared from those that have implemented PAVs recently? Thanks Rebecca -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE OF CONFIDENTIALITY This communication including any information transmitted with it is intended only for the use of the addressees and is confidential. If you are not an intended recipient or responsible for delivering the message to an intended recipient, any review, disclosure, conversion to hard copy, dissemination, reproduction or other use of any part of this communication is strictly prohibited, as is the taking or omitting of any action in reliance upon this communication. If you receive this communication in error or without authorization please notify us immediately by return e-mail or otherwise and permanently delete the entire communication from any computer, disk drive, or other storage medium. If the above disclaimer is not properly readable, it can be found at www.td.com/legal AVERTISSEMENT DE CONFIDENTIALITE Ce courriel, ainsi que tout renseignement ci-inclus, destiné uniquement aux destinataires susmentionnés, est confidentiel. Si vous n'êtes pas le destinataire prévu ou un agent responsable de la livraison de ce courriel, tout examen, divulgation, copie, impression, reproduction, distribution, ou autre utilisation d'une partie de ce courriel est strictement interdit de même que toute intervention ou abstraction à cet égard. Si vous avez reçu ce message par erreur ou sans autorisation, veuillez en aviser immédiatement l'expéditeur par retour de courriel ou par un autre moyen et supprimer immédiatement cette communication entière de tout système électronique. Si l'avis de non-responsabilité ci-dessus n'est pas lisible, vous pouvez le consulter à www.td.com/francais/legale -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony Harminc Sent: Tuesday, April 20, 2010 11:39 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Stopping zOS On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote: There is also a QUIESCE command, which puts the system in a x'CCC' wait state that is restartable. You wouldn't want to normally do that these days. Why? Tony H. The IP connectivity goes into the toliet and all the clients would need to reconnect. QUIESCE is not of any particular use, other than perhaps after a Z EOD to make sure that all I/O is complete. I.e. you'd never want to do a restart after doing a QUIESCE. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . (817)-961-6183 cell john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
Try: $P P RMF P TSO P SDSF Z NET,QUICK F BPXOINIT,SHUTDOWN=FORKINIT F OMVS,STOPPFS=ZFS F OMVS,SHUTDOWN C DFSCMF $PJES2 #STOP (RACF) sds, visconde 2010/4/20 McKown, John john.mck...@healthmarkets.com -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony Harminc Sent: Tuesday, April 20, 2010 11:39 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Stopping zOS On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote: There is also a QUIESCE command, which puts the system in a x'CCC' wait state that is restartable. You wouldn't want to normally do that these days. Why? Tony H. The IP connectivity goes into the toliet and all the clients would need to reconnect. QUIESCE is not of any particular use, other than perhaps after a Z EOD to make sure that all I/O is complete. I.e. you'd never want to do a restart after doing a QUIESCE. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarketsŽ 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . (817)-961-6183 cell john.mck...@healthmarkets.com . www.HealthMarkets.comhttp://www.healthmarkets.com/ Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarketsŽ is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance CompanyŽ, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
On Tue, 20 Apr 2010 12:39:22 -0400, Tony Harminc t...@harminc.net wrote: On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote: There is also a QUIESCE command, which puts the system in a x'CCC' wait state that is restartable. You wouldn't want to normally do that these days. 1) If you still run a FEP (front end processor), it keeps running. It really doesn't like the fact that the host system went away and you didn't tell it. I've seen NCPs crash after this and even VTAM once you restarted the system. I admit I haven't done this in a very long time.. 2) Same issue with TCPIP. Although I suspect connections / links would just timeout and fail. It would look like a crashed system after a short period of time. 3) SYSPLEX / **GRS / MIM or anything else that relies on heart beats from a healthy system. I could name a bunch of other ISV products I know of also, but I won't. ** (this note from the operator commands manual): If this system is actively using global resource serialization to share global resources and the global resource serialization complex is not the same as the sysplex, issue a VARY GRS (*),QUIESCE command before issuing the QUIESCE command. Issuing a VARY GRS (*),QUIESCE command before issuing the QUIESCE command prevents the disruption of the global resource serialization ring. So it's a similar theme for all of these. There is so much connectivity from z/OS to other platforms and systems, you can't really live with a quiesced system and restart it. You might as well shut it down nicely and do a system reset. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Tuesday, April 20, 2010 9:57 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Stopping zOS -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony Harminc Sent: Tuesday, April 20, 2010 11:39 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Stopping zOS On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote: There is also a QUIESCE command, which puts the system in a x'CCC' wait state that is restartable. You wouldn't want to normally do that these days. Why? Tony H. The IP connectivity goes into the toliet and all the clients would need to reconnect. QUIESCE is not of any particular use, other than perhaps after a Z EOD to make sure that all I/O is complete. I.e. you'd never want to do a restart after doing a QUIESCE. In the resource limited days here before the z9-BC I sometimes QUIESCEd the sandbox(s) for provide some marginally more resources to production during the few days of heavy load. Everything (except TCPIP connections) picked up nicely upon restart. Even a 3270 connection could resume if you'd not attempted to use it during the wait time. Once, when I didn't understand what I could do by declaring my z/OS TCPIP stack a router (and before the network folks configured just who they'd let be a router), I configured my sandbox as such by mistake. JUST BEFORE LEAVING FOR THE DAY. A couple hours later, ops called and said my sandbox was the reason the network was down. I told them to QUIESCE the sandbox. The network healed almost instantly. That wasn't the most pleasant post-mortem I've ever been part of :) But, yes, as an normal thing, there's very little point in QUIESCE or fully shutting down a monoplex LPAR these days. Dave Gibney Information Technology Services Washington State University -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . (817)-961-6183 cell john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Stopping zOS
On 20 April 2010 12:39, Tony Harminc t...@harminc.net wrote: On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote: There is also a QUIESCE command, which puts the system in a x'CCC' wait state that is restartable. You wouldn't want to normally do that these days. Why? I didn't phrase my question clearly; I wasn't asking about the wisdom of trying to restart, but about why the QUIESCE itself would be a bad idea. The original reason for QUIESCE, IIRC, is that it ensured that all CPUs in an MP would be stopped, whereas the old hit STOP would stop only the one whose STOP button you pressed. And in turn, the reason for hitting STOP before re-IPLing is to avoid that improbable but very nasty possibility of doing an I/O reset while a DASD write was in progress (for your JES checkpoint, say). Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
You need to define base devices and alias devices within a single LCU. Personally I would recommend HYPERPAVs but then I don't know your environment. You will (usually) see such an improvement, that HIPERPAVs may be overkill. Again, environmentally specific. As well you may want to do a performance analysis to determine the optimum base to alias ratio. This again is simple. Define enough base pairs to cover your online disk. Then make the rest aliases. No need to get stuck in analysis paralysis. As NIKI used to say: 'just do it'! - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
We implemented HIPERPAV on our USP last year. It is a priced feature but we did not require any services from Hitachi. As other posters have mentioned, implementing PAV/HIPERPAV is pretty straightforward. IOSQ time disappeared entirely. The only down side was that going to HIPERPAV (but not PAV) requires a 2107 emulation. As we were still on a 2105, it required a power recycle to the box , which of course meant a sysplex-wide outage plus an outage to distributed servers using the box Mike On Tue, Apr 20, 2010 at 8:35 PM, Ted MacNEIL eamacn...@yahoo.ca wrote: You need to define base devices and alias devices within a single LCU. Personally I would recommend HYPERPAVs but then I don't know your environment. You will (usually) see such an improvement, that HIPERPAVs may be overkill. Again, environmentally specific. As well you may want to do a performance analysis to determine the optimum base to alias ratio. This again is simple. Define enough base pairs to cover your online disk. Then make the rest aliases. No need to get stuck in analysis paralysis. As NIKI used to say: 'just do it'! - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Mike Shorkend m...@shorkend.com www.shorkend.com Tel: +972524208743 Fax: +97239772196 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
On Tue, 20 Apr 2010 12:33:48 -0400, Mackenzie, Bruce bruce.macken...@td.com wrote: There is an HDS manual entitled Hitachi TagmaStore(r) Universal Storage Platform and Network Storage Controller Compatible PAV for IBM(r) z/OS(r) User's Guide (Includes PAV and Hyper PAV) which will help. Basically as long as you have someone fluent enough in STORNAV to set up the alias pools (for HYPERPAVs) the manual will help. The other part is that there is a corresponding device definition change that is required on the MVS side. You need to define base devices and alias devices within a single LCU. Personally I would recommend HYPERPAVs but then I don't know your environment. As well you may want to do a performance analysis to determine the optimum base to alias ratio. I hope this helps. Bruce Thank you that helps a lot! And Ted, thank you too for your suggestions! We need to do this without costly implemenation services the resellar quoted us! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
And Ted, thank you too for your suggestions! We need to do this without costly implemenation services the resellar quoted us! You can. Just get the feature and do it. The implementation services sounds like a cash grab! I'm available off-line for advice. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PAV Implementation
On Tue, 20 Apr 2010 18:26:43 +, Ted MacNEIL eamacn...@yahoo.ca The implementation services sounds like a cash grab! My thoughts exactly! Thanks to everybody that has replied. I'll let you know where we go with this. The working through the contract part (provided we move forward with PAV - and we do need it to reduce IOSQ time) - with our vendor - will take the longest! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: (slightly OT - Linux) Did IBM bet on the wrong OS?
bob.gool...@gmail.com (Bob goolsby) writes: And what would have been the alternative OS for IBM to have backed? OS/2??? re: http://www.garlic.com/~lynn/2010h.html#34 (slightly OT - Linux) Did IBM bet on the wrong OS?/a at the beginning, a major market and gave ibm/pc big kick-start was large corporation mainframe terminal emulation market. however, there was growing home market ... with a large gaming component and small business market (somewhat SOHO ... or small private, closed LANs networks). Later, for the closed business environment there was growing use of scripting add-ons to business applications that provided various kinds of added value ... with open access to the basic system. This was analogous to gaming market where the application frequently took over all aspects of low-level machine operation. at the jan96 msdc held at mascone center ... a major theme was supporting the internet ... but the big banners all over the place were preserving your investment (basically all the BASIC/scripting capability would carry over to the internet environment). this sets things up for the large number of the integrity problems that are still going on today. Internet attachment appliance has a whole lot more security requirements from that of the small, closed (safe) business lan environment and totally different from the gaming markets. You don't want foreign applications from the internet to automatically execute on your machine ... and/or take over all aspects of your machine operation. Trying to meet the diametrically opposing security requirements on a single platform has been an enormous challenge (but frequently is at the root of the majority of the exploits in the world today). -- 42yrs virtualization experience (since Jan68), online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM QUESTION - MOVING TO DASD FROM TAPE - ML2
This is just one of the reasons I really like this group. It gives me the chance to hear about how other shops are doing things that are different than my approach to similar issues. I'm so used to dealing with a homogeneous shop (1 kind of DASD) that I wasn't even thinking about using older, slower DASD for ML2. Although putting my ML2 on a tapeless Virtual Tape System is effectively doing that also. We're just choosing to eliminate the ML1 as I have lots of ways places I can use all that DASD space. Our recall times from the VTS are more than adequate for our purposes as we've got fairly good standards (or at least standards that work for us) for how long datasets remain on primary. And if we find there are some applications that are having an issue with the small delays recalling from ML2, I'll adjust their management classes to give them a more suitable time on primary. This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JOB - etc
IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 04/20/2010 07:24:56 AM: Yes to all of that Puzzled me too ... Never seen it before I am aware of the concatenation restriction on APF authorised load libraries (and the integrity reasoning behind it), but there are no steplibs in the job and the Joblib is, obviously, the same for all steps. What is that integrity reasoning? Doesn't LINKLIST nowadays support a mixture of authorized and unauthorized libraries, with the authorization of the step depending on the status of the individual data set from which the module was loaded? Is it merely that since the programmer controls the content of STEPLIB there's little utility in supporting similar behavior in STEPLIB? For an ordinary concatenation, contents supervisor knows only whether the entire concatenation is authorized, via a bit in the DEB which is set by OPEN processing. For LNKLST, contents supervisor built the concatenation and did the OPEN, so it can be aware of the authorization separately for each data set. The isn't much value in having that granularity for STEPLIB, since an authorized jobstep can't load anything from an unauthorized library. Jim Mulder z/OS System Test IBM Corp. Poughkeepsie, NY -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: (slightly OT - Linux) Did IBM bet on the wrong OS?
On Tue, 20 Apr 2010 11:06:53 -0400, Anne Lynn Wheeler l...@garlic.com wrote: --snip the mainstream unix market from the early 80s ... was up until then new computer vendors spent huge amount of money on proprietary computer and proprietary operating system. The advent of single chip processors drastically dropped the cost of developing computer system (in workstation and mini market) ... and doing new proprietary operating system became many times larger than doing the hardware. To drop the cost of operating system to compareable to hardware costs ... required adopting portable, relatively off-the-shelf software ... at the time it was unix.snip Ah yes. In 1983 my mentor at Monsanto in Brussels offered me work back in the UK and for various reasons I decided to go. I ended up at a one horse operation in South London reselling Onyx boxes which I think were Zylog Z80 and Fortune office systems - a really neat Moto6800 box with its own version of UNIX (Onyx used 4.2). Mentor went shortly afterwards, probably pushed, then Plexus replaced Onyx (Z800? with System III). These were all really nice boxes that what today is called an SME could afford. I recall some word processing software from Redwood, but what stuck for the rest of my career was a hatred of printers, the flimsy mechanical beasts of the day would never do what you wanted and always broke. Don't talk to me about sheet feeders! One of the customers, a burglar alarm company, bought the one horse outfit and I spent a couple of weeks in the shadow of Strangeways prison in Manchester coupling a serial card in a Plexus to an alarm switchboard so it would print out the details of where to go when someone broke in. Sanity soon prevailed and I used some GUIDE contacts to get back to real computers, an Amdahl V7 near the Tower of London (you were not allowed to build within arrow shot of the Tower). My old mentor was responsible for many of the macros I used in file 172 and instilled in me his Assembler standards - comment everything, one page per sub-routine, one in and one out etc. etc.. Anyone heard of Dean Moorcroft this century? There were some real characters in computers then. DC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
TCPIP question
Hi List, I know this is IBM-main and not the TCPIP list but I get better responses here anyway. :-) That said, is there some way of getting the IP address that is bound to an OSA card from the z/OS console? We have operations staff trying to bring up our Z at a hotsite but I can't remote into a TN3270 session. We can't ping the address it is supposed to be using either. I do have remote access to the console, but nothing else and would like to figure out what IP address is beingbound to the OSA card. If I kill and restart TCPIP, it shows the port come active but the IP address I have documented at that port doesn't respond. Thanks. Rex -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
IBM Redbooks | z/OS Version 1 Release 11 Implementation
Might be of some interest. I haven't read it yet. http://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/sg247729.html?Open -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TCPIP question
On 4/20/2010 3:06 PM, Pommier, Rex R. wrote: Hi List, I know this is IBM-main and not the TCPIP list but I get better responses here anyway. :-) That said, is there some way of getting the IP address that is bound to an OSA card from the z/OS console? We have operations staff trying to bring up our Z at a hotsite but I can't remote into a TN3270 session. We can't ping the address it is supposed to be using either. I do have remote access to the console, but nothing else and would like to figure out what IP address is beingbound to the OSA card. If I kill and restart TCPIP, it shows the port come active but the IP address I have documented at that port doesn't respond. Thanks. Rex D TCPIP,,N,HOME will show the addresses for each device. You might also want to do a D TCPIP,,N,ROUTE to check you route statements. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TCPIP question
On Tue, 20 Apr 2010 15:05:14 -0500, Pommier, Rex R. rex.pomm...@cnasurety.com wrote: Hi List, I know this is IBM-main and not the TCPIP list but I get better responses here anyway. :-) That said, is there some way of getting the IP address that is bound to an OSA card from the z/OS console? We have operations staff trying to bring up our Z at a hotsite but I can't remote into a TN3270 session. We can't ping the address it is supposed to be using either. I do have remote access to the console, but nothing else and would like to figure out what IP address is beingbound to the OSA card. If I kill and restart TCPIP, it shows the port come active but the IP address I have documented at that port doesn't respond. Thanks. Rex Rex, you may also want to try doing a TRACERT ip address from a command prompt and see if it is even getting there. There may be some ACLs set up that restrict you from getting there. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TCPIP question
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Pommier, Rex R. Sent: Tuesday, April 20, 2010 3:05 PM To: IBM-MAIN@bama.ua.edu Subject: TCPIP question Hi List, I know this is IBM-main and not the TCPIP list but I get better responses here anyway. :-) That said, is there some way of getting the IP address that is bound to an OSA card from the z/OS console? We have operations staff trying to bring up our Z at a hotsite but I can't remote into a TN3270 session. We can't ping the address it is supposed to be using either. I do have remote access to the console, but nothing else and would like to figure out what IP address is beingbound to the OSA card. If I kill and restart TCPIP, it shows the port come active but the IP address I have documented at that port doesn't respond. Thanks. Rex D TCPIP,,NETSTAT,HOME example response: response EZZ2500I NETSTAT CS V1R10 TCPIP 682 HOME ADDRESS LIST: ADDRESS LINK FLG 10.170.30.8 OSA00L P 10.170.30.9 OSA52L 10.170.30.10 VIPA1L 192.168.151.1IQDFCL 192.168.152.1IQDFDL 127.0.0.1LOOPBACK 6 OF 6 RECORDS DISPLAYED END OF THE REPORT /response The P under FLG indicates this is the PRIMARY address. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JOB - etc
---snip- From: Peter Nuttall Date: Tue, 20 Apr 2010 07:48:46 +0200 Yes to all of that Puzzled me too ... Never seen it before I am aware of the concatenation restriction on APF authorised load libraries (and the integrity reasoning behind it), but there are no steplibs in the job and the Joblib is, obviously, the same for all steps. What is that integrity reasoning? Doesn't LINKLIST nowadays support a mixture of authorized and unauthorized libraries, with the authorization of the step depending on the status of the individual data set from which the module was loaded? Is it merely that since the programmer controls the content of STEPLIB there's little utility in supporting similar behavior in STEPLIB? -- gil unsnip-- I suspect that it's based on the premise that the LINKLIST libraries are controlled by a security-conscious Systems Programming staff, whereas STEPLIB can access any loadlib, including, perhaps, a library with modules of malicious intent or design. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TCPIP question
Thanks, John, Patrick, and Richard. I knew it had to be something simple (needless to say I had a head-slap DUH moment). I was looking in the FM under D TELNET commands and forgot completely about NETSTAT. Thanks again. Rex -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Tuesday, April 20, 2010 3:32 PM To: IBM-MAIN@bama.ua.edu Subject: Re: TCPIP question -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Pommier, Rex R. Sent: Tuesday, April 20, 2010 3:05 PM To: IBM-MAIN@bama.ua.edu Subject: TCPIP question Hi List, I know this is IBM-main and not the TCPIP list but I get better responses here anyway. :-) That said, is there some way of getting the IP address that is bound to an OSA card from the z/OS console? We have operations staff trying to bring up our Z at a hotsite but I can't remote into a TN3270 session. We can't ping the address it is supposed to be using either. I do have remote access to the console, but nothing else and would like to figure out what IP address is beingbound to the OSA card. If I kill and restart TCPIP, it shows the port come active but the IP address I have documented at that port doesn't respond. Thanks. Rex D TCPIP,,NETSTAT,HOME example response: response EZZ2500I NETSTAT CS V1R10 TCPIP 682 HOME ADDRESS LIST: ADDRESS LINK FLG 10.170.30.8 OSA00L P 10.170.30.9 OSA52L 10.170.30.10 VIPA1L 192.168.151.1IQDFCL 192.168.152.1IQDFDL 127.0.0.1LOOPBACK 6 OF 6 RECORDS DISPLAYED END OF THE REPORT /response The P under FLG indicates this is the PRIMARY address. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc
Chris Craddock and now Jim Mulder have exhausted this topic; but moribund threads often take a long time to die here; instead, like a second-tier operatic heroine, they go on singing interminably. An authorized step cannot load a member from an unauthorized library; and an unauthorized step cannot of course load a member from an authorized library. E basta. John Gilmore Ashland, MA 01721-1817 USA _ The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with Hotmail. http://www.windowslive.com/campaign/thenewbusy?tile=multicalendarocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_5 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc
On 4/20/2010 5:18 PM, john gilmore wrote: An authorized step cannot load a member from an unauthorized library; and an unauthorized step cannot of course load a member from an authorized library. E basta. An authorized step can go into key zero and set the appropriate DEB bit for the unauthorized library. I've been doing this since the early days of MVS to test and debug authorized code before wasting space in the normal authorized libraries. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc?
On Tue, 20 Apr 2010 21:18:52 + john gilmore john_w_gilm...@msn.com wrote: :Chris Craddock and now Jim Mulder have exhausted this topic; but moribund threads often take a long time to die here; instead, like a second-tier operatic heroine, they go on singing interminably. :An authorized step cannot load a member from an unauthorized library; Correct : and an unauthorized step cannot of course load a member from an authorized library. E basta. False. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JO B - etc
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of john gilmore Sent: Tuesday, April 20, 2010 4:19 PM To: IBM-MAIN@bama.ua.edu Subject: Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc Chris Craddock and now Jim Mulder have exhausted this topic; but moribund threads often take a long time to die here; instead, like a second-tier operatic heroine, they go on singing interminably. An authorized step cannot load a member from an unauthorized library; and an unauthorized step cannot of course load a member from an authorized library. E basta. SNIP Actually, an authorized program can attach a daughter task, have it MODESET to PROB. The daughter task then does a LOAD(s), then POSTs the JS TCB when done. The authorized program, which is still in SUPSTATE under the JS TCB, promptly resets the JSCBAUTH I know of about three products that did this for various reasons. I don't know if they still do. Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc?
On Tue, 20 Apr 2010 17:33:45 -0400 Gerhard Postpischil gerh...@valley.net wrote: :On 4/20/2010 5:18 PM, john gilmore wrote: : An authorized step cannot load a member from an unauthorized : library; and an unauthorized step cannot of course load a : member from an authorized library. E basta. :An authorized step can go into key zero and set the appropriate :DEB bit for the unauthorized library. I've been doing this :since the early days of MVS to test and debug authorized code :before wasting space in the normal authorized libraries. Or it can use BSAM to read the module and perform relocation. An authorized program can pretty much do anything in the computer. The point was that the system attempts to protect the authorized routine by not allowing the direct method of loading from an unauthorized library. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF autho risation i n middle o f JOB - et c
Gerhard Postpischil writes: An authorized step can go into key zero and set the appropriate DEB bit for the unauthorized library. I've been doing this since the early days of MVS to test and debug authorized code before wasting space in the normal authorized libraries. Your riposte, if that's what it is, comes down to the assertion that you know how to make an unauthorized library into an authorized one dynamically, at which point an authorized task or jobstep can load something from it. I know how to do this, and I am happy to stipulate that you do too. My point that an authorized step cannot load something from an unauthorized library stands. John Gilmore Ashland, MA 01721-1817 USA _ Hotmail is redefining busy with tools for the New Busy. Get more from your inbox. http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JO B - etc
IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 04/20/2010 05:42:36 PM: Actually, an authorized program can attach a daughter task, have it MODESET to PROB. The daughter task then does a LOAD(s), then POSTs the JS TCB when done. The authorized program, which is still in SUPSTATE under the JS TCB, promptly resets the JSCBAUTH I know of about three products that did this for various reasons. I don't know if they still do. An authorized program certainly has the power to circumvent the system's attempts to help you avoid system integrity exposures. That doesn't mean it is a good idea to do so. Now, simply LOADing code from an untrusted source into an APF authorized address space may arguably not be a problem. But I would strongly recommend against executing that code. Jim Mulder z/OS System Test IBM Corp. Poughkeepsie, NY -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ADRNAPF was IEBCOP Y losing APF authori sation in mi ddle of JOB - etc
With all of the discussion about APF and loading programs from various types of libraries, I'm hoping someone can provide some clarification for me regarding the ADRNAPF of the load macro. The doc indicates that a module can be loaded from a non-apf library when ADRNAPF is used from an authorized program in supervisor state. The doc further states that the it is the loading programs responsibility to ensure that program loaded from the non-apf library receives control in problem state. Please confirm that when the non-apf program receives control in problem state, it cannot change to supervisor state, discounting the possibility of using a magic svc, etc. Thanks, Sam 2010/4/20 john gilmore john_w_gilm...@msn.com Chris Craddock and now Jim Mulder have exhausted this topic; but moribund threads often take a long time to die here; instead, like a second-tier operatic heroine, they go on singing interminably. An authorized step cannot load a member from an unauthorized library; and an unauthorized step cannot of course load a member from an authorized library. E basta. John Gilmore Ashland, MA 01721-1817 USA _ The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with Hotmail. http://www.windowslive.com/campaign/thenewbusy?tile=multicalendarocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_5 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JOB - etc
On Tue, 20 Apr 2010 15:36:30 -0500, Rick Fochtman wrote: ---snip- From:Peter Nuttall Date:Tue, 20 Apr 2010 07:48:46 +0200 Yes to all of that Puzzled me too ... Never seen it before I am aware of the concatenation restriction on APF authorised load libraries (and the integrity reasoning behind it), but there are no steplibs in the job and the Joblib is, obviously, the same for all steps. What is that integrity reasoning? Doesn't LINKLIST nowadays support a mixture of authorized and unauthorized libraries, with the authorization of the step depending on the status of the individual data set from which the module was loaded? Is it merely that since the programmer controls the content of STEPLIB there's little utility in supporting similar behavior in STEPLIB? -- gil unsnip-- I suspect that it's based on the premise that the LINKLIST libraries are controlled by a security-conscious Systems Programming staff, whereas STEPLIB can access any loadlib, including, perhaps, a library with modules of malicious intent or design. ??? It can do that now; they just better not be authorized (unless they're GIMSMP). I was envisioning that, as with LINKLIST, a load module loaded from an authorized catenand would run authorized; a load module loaded from an unauthorized catenand would run unauthorized. No security problem. Should have been easy to do, given that Jim M. says this determined by a bit in the DEB set at OPEN, and OPEN surely knows what data set the DEB belongs to. But, Jim says (and I agree, as stated above) that there's minimal value in mixing authorized and authorized data sets in STEPLIB. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Where ABEND reason code?
If I ATTACH a sub-task and it ABENDs, I know the ABEND code is in the ECB (in that double 12-bit format). Where is the reason code? TCBARC? Thanks in advance, Charles Mills -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOPY losing APF authorisation in middle of JOB - etc
On 20 April 2010 19:16, Paul Gilmartin paulgboul...@aim.com wrote: I was envisioning that, as with LINKLIST, a load module loaded from an authorized catenand would run authorized; a load module loaded from an unauthorized catenand would run unauthorized. No security problem. Should have been easy to do, given that Jim M. says this determined by a bit in the DEB set at OPEN, and OPEN surely knows what data set the DEB belongs to. But there's only one DEB for the whole concatenation. And the magic flag isn't in the section that represents each concatenation, though I suppose it could be. But, Jim says (and I agree, as stated above) that there's minimal value in mixing authorized and authorized data sets in STEPLIB. There might be a wee bit of an argument for doing it for JOBLIB, but still not enough to put in the effort. Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ADRNAPF was IEBCOP Y losing APF authori sation i n mi ddle of JOB - etc
On 20 April 2010 19:09, Sam Siegel s...@pscsi.net wrote: With all of the discussion about APF and loading programs from various types of libraries, I'm hoping someone can provide some clarification for me regarding the ADRNAPF of the load macro. The doc indicates that a module can be loaded from a non-apf library when ADRNAPF is used from an authorized program in supervisor state. The doc further states that the it is the loading programs responsibility to ensure that program loaded from the non-apf library receives control in problem state. Please confirm that when the non-apf program receives control in problem state, it cannot change to supervisor state, discounting the possibility of using a magic svc, etc. How do you propose to pass control to your newly loaded code in problem state? If you just MODESET to problem state and BALR, then presumably the called program could issue a MODESET back to supervisor state, just like any other code running in an APF authorized job step. If not, then one must assume that the jobstep has lost APF authorization, and that seems most unlikely in this context. If you use SYNCH or ATTACH with JSTCB=YES, then you're in a whole different world, but System Integrity is still very much your responsibility. Be careful. Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
DEB (was: IEBCOPY losing APF authorisation)
On Tue, 20 Apr 2010 19:37:57 -0400, Tony Harminc wrote: On 20 April 2010 19:16, Paul Gilmartin wrote: I was envisioning that, as with LINKLIST, a load module loaded from an authorized catenand would run authorized; a load module loaded from an unauthorized catenand would run unauthorized. No security problem. Should have been easy to do, given that Jim M. says this determined by a bit in the DEB set at OPEN, and OPEN surely knows what data set the DEB belongs to. But there's only one DEB for the whole concatenation. And the magic flag isn't in the section that represents each concatenation, though I suppose it could be. I had thought there was a DEB for each Extent in each Data set in the concatenation. I guess I don't understand how DEBs work. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DEB (was: IEBCOPY losing APF authorisation)
On 4/20/2010 7:48 PM, Paul Gilmartin wrote: I had thought there was a DEB for each Extent in each Data set in the concatenation. I guess I don't understand how DEBs work. The DEB has a prefix, with mostly access method information, a basic section with links (DCB, TCB) and flags, and a device dependent variable section. For DASD, each extent of each file uses sixteen bytes to contain the mode flags, UCB address, start and end CCHH addresses, and a halfword track count. For a BPAM data set, it additionally contains 1-15 bytes relating the first extent of each data set in the concatenation to the physical number in the DEB. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc?
On 4/20/2010 5:54 PM, Binyamin Dissen wrote: Or it can use BSAM to read the module and perform relocation. An authorized program can pretty much do anything in the computer. I've got a subroutine to do that, too, with provision for passing an arbitrary relocation address. It's used in a debugger to do a quick CLCL to check for changes to the module code. The point was that the system attempts to protect the authorized routine by not allowing the direct method of loading from an unauthorized library. I have no issue with the concept, only the language of the statement, which is demonstrably false. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF autho risation i n middle o f JOB - et c
On 4/20/2010 6:11 PM, john gilmore wrote: Your riposte, if that's what it is, comes down to the assertion that you know how to make an unauthorized library into an authorized one dynamically, at which point an authorized task or jobstep can load something from it. I know how to do this, and I am happy to stipulate that you do too. My point that an authorized step cannot load something from an unauthorized library stands. http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zsecurity/zsecc_060.htm (sorry about the wrap) Authorized libraries are defined in an APF list, or in the link pack area. Any module in the link pack area (pageable LPA, modified LPA, fixed LPA, or dynamic LPA) will be treated by the system as though it came from an APF-authorized library. IBM defines an authorized library as one that is specified in the system's static or dynamic APF table (the others are not relevant to this argument). Authorizing the DEB does not authorize the library, Q.E.D. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Getting Partition name defined in the IODF
Hi, How Can I get the partition name defined in a IODF. I want to get this data using REXX. I dont want to use the d m=cpu command. Is it possible. -- Regards, Dinesh Thakur Mainframe Sysprog Supporting MQ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ICH409I 878-000 ABEND DURING RACHECK PROCESSING
I'm getting the subject message followed eventually by an S40D-10 ABEND. The offending program is a C++ program that is using ATTACH to load the IBM OS PL/I Version 2 compiler (5668-910). The compiler gets at least a ways into its processing before the ABEND. It's hard to tell exactly where the ABEND occurs because S40D makes a real mess of things: spool datasets are incomplete, the NOTIFY message does not have the return code, the job log says (UNKNOWN) MINUTES EXECUTION TIME, etc. S40D-10 is No storage was available in either the local system queue area (LSQA) or the extended local system queue area (ELSQA) for the RTM2WA. The REGION is 100M and I've got the PL/I compiler limited to SIZE(1000K). The C++ program runs without problem in 60M if it does not ATTACH the PL/I compiler. I can ATTACH at least some other programs (haven't tested every program g) without error. What sorts of things should I be looking for? Thanks, Charles Mills -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Getting Partition name defined in the IODF
Look for fields in the ECVT. - Original Message - From: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu To: IBM-MAIN@bama.ua.edu IBM-MAIN@bama.ua.edu Sent: Tue Apr 20 19:57:27 2010 Subject: Getting Partition name defined in the IODF Hi, How Can I get the partition name defined in a IODF. I want to get this data using REXX. I dont want to use the d m=cpu command. Is it possible. -- Regards, Dinesh Thakur Mainframe Sysprog Supporting MQ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc
Chris Craddock and now Jim Mulder have exhausted this topic; but moribund threads often take a long time to die here; instead, like a second-tier operatic heroine, they go on singing interminably. I'd say there are still outstanding questions; the OP said it happened again. Since the answer to the question WHY? has not been heard, how does this make the thread moribund? - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ADRNAPF was IEBCOP Y losing APF authori sation i n mi ddle of JOB - etc
On Tue, Apr 20, 2010 at 6:09 PM, Sam Siegel s...@pscsi.net wrote: With all of the discussion about APF and loading programs from various types of libraries, I'm hoping someone can provide some clarification for me regarding the ADRNAPF of the load macro. The doc indicates that a module can be loaded from a non-apf library when ADRNAPF is used from an authorized program in supervisor state. The doc further states that the it is the loading programs responsibility to ensure that program loaded from the non-apf library receives control in problem state. Please confirm that when the non-apf program receives control in problem state, it cannot change to supervisor state, discounting the possibility of using a magic svc, etc. the point of ADRNAPF is to allow supervisor state system functions like (say) the initiator or IMS to load garden variety programs from garden variety load libraries without jumping through hoops. That almost certainly existed (undocumented) for a long time and then at some point somebody probably said oh that would probably be a useful function for ISVs too and added the macro documentation to allow access to it. The warning about the loading program's responsibility for maintaining integrity should be fairly obvious. System components can be relied upon NOT to allow the loaded program to get control in a privileged condition. Anyone else that uses those functions has to follow the same rules. -- This email might be from the artist formerly known as CC (or not) You be the judge. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html