Re: RMM EDGRRPTE printing Problem

2010-04-20 Thread Crispin Hugo
Mike,
Thanks for the info. I am printing to z/VM. I have a job that uses
EDGRRPTE for some reports then produces a report14 that I have modified.
The o/p from the EDGRRPTE has printer control chars in column 2 and
second report has printer control chars in column 1.

   K00080 DFSZOSAD.DR.PRODZOS.ZARES1 *1
1
   K00130 USZOS109.DR.Z9RES1 *1
1
 - End of Report.   19
En
 1 DFSMSrmm MACRO 4 INTERNAL USE ONLY  Movement
Repor
   EDGRPT14  from location
M4
 

 - Volume  BIN Vol- DSN-

   Serial Data Set NameNumber  Seq. Seq.

   --  --- 
-
   J00186 DFSVMD.LOCAL.DLY.SARES1*1
1
 - End of Report.   1
Ent
 

1Movement Report by Volume Serial- 1 -2010/04/19
1
 

 To Destination / From Location  OFFDRM4ATL

 

 Job Name   Volume   Volseq#   Dataset Name

    --   ---
--
 DFSMSHSM   J00305  1  SMSHSM.COPY.HMIGTAPE.DATASET  


JCL:
//EXTRPDT  EXEC PGM=IKJEFT01,DYNAMNBR=99,REGION=4096K   
//SYSTSPRT DD   SYSOUT=X
//SYSPRINT DD   SYSOUT=X
//SORTIN   DD   DISP=SHR,DSN=RMM.HSKP.EXTRACT   
//SORTOUT  DD   DSN=TEMP01,DISP=(,PASS,DELETE),
// SPACE=(CYL,(200,20),RLSE),UNIT=SYSALLDA, 
// DCB=*.SORTIN 
//SYSINDD   DSN=TEMP02,DISP=(,PASS,DELETE),
// SPACE=(TRK,(1,1),RLSE),UNIT=SYSALLDA,
// DCB=(LRECL=80,BLKSIZE=3120,RECFM=FB) 
//SYSOUT   DD   SYSOUT=X
//REPORT14 DD  SYSOUT=Y 
//SYSTSIN  DD   *   
 EX 'SYS1.SEDGEXE1(EDGRRPTE)' - 
'054 MACRO 4 INTERNAL USE ONLY' 
//*  
//WRITE1   EXEC PGM=ICETOOL,REGION=0M  
//SYSPRINT DD SYSOUT=X 
//TOOLMSG  DD SYSOUT=X 
//DFSMSG   DD SYSOUT=X 
//INDD DD DSN=RMM.HSKP.EXTRACT,
//DISP=SHR 
//OUTDDDD SYSOUT=Y 
//TEMP DD UNIT=SYSALLDA,SPACE=(TRK,(5,25)) 
//TOOLIN   DD *
 SORT FROM(INDD)  TO(TEMP) USING(INCL) 
 DISPLAY FROM(TEMP) LIST(OUTDD) -  
 TITLE('Movement Report by Volume Serial') -   
 PAGE DATE(4MD/) TIME -
 HEADER('Job Name') ON(23,8,CH) -  
 HEADER('Volume') ON(32,6,CH) -
 HEADER('Volseq#') ON(39,4,CH) -   
 HEADER('Dataset Name') ON(44,44,CH) - 
 HEADER('Create Date') ON(89,10,CH) -  
 BTITLE('To Destination / From Location') -
 BREAK(5,18,CH) -  
 BTOTAL('') -  
 BLANK -   
 TOTAL('REMOVABLE MEDIA MANAGER')  
//INCLCNTL DD DSN=INCL,DISP=(OLD,PASS)   /*...@02c*/


Crispin Hugo
Systems Programmer
Macro 4 Limited
 
Direct Line: +44 (0)1293 872121, Switchboard: +44 (0)1293 872000, Fax:
+44 (0)1293 872001
 
A Division of the UNICOM Group of Companies
www.macro4.com   
 
Macro 4 Registered office :The Orangery, Turners Hill Road, Worth,
Crawley, West Sussex, RH10 4SS
Registered in England no. 927588
 
Please consider the environment and THINK before you print this email.
 
Email Disclaimer

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Mike Wood
Sent: 19 April 2010 17:58
To: IBM-MAIN@bama.ua.edu
Subject: Re: RMM EDGRRPTE printing Problem

Crispin,  The reports are LRECL=133,RECFM=FBA - so first char is a ANSI
print control character when the records are written by the exec
EDGRRPTE.
If you are creating a DASD data set then subsequently printing that, be
sure
the utility you use understands there is an existing print control
character
in each record.
Similarly, if created as a SYSOUT file and now you 

Re: Internal (program) start of an STC - MGCRE vs. ASCRE

2010-04-20 Thread Hunkeler Peter (KIUP 4)
This is far simplier than a RACROUTE REQUEST=VERIFY or 
IRRSIA00 in that it does not require supervisor state or 
APF authorization, but the JrEnvDirty seems to imply the 
program must be program controlled. I know what that 
means for PDS resident programs, but not HFS resident 
programs. At least as far as I can tell from the manual.

There is an extended attribute called program control which
you set with extattr +p pathname. You'd need READ on
BPX.FILEATTR.PROGCTL FACILITY class profile to be allowed to
set that bit. If the address space needs to stay clean,
all modules loaded must have been loaded from a program
controlled library or must have the program control
extended attribte set if loaded from the file system.

--
Peter Hunkeler
Credit Suisse

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: COUPLE DATA SET TIME STAMPS

2010-04-20 Thread Zaromil Tisler
On Mon, 19 Apr 2010 05:14:09 -0500, Barbara Nitz wrote:

You may run into problems with the LOGR CDS. Check out II5 if that
applies to you. IIRC, the problem was going forward in time for LOGR.

Where can I find II5? Technical help database answer I get is:

No documents match your query. Please revise your search criteria.


-- 
Zaromil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: COUPLE DATA SET TIME STAMPS

2010-04-20 Thread Barbara Nitz
Where can I find II5? Technical help database answer I get is:

No documents match your query. Please revise your search criteria.

Strange. Maybe I mistyped the number. 
Search SIS for LOGR Y2K. This problem came up a lot in Y2K testing. I think 
yesterdays' search gave me only a handful of hits.

Regards, Barbara

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: (slightly OT - Linux) Did IBM bet on the wrong OS?

2010-04-20 Thread Bob goolsby
And what would have been the alternative OS for IBM to have backed?  OS/2???




On Mon, Apr 19, 2010 at 10:06 PM, Ed Gould ps2...@yahoo.com wrote:
 http://www.informationweek.com/news/software/open_source/showArticle.jhtml?articleID=224400309

 Linux Graybeards? Yes, But Also A Wisdom Circle



 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html





-- 

Bob Goolsby
bob.gool...@gmail.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM QUESTION - MOVING TO DASD FROM TAPE - ML2

2010-04-20 Thread Bri P
I did exactly this about two years ago.

Yes you can do it. HSM is not very good at it (DASD backups) though. You may 
want to consider alternatives if you have particularly long-term requirements 
for keeping your backup data.

My reasons were that by then only HSM used tape, and we wanted to get rid of 
the tape units, to save floor space, power usage, and maintenance costs.

The other, most compelling, reason was DR. Our main disk unit is a DS6800 with 
PPRC to a remote site. It has around 25% FC disk and 75% FATA - cheapear 
because they're (supposedly) slower, but a blind man would be glad to notice, 
even they are much quicker than the RVA we had before). Even in asynchronous 
mode, the PPRC replicates in near-real time, with a latency or around 7 to 8 
seconds. There's no way I can replicate tape data in step with that. We've now 
got our DR cutover - including all network switching, NAT changes etc - down to 
around 20 minutes all-up, so we're available for end-users to get on and do 
real work in that time.

When we were using tape (even though it was virtual tape) we were hindered by 
the possibility that ML2 and backup data may not have been replicated yet (in 
which case we'd have to wait, sometimes up to four hours, for that to happen) 
or in the event of a real disaster, we might be in the position where the ML2 
and/or backup data would not get replicated at all, and we'd have a lot of 
repairs to make on the production system. For example, if the outage happened 
between the ML1/Backup data being written and before it (completed) being 
replicated - you won't have the data, but the HSM CDS's think you have it. All 
extra work in a DR when you really really want to keep things as simple as 
possible.

The first thing I did was increase the size of the ML1 pool and stop creating 
ML2 data, leaving it for the rest of its life on ML1 instead. All of the MLx 
data is now replicated to the DR site over the PPRC. But this is the easy bit 
really. I wouldn't try putting ML2 on DASD, I can't really think of a good 
reason to do that. 

To do backups to DASD is a bit more painful. You have to pre-define daily a set 
of daily backup volumes - HSM cannot dynamically add them as it will for tape. 
You need one volume for each backup task that you want to run, plus a couple 
more in the event that one fills. If one fills during the backup run and no 
more are available, the backup process issues messasges about the task waiting 
for a volume, hangs, and moves on to the next task, (which may or may not do 
the same, depending on whether other tasks have finished and freed up a volume 
with space on). I've not found a way to recover from this other than shutting 
down HSM (cancelling), adding volumes, and restarting. You'll need to keep an 
eye on the backup volume usage, as HSM won't do it for you, or do any 
housekeeping on them other than EXPIREBV processing. In addition, HSM does not 
seem to apply any kind of intelligent selection of volumes from the daily set, 
e.g., which ones have the most space.. It just uses the fi!
 rst one in the list and goes from there, so the spare capacity you've provided 
for contingency could (probably will) sit there most of the time 90 or more % 
empty for most of the time, which might waste precious disk space if you don't 
have a lot spare. I've also noticed that, for some reason I've not been able to 
explain, DASD backup seems to take about twice as long as it did on tape. My 
backup window went from around 1.5 hours on tape, to 2.5-3.0 hours on DASD. 

I always think there are about three main reasons why you do backups:
- DR, for recovering the entire system; 
- 'idiot' backups, for local, small-volume recoveries of corrupted or 
accidentally deleted files;
- archives, for long-term, usually out-of-sight-out-of-mind copies. 
So in my case the DR requirement is satisfied by PPRC, and the archives by the 
combination of PPRC and data management/retention policies in SMS/HSM. The data 
corruption/accidental deletion is still an issue however, since these kinds of 
actions will get replicated with PPRC. At a dataset level I mitigate for these 
with additional backup versions, but at the volume level it's still a problem 
for certain volumes, notably the HSM daily backup volumes. So I dump those and 
a few selected other ones daily (at the moment, still to tape, although I'm 
probably going to change that to DASD too). The difference is, I don't care 
about replicating that tape data now, there's no need, as it all gets junked 
and re-written each day anyway.


The parameters you've identified are about right, I think. I've got:

SETSYS BACKUP( + 
  DASD + 
  INUSE( + 
 RETRY(Y) + 
 DELAY(5) + 
 SERIALIZATION(PREFERRED) +
  ) + 
   ) 

SETSYS DSBACKUP( +
  DASD +
  TAPE( +
 TASKS(0) +
  ) +
   )

SETSYS TAPEMIGRATION( +
  NONE +
   )

And loads of 

Re: Link Failure IOS581E

2010-04-20 Thread Lizette Koehler
Brian,

Thanks, this information will help.

Lizette


 Brian Peterson Wrote:
 
 The group that handles the Cisco says they are not seeing any errors
 on the
 Cisco.  Some fluttering, but no failures.
 
 I would call fluttering a failure (albeit one which was recovered).
 My
 opinion.
 
 Ask your Cisco team to show you the FICON log from the MDS 9509 devices
 (both local and remote).  In similar circumstances on our system, we
 saw
 FICON events in the logs in the MDS 9509 devices that exactly
 correlated to
 IOS581E messages on z/OS.
 
 On our version of Cisco Device Manager 3.3(1c), the path to view the
 FICON
 events was Logs -- Switch Resident -- FICON Link Incidents
 
 Brian
 
 On Mon, 19 Apr 2010 17:46:54 -0400, Lizette Koehler wrote:
 
 I am trying to understand what this message is telling me and if it is
 serious.
 
 IOS581E LINK FAILED REPORTING CHPID=11 328
 INCIDENT UNIT  TM=0MDS9K/509 SER=CSC00-0989C3 IF=00E4  IC=03
 INCIDENT UNIT  LIF=E4
 ATTACHED UNIT  TM=0MDS9K/509 SER=CSC00-1A0043 IF=00E4
 ATTACHED UNIT  LIF=E4
 IOS581E LINK FAILED REPORTING CHPID=11 752
 INCIDENT UNIT  TM=0MDS9K/509 SER=CSC00-1A0043 IF=00E4  IC=04
 INCIDENT UNIT  LIF=E4
 ATTACHED UNIT  TM=0MDS9K/509 SER=CSC00-0989C3 IF=00E4
 ATTACHED UNIT  LIF=E4
 
 
 
 We have a z9 connected to a z10 through a Cisco Router and DWMW (Dense
 Wave?) hardware.  The group that handles the Cisco says they are not
 seeing
 any errors on the Cisco.  Some fluttering, but no failures.  I do not
 know
 about the Dense Wave device yet.
 
 Are these are serious as I assume or are they just something that
 happens
 and it does not impact my processes running on the Mainframe?
 
 I am thinking it might impact my DASD but I am not sure.  We are
 running a
 DMX4500 so we have traffic needed for our applications running from the
 z9
 to the z10 and back.  Mostly DB2 Stored procedures.
 
 I am pulling logrec and trying to see if there is anything interesting
 there.
 
 Just looking for guidance on what the IOS581E is trying to tell me.
 
 Lizette

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


The free MFNetDisk

2010-04-20 Thread Shai Hess
HI,

 The coming soon new MFNetDisk features:

1. One code for Linux and Windows.
2. Totally new Linux code. Until now I develop my code using Windows 
platform only and rarely (long time ago) the Linux platform. This time I 
install 
new Linux OpenSUSE 11.2 and I run MFNetDisk with MONO (2.6) product 
which enable running C# in Linux. I found many bugs with the old MFNetDisk 
running under Linux especially the PCTool GUI. Now the code is running with 
Windows and Linux without any problems. People who try to run the code 
under Linux, I must apology but why to complain if it is free.
3. I rewrite the API to enable reading directly MVS file from Linux or Windows 
without the involvement of MVS. I also add the source code of a Windows or 
Linux GUI application (in c#) which include all the main calling to the API 
which 
read MVS file from the open System without using MVS. I put many 
improvement to the new code. Using this sample source code (working code) 
will easier the use of the API. 
4. I need to delete all the LICKEY record to enable free use of my code. This 
will take few days to comment out some code and testing the new code.
5. I will add some documentation about the Linux and the new MVSAPI to read 
MVS files from Linux/Windows.

I will let you know when the new code is ready.

Thanks,
Shai

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JOB - etc

2010-04-20 Thread Paul Gilmartin
 From: Peter Nuttall
 Date: Tue, 20 Apr 2010 07:48:46 +0200
 
 Yes to all of that  Puzzled me too ... Never seen it before  I am
 aware of the concatenation restriction on APF authorised load libraries
 (and the integrity reasoning behind it), but there are no steplibs in the
 job and the Joblib is, obviously, the same for all steps.
 
What is that integrity reasoning?  Doesn't LINKLIST nowadays support
a mixture of authorized and unauthorized libraries, with the authorization
of the step depending on the status of the individual data set from
which the module was loaded?

Is it merely that since the programmer controls the content of STEPLIB
there's little utility in supporting similar behavior in STEPLIB?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 45 years of Mainframe

2010-04-20 Thread Kelman, Tom
This is all very interesting.  My first real programming job was as a
coop student at a DuPont nylon manufacturing plant in Seaford, Delaware.
I was in the Works Engineering Department which was responsible for the
onsite power plant, the electricians, the electronics shop, and
engineering planning for all those areas.  Each quarter I was rotated to
a different area.  My forth quarter back at work I was in the planning
area.  The company had just replaced their 1410 system for one of those
new fangled 360 computers.  They had also gotten a 1620 for the
engineering planning group.  I became the programmer for the group.  In
successive quarters back I stayed in that group.  My two biggest
accomplishments were a fairly simple generalized statistical routine and
a planning program for the onsite power plant to track the power usage
and plan upgrades.  By the way, the nickname of the 1620 was the CADET
for Can't Add and Doesn't Even Try.  It didn't have the normal
addition/multiplication registers of the 360.  Instead it did all of
it's addition and multiplication via table lookup from tables it kept on
the rotating disk.  I understand that the same hardware design was used
in the first IBM 3890 Check Sorters.  The main function of those
machines was to determine a sort pocket for the check by looking up the
routing transit code and/or account number in a table.

Tom Kelman
Enterprise Capacity Planner
Commerce Bank of Kansas City
(816) 760-7632
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of Joel C. Ewing
 Sent: Monday, April 19, 2010 8:06 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: 45 years of Mainframe
 
 On 04/19/2010 05:06 PM, Tom Russell wrote:
  I, alas, started on a much slower
  machine, the 650, about which I feel *no* nostalgia. I do, however,
  have fond memories of the 7094.
 
  Nice.  My first job as a coop student at IBM was to convert a 650
SOAP
  program that ran the Toronto plant to a 1401 card system Autocoder
  program.  I think I still have the card systems Autocoder compiler
decks
  somewhere. I did read the SOAP program to figure out what the
program
 did,
  but never wrote any 650 code myself.
 
  Not a fond memory, but an interesting one.  The 650 we were taking
out
 had
  a 2 (4?) KB drum memory.  The autocoder (think BAL) program I wrote
to
  replace it was for a 4 KB 1401 card system.  High/Low/Equal compare
was
 a
  special feature on a 1401.
 
 
  Tom Russell
 
 
 IBM 650 drum memory was in 40 tracks or 50 words, containing decimal
 digits, not Bytes.  Total capacity was 2000 words, with each word an
 instruction or data, 10 decimal digits plus sign, each digit
represented
 by bi-quinary encoding (7 bits). It could be thought of as roughly
 equivalent to 20K decimal digits or 10K characters.
 
 Around 1961-1962 as a high school student in Norman, OK, I read the
IBM
 650 manuals and wrote some simple code examples for the 650 at O.U.;
but
 it was an expensive and temperamental beast with no free time, so I
was
 steered toward a new IBM 1620 that had much idle time, and learned to
do
 my first real programming on that machine.  The IBM 650 was replaced
not
 that long after with an IBM 1410. I can still recall people discussing
 research that was negatively impacted by the need to re-write
 application code whenever a new machine was acquired.
 
 --
 Joel C. Ewing, Fort Smith, ARjremoveccapsew...@acm.org
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


*
If you wish to communicate securely with Commerce Bank and its
affiliates, you must log into your account under Online Services at 
http://www.commercebank.com or use the Commerce Bank Secure
Email Message Center at https://securemail.commercebank.com

NOTICE: This electronic mail message and any attached files are
confidential. The information is exclusively for the use of the
individual or entity intended as the recipient. If you are not
the intended recipient, any use, copying, printing, reviewing,
retention, disclosure, distribution or forwarding of the message
or any attached file is not authorized and is strictly prohibited.
If you have received this electronic mail message in error, please
advise the sender by reply electronic mail immediately and
permanently delete the original transmission, any attachments
and any copies of this message from your computer system.
*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the 

Re: IEBCOPY losing APF authorisation in middle of JOB.

2010-04-20 Thread Elardus Engelbrecht
Peter Nuttal wrote: 

Just wondered if anybody else has come across this phenomenon. We are  
z/OS 01.09.00. Have a job running a set of IEBCOPY steps and the 8th step  
failed with : 
 
IEB1099E *** IEBCOPY IS NOT APF AUTHORIZED ***  
 
All the other steps worked ... The rerun of the job from the failing step  
worked successfully  

Lets see. Rerun works. Without ANY changes at all?

Anyone got any ideas ? 

After reviewing all replies up to now, I'm thinking something changed the APF 
list just before step 8. Check your SMF and/or RACF records for evidence.

HTH!

Groete / Greetings
Elardus Engelbrecht 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Multiple logon SMCS possibility

2010-04-20 Thread van Ek, Marcel
We are setting up a few SMCS consoles for remote access.

 

It appears that you can only logon with the same userid once. I can
understand that if it were on the same lpar,

But is there a way we can reuse the same userid to logon to an SMCS
console on different lpars (uid defined on all lpars, different LU's)
but on the same sysplex?

The RACF db's are different, I can logon to TSO with the same uid on
different lpars, so why not to SMCS consoles?

Is this a strict SMCS restriction?

 

Regards,

 

Marcel van Ek

Atos Origin

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
ÿþDit bericht is vertrouwelijk en kan 
geheime informatie bevatten enkel

bestemd voor de geadresseerde. Indien 
dit bericht niet voor u is bestemd,

verzoeken wij u dit onmiddellijk aan 
ons te melden en het bericht te

vernietigen.

Aangezien de integriteit van het 
bericht niet veilig gesteld is middels

verzending via internet, kan Atos 
Origin niet aansprakelijk worden 
gehouden

voor de inhoud daarvan.

Hoewel wij ons inspannen een virusvrij 
netwerk te hanteren, geven

wij geen enkele garantie dat dit 
bericht virusvrij is, noch aanvaarden 
wij

enige aansprakelijkheid voor de 
mogelijke aanwezigheid van een virus in 
dit

bericht.

 

Op al onze rechtsverhoudingen, 
aanbiedingen en overeenkomsten 
waaronder

Atos Origin goederen en/of diensten 
levert zijn met uitsluiting van alle

andere voorwaarden de 
Leveringsvoorwaarden van Atos Origin 
van toepassing.

Deze worden u op aanvraag direct 
kosteloos toegezonden.

 

This e-mail and the documents attached 
are confidential and intended solely

for the addressee; it may also be 
privileged. If you receive this e-mail

in error, please notify the sender 
immediately and destroy it.

As its integrity cannot be secured on 
the Internet, the Atos Origin group

liability cannot be triggered for the 
message content. Although the

sender endeavours to maintain a 
computer virus-free network, the sender

does not warrant that this transmission 
is virus-free and will not be

liable for any damages resulting from 
any virus transmitted.

 

On all offers and agreements under 
which Atos Origin supplies goods and/or

services of whatever nature, the Terms 
of Delivery from Atos Origin

exclusively apply. 

The Terms of Delivery shall be promptly 
submitted to you on your request.

 

Atos Origin Nederland B.V. / Utrecht

KvK Utrecht 30132762

Re: COUPLE DATA SET TIME STAMPS

2010-04-20 Thread Arthur Gutowski
On Mon, 19 Apr 2010 05:14:09 -0500, Barbara Nitz nitz-...@gmx.net 
wrote:

If there are WLM problems, it is fairly easy to unload the current WLM policy,
come up after IPL with an empty, freshly formatted WLM CDS, and then 'load'
the policy into it from your saved copy. There may even be a programmatic
interface to do that so you don't need to come up with an empty WLM CDS.

AFAIK, WLM, like Logger, only allows policy updates to the active (IPLd) 
couple datasets.  There is no DSName keyword to point to an inactive 
dataset, like there is with SFM and CFRM.  Also, AFAIK, there is no CFRMPOL-
like keyword to activate a new policy.

You could set something up during IPL to install and activate a policy 
(SystemRexx?), but I believe you'd still have to IPL with an empty dataset.

Regards,
Art Gutowski
Ford Motor Company

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 45 years of Mainframe

2010-04-20 Thread Howard Brazee
I started in college in 1969, a few months before we got our 360. But
I don't have so much experience having taken time off as a USAF pilot.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Antwort: Multiple logon SMCS possibility

2010-04-20 Thread Werner Kuehnel
Marcel,
we have two separate LPARs and can logon to each SMCS console with the 
same UID. There is no restriction.
However, the 2 LPARs have different system names (SYS1, SYS5) and we use 
system symbols in SMCS definitions to differentiate between them.

Werner Kuehnel

IMD-Gesellschaft für Informatik und Datenverarbeitung mbH 
Augustaanlage 66
68165 Mannheim

Tel: +49.621.457-4885, Fax: -4046

IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu schrieb am 20.04.2010 
14:54:53:

 We are setting up a few SMCS consoles for remote access.
 
 
 
 It appears that you can only logon with the same userid once. I can
 understand that if it were on the same lpar,
 
 But is there a way we can reuse the same userid to logon to an SMCS
 console on different lpars (uid defined on all lpars, different LU's)
 but on the same sysplex?
 
 The RACF db's are different, I can logon to TSO with the same uid on
 different lpars, so why not to SMCS consoles?
 
 Is this a strict SMCS restriction?
 
 
 
 Regards,
 
 
 
 Marcel van Ek
 
 Atos Origin
 
 
 
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 [Anhang disclaimer.txt gelöscht von Werner KUEHNEL/DIR/MANNHEIMER/DE] 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


supervisory state vs. authorized program

2010-04-20 Thread GOODWIN, DIANE M.
Hi all,
I'm a little confused - is there a difference (and if so, what is the
difference) between an assembler program that is in supervisory state
and an assembler program that is authorized?

Thanks in advance for your time.

Diane M. Goodwin
IT System Adminstration Specialist
Amica Insurance Company
email:  dgood...@amica.com

I'm not a cynic.  I'm a disappointed optimist.  - George Carlin



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: supervisory state vs. authorized program

2010-04-20 Thread Vernooij, CP - SPLXM
GOODWIN, DIANE M. dgood...@amica.com wrote in message
news:33a9a3874f87c24aab996586c367def805bf2...@hoex01.amica.com...
 Hi all,
 I'm a little confused - is there a difference (and if so, what is the
 difference) between an assembler program that is in supervisory
state
 and an assembler program that is authorized?
 
 Thanks in advance for your time.
 
 Diane M. Goodwin

If a program is APF authorized, it is allowed to execute 'authorized'
functions, a.o. put itself into 'supervisor state'.

Kees.

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


3494 EOM date

2010-04-20 Thread R.S.

Is EOM (End of Marketing) announced for IBM 3494 tape library?
Where such date can be found?


--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sąd Rejonowy dla m. st. Warszawy 
XII Wydział Gospodarczy Krajowego Rejestru Sądowego, 
nr rejestru przedsiębiorców KRS 025237

NIP: 526-021-50-88
Według stanu na dzień 01.01.2009 r. kapitał zakładowy BRE Banku SA (w całości 
wpłacony) wynosi 118.763.528 złotych. W związku z realizacją warunkowego 
podwyższenia kapitału zakładowego, na podstawie uchwały XXI WZ z dnia 16 marca 
2008r., oraz uchwały XVI NWZ z dnia 27 października 2008r., może ulec 
podwyższeniu do kwoty 123.763.528 zł. Akcje w podwyższonym kapitale zakładowym 
BRE Banku SA będą w całości opłacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: supervisory state vs. authorized program

2010-04-20 Thread Tony Lubrano
Diane,

An authorized program is entered in problem state and has the ability to get 
into supervisor state using a MODESET macro.  

Even though the program is authorized, it is not allowed to execute certain 
priviledged instructions or invoke certain priviledged system services until it 
is in supervisor state.

So, from a 70k foot level, an authorized program runs like an unauthorized 
program until it enters supervisor state.

Tony Lubrano
Product Author
NEON Enterprise Software, LLC.
p: 281.207.4922 f: 281.207.4973

What is zPrime?  Find out at www.zprime.com or just ask us!

From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of 
GOODWIN, DIANE M. [dgood...@amica.com]
Sent: Tuesday, April 20, 2010 8:45 AM
To: IBM-MAIN@bama.ua.edu
Subject: supervisory state vs. authorized program

Hi all,
I'm a little confused - is there a difference (and if so, what is the
difference) between an assembler program that is in supervisory state
and an assembler program that is authorized?

Thanks in advance for your time.

Diane M. Goodwin
IT System Adminstration Specialist
Amica Insurance Company
email:  dgood...@amica.com

I'm not a cynic.  I'm a disappointed optimist.  - George Carlin



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: supervisory state vs. authorized program

2010-04-20 Thread Binyamin Dissen
On Tue, 20 Apr 2010 09:45:07 -0400 GOODWIN, DIANE M. dgood...@amica.com
wrote:

:Hi all,
:I'm a little confused - is there a difference (and if so, what is the
:difference) between an assembler program that is in supervisory state
:and an assembler program that is authorized?

An authorized program has the potential to get into supervisor state but will
0C2 on instructions that require supervisor state.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 45 years of Mainframe

2010-04-20 Thread Anne Lynn Wheeler
re:
http://www.garlic.com/~lynn/2010h.html#29 45 years of Mainframe
http://www.garlic.com/~lynn/2010h.html#30 45 years of Mainframe

a little x-over from this thread
http://www.garlic.com/~lynn/2010h.html#18

as mentioned in the above ... as undergraduate, I had done a lot of work
on os/360 and cp67 ... made presentation on some of the work at aug68
share meeting in boston. also was involved in univ. clone controller
project.

also, jun68, science center had one week cp67 class held at Beverley
hills hilton(?). the friday before the class, one of the people that was
to teach much of the class, gave notice that they were leaving for a new
(virtual machine based) commercial time-sharing service bureau. When I
show up for the class ... I was asked if I would teach part of it.

spring break '69, i got talked into giving one week class for the boeing
ibmers and the growing technical staff for the emerging boeing computer
system. summer of '69, i was talked into spending at boeing ... setting
up cp67 system (part of boeing computer system also offering computer
services outside boeing). would periodically visit renton data center
... massive multiple football fields ... they had at least one 360/75
(it had black rope around the perimeter and there was black cloth that
was pulled down over the front panel and 1403 windows had black cloth
... when running classified work) ... but the main workhorse was 360/65s
... the place was full of them.  They pointed out that 360/65s were
arriving so fast that summer, they constantly had pieces of two or three
of the systems staged in the hallways ... waiting to be installed on the
floor. I considered that the largest datacenter I had ever been in
(several hundred millions in ibm 360s, although it was being partially
duplicated at 747 plant in everett; part of everett datacenter was
disaster planning; renton was in the path of potential massive mudslide
if Mt. Rainier was to warm up).

Later I would sponsor John Boyd's briefings at IBM ... and he would make
some mention having done a year stint in 1970 running spook
base. Later one of John's biographies mentions that spook base was
$2.5B windfall for IBM. By the time John was buried at Arlington ... the
USAF had somewhat disowned him ... but he had been adopted by the
Marines (and his effects and papers went to Quantico).

Since he died, the USAF has somewhat acknowledged him; reference to
dedication of Boyd Hall at USAF Weapons School, Nellis Air Force Base,
1999.
http://www.garlic.com/~lynn/2000e.html#35

and reference to SECDEF lecture at USAF academy earlier this month
(that mentions Boyd)
http://www.garlic.com/~lynn/2010h.html#20

misc. past posts  URLs mentioning Boyd 
http://www.garlic.com/~lynn/subboyd.html

-- 
42yrs virtualization experience (since Jan68), online at home since Mar1970

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JOB.

2010-04-20 Thread Peter Nuttall
quote

All the other steps worked ... The rerun of the job from the failing step 
 
worked successfully  

Lets see. Rerun works. Without ANY changes at all?

Anyone got any ideas ? 

After reviewing all replies up to now, I'm thinking something changed the 
APF 
list just before step 8. Check your SMF and/or RACF records for evidence.

HTH!

Groete / Greetings
Elardus Engelbrecht 
/quote

Yep ... We had another one today ... The rerun works with the only change 
being that we rerun it from the failing step (we don't want to rerun the 
steps that worked)

I don't believe I have access to the SMF records :-( ... Which is a pity 
... It is with our Sysprog team at the moment, and I have chased them 
today ... Will post when/if we find the culprit. 

Cheers,
Peter
 
This e-mail message, including any attachments transmitted with it, is 
CONFIDENTIAL and may contain legally privileged information. This message is 
intended solely for the use of the individual or entity to whom it is 
addressed. If you have received this message in error, please notify us 
immediately and delete it from your system. Please visit our website to read 
the full disclaimer: http://www.euroclear.com/site/public/disclaimer

Re: RMM EDGRRPTE printing Problem

2010-04-20 Thread Greg Shirey
Crispin, 

I'm confused by your JCL below.  What is the source of the
RMM.HSKP.EXTRACT data set?  Is it the REPTEXT DD output from running
program EDGHSKP?  If so, I'm don't see how the ICETOOL step reads it and
produces a usable report.  For one thing, at least in our extract file,
there are no data set names that begin in column 44.   

I'm wondering if you haven't edited the output from one EDGRRPTE run and
are using that to input into the EDGRRPTE step you've included below.


Greg Shirey
Ben E. Keith Co.



-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Crispin Hugo
Sent: Tuesday, April 20, 2010 1:49 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: RMM EDGRRPTE printing Problem

snip 


JCL:
//EXTRPDT  EXEC PGM=IKJEFT01,DYNAMNBR=99,REGION=4096K   
//SYSTSPRT DD   SYSOUT=X
//SYSPRINT DD   SYSOUT=X
//SORTIN   DD   DISP=SHR,DSN=RMM.HSKP.EXTRACT   
//SORTOUT  DD   DSN=TEMP01,DISP=(,PASS,DELETE),
// SPACE=(CYL,(200,20),RLSE),UNIT=SYSALLDA, 
// DCB=*.SORTIN 
//SYSINDD   DSN=TEMP02,DISP=(,PASS,DELETE),
// SPACE=(TRK,(1,1),RLSE),UNIT=SYSALLDA,
// DCB=(LRECL=80,BLKSIZE=3120,RECFM=FB) 
//SYSOUT   DD   SYSOUT=X
//REPORT14 DD  SYSOUT=Y 
//SYSTSIN  DD   *   
 EX 'SYS1.SEDGEXE1(EDGRRPTE)' - 
'054 MACRO 4 INTERNAL USE ONLY' 
//*  
//WRITE1   EXEC PGM=ICETOOL,REGION=0M  
//SYSPRINT DD SYSOUT=X 
//TOOLMSG  DD SYSOUT=X 
//DFSMSG   DD SYSOUT=X 
//INDD DD DSN=RMM.HSKP.EXTRACT,
//DISP=SHR 
//OUTDDDD SYSOUT=Y 
//TEMP DD UNIT=SYSALLDA,SPACE=(TRK,(5,25)) 
//TOOLIN   DD *
 SORT FROM(INDD)  TO(TEMP) USING(INCL) 
 DISPLAY FROM(TEMP) LIST(OUTDD) -  
 TITLE('Movement Report by Volume Serial') -   
 PAGE DATE(4MD/) TIME -
 HEADER('Job Name') ON(23,8,CH) -  
 HEADER('Volume') ON(32,6,CH) -
 HEADER('Volseq#') ON(39,4,CH) -   
 HEADER('Dataset Name') ON(44,44,CH) - 
 HEADER('Create Date') ON(89,10,CH) -  
 BTITLE('To Destination / From Location') -
 BREAK(5,18,CH) -  
 BTOTAL('') -  
 BLANK -   
 TOTAL('REMOVABLE MEDIA MANAGER')  
//INCLCNTL DD DSN=INCL,DISP=(OLD,PASS)   /*...@02c*/


snip 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: supervisory state vs. authorized program

2010-04-20 Thread Paul Gilmartin
On Tue, 20 Apr 2010 16:56:46 +0300, Binyamin Dissen wrote:

On Tue, 20 Apr 2010 09:45:07 -0400 GOODWIN, DIANE M. wrote:

:I'm a little confused - is there a difference (and if so, what is the
:difference) between an assembler program that is in supervisory state
:and an assembler program that is authorized?

An authorized program has the potential to get into supervisor state but will
0C2 on instructions that require supervisor state.

Summarizing what no one has stated absolutely clearly yet, supervisor
state is a hardware state, controlled by a bit in the PSW; authorized
is a software state defined by flags set by the OS reflecting bits
in the load module and the library from which it was loaded.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: RMM EDGRRPTE printing Problem

2010-04-20 Thread Crispin Hugo
Greg,
Sorry for not being clear.
EDGHSKP creates RMM.HSKP.EXTRACT using XREPTEXT DD. This is the same
file that is input to ICETOOL.

As I use the XREPTEXT DD, I get the more detailed information I need.
All I have done is change the supplied REPORT14 and changed stuff around
to how I want it. I am using all the stuff that is 'supplied' by
DFSMSRMM report . 

Crispin Hugo
Systems Programmer
Macro 4 Limited
 
Direct Line: +44 (0)1293 872121, Switchboard: +44 (0)1293 872000, Fax:
+44 (0)1293 872001
 
A Division of the UNICOM Group of Companies
www.macro4.com   
 
Macro 4 Registered office :The Orangery, Turners Hill Road, Worth,
Crawley, West Sussex, RH10 4SS
Registered in England no. 927588
 
Please consider the environment and THINK before you print this email.
 
Email Disclaimer

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Greg Shirey
Sent: 20 April 2010 15:48
To: IBM-MAIN@bama.ua.edu
Subject: Re: RMM EDGRRPTE printing Problem

Crispin, 

I'm confused by your JCL below.  What is the source of the
RMM.HSKP.EXTRACT data set?  Is it the REPTEXT DD output from running
program EDGHSKP?  If so, I'm don't see how the ICETOOL step reads it and
produces a usable report.  For one thing, at least in our extract file,
there are no data set names that begin in column 44.   

I'm wondering if you haven't edited the output from one EDGRRPTE run and
are using that to input into the EDGRRPTE step you've included below.


Greg Shirey
Ben E. Keith Co.



-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Crispin Hugo
Sent: Tuesday, April 20, 2010 1:49 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: RMM EDGRRPTE printing Problem

snip 


JCL:
//EXTRPDT  EXEC PGM=IKJEFT01,DYNAMNBR=99,REGION=4096K   
//SYSTSPRT DD   SYSOUT=X
//SYSPRINT DD   SYSOUT=X
//SORTIN   DD   DISP=SHR,DSN=RMM.HSKP.EXTRACT   
//SORTOUT  DD   DSN=TEMP01,DISP=(,PASS,DELETE),
// SPACE=(CYL,(200,20),RLSE),UNIT=SYSALLDA, 
// DCB=*.SORTIN 
//SYSINDD   DSN=TEMP02,DISP=(,PASS,DELETE),
// SPACE=(TRK,(1,1),RLSE),UNIT=SYSALLDA,
// DCB=(LRECL=80,BLKSIZE=3120,RECFM=FB) 
//SYSOUT   DD   SYSOUT=X
//REPORT14 DD  SYSOUT=Y 
//SYSTSIN  DD   *   
 EX 'SYS1.SEDGEXE1(EDGRRPTE)' - 
'054 MACRO 4 INTERNAL USE ONLY' 
//*  
//WRITE1   EXEC PGM=ICETOOL,REGION=0M  
//SYSPRINT DD SYSOUT=X 
//TOOLMSG  DD SYSOUT=X 
//DFSMSG   DD SYSOUT=X 
//INDD DD DSN=RMM.HSKP.EXTRACT,
//DISP=SHR 
//OUTDDDD SYSOUT=Y 
//TEMP DD UNIT=SYSALLDA,SPACE=(TRK,(5,25)) 
//TOOLIN   DD *
 SORT FROM(INDD)  TO(TEMP) USING(INCL) 
 DISPLAY FROM(TEMP) LIST(OUTDD) -  
 TITLE('Movement Report by Volume Serial') -   
 PAGE DATE(4MD/) TIME -
 HEADER('Job Name') ON(23,8,CH) -  
 HEADER('Volume') ON(32,6,CH) -
 HEADER('Volseq#') ON(39,4,CH) -   
 HEADER('Dataset Name') ON(44,44,CH) - 
 HEADER('Create Date') ON(89,10,CH) -  
 BTITLE('To Destination / From Location') -
 BREAK(5,18,CH) -  
 BTOTAL('') -  
 BLANK -   
 TOTAL('REMOVABLE MEDIA MANAGER')  
//INCLCNTL DD DSN=INCL,DISP=(OLD,PASS)   /*...@02c*/


snip 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

-

This email has been scanned for all known viruses by the MessageLabs
Email
Security Service and the Macro 4 internal virus protection system.
.


- 

Re: (slightly OT - Linux) Did IBM bet on the wrong OS?

2010-04-20 Thread Anne Lynn Wheeler
bob.gool...@gmail.com (Bob goolsby) writes:
 And what would have been the alternative OS for IBM to have backed?  OS/2???

at the time, linux was somewhat the stage of the hobbiest personal
computers before the advent ibm/pc. the ibm/pc clone market was starting
to build massive consumer base ... including gaming market (which wasn't
being addressed by the linux hobbiest) ... but only small part of that
was bleeding into linux computer hobbiests.

os/2  ps2 was industrial strength commercial market ... as well as
somewhat helping support the mainstream computing market. this was
period of help your brethern ... and terminal emulation (SAA)
strategy ... attempting to stave off the client/server that was
impacting the communication group (terminal emulation) install base
... misc. posts
http://www.garlic.com/~lynn/subnetwork.html#emulation

the workstation division had come out with rs/6000 ... and was being
told it had to use the ps2 adapter cards (also as part of helping
corporate brethern). this strategy makes the rs/6000 only marginally
better than ps2.  The ps2 microchannel 16mbit T/R card had lower card
thruput (as part of terminal emulation strategy ... 300+ ps2 sharing
same 16mbit t/r) than the pc/rt (rs/6000 workstation precursor) ISA
4mbit/sec t/r card. The ps2 microchannel scsi card had really high
command processing overhead and low thruput. The ps2 graphics adapter
card was really, really slow (compared to products in the workstation
market).

The ps2 graphics adapter countermeasure (since workstation division
wasn't allowd to do their own) ... came out with the 730 deskside
... basically a 530 with extra wide cabinet with internal VMEbus with
non-IBM VMEbus graphics adapter (the argument being that ps2 wasn't
offering a VMEbus graphics adapter).

The boca ps2  os2 was off in their own world with regard to where the
business was going ... as well as what was happening with commodity
pricing with the clones. There were internal documents showing
comptition selling best price massive bulk purchase (hundreds of
machines) was close to ps2. To try and counteract, I would post (on
internal forums) clone quantity-one prices from the sunday newspaper
(that were way below what Boca was showing clone large volume best
prices in their business plans).

the mainstream unix market from the early 80s ... was up until then new
computer vendors spent huge amount of money on proprietary computer and
proprietary operating system. The advent of single chip processors
drastically dropped the cost of developing computer system (in
workstation and mini market) ... and doing new proprietary operating
system became many times larger than doing the hardware. To drop the
cost of operating system to compareable to hardware costs ... required
adopting portable, relatively off-the-shelf software ... at the time it
was unix.

one of the things that the workstation group did was spend an enormous
amount of money on proprietary added value additions to unix ...
nearly what would have been spent on doing proprietary operating system
from scratch (way out of proportion to what was happening in the
workstation  mini market).

in the last two decades, the commodity, high-volume, low-margins ...
have allowed that business to pretty much overtake the proprietary
low-volume, high-margin market. that also accounts for placing the
evolving linux base in competition with the corporate proprietary unix
offering.

-- 
42yrs virtualization experience (since Jan68), online at home since Mar1970

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 3494 EOM date

2010-04-20 Thread Robert Harrison
Hello,
The dates that you are looking for can be found on-line on IBM's Sales Manual.

Here is a long link to the 3494 listing:

http://www-01.ibm.com/common/ssi/ShowDoc.jsp?docURL=/common/ssi/rep_sm/4/897/ENUS3494/index.htmlbreadCrum=DET001PT023url=buttonpressed=DET001PT116page=1000paneltext1=DET001PEF012amp;user+type=EXTlang=en_US

Here is a tinyurl to get there more easily:

http://tinyurl.com/y7ct662


Robert Harrison
I.S. Manager
Oklahoma Department of Transportation
rharri...@odot.org

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: supervisory state vs. authorized program

2010-04-20 Thread Tony Harminc
On 20 April 2010 11:01, Paul Gilmartin paulgboul...@aim.com wrote:

 Summarizing what no one has stated absolutely clearly yet, supervisor
 state is a hardware state, controlled by a bit in the PSW; authorized
 is a software state defined by flags set by the OS reflecting bits
 in the load module and the library from which it was loaded.

Right. But it's a bit more muddled than that, because some operating
system services required that the caller be authorized, but in many
cases this authorization can be APF authorization (regardless of what
machine state the program is running with), *or* being in supervisor
state. Often enough these services will also accept running in a
system key (generally a key  8) as well.

The bottom line is that an APF authorized program can get itself into
supervisor state and/or a system key, and a program running in
supervisor state can do absolutely anything with the machine,
including reading or changing any data in main storage or on disk,
bypassing all security, and even stopping the entire complex.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: RMM EDGRRPTE printing Problem

2010-04-20 Thread Mike Wood
Crispin,  our sample JCL for running EDGRRPTE is SAMPLIB member EDGJRPT.
It contains
//REPORT14 DD   SYSOUT=*,RECFM=VBA   
for report14. This identifies the file as containing ANSI print control
characters.

I suspect by sending to VM some additional char is inserted after EDGRRPTE
has written the record to SYSOUT with the ASA print control character in
position 1. Once you amend the DD statement to add RECFM, this should no
longer happen.

Mike Wood   RMM Development

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


PAV Implementation

2010-04-20 Thread Rebecca Martin
We are looking into the possibility of  implementing PAVs on our HDS USP-V.  
Our HDS reseller says we have to buy implementation services from them to 
implement PAVs.  Their implementation services are very pricey, as you might 
imagine.  

Do you believe implementation services are required or at least highly 
recommended?  Or is the reseller blowing smoke?  Know any good 
documentation for planning PAV implementation?  

Any lessons learned to be shared from those that have implemented PAVs 
recently?  

Thanks
Rebecca

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread Ted MacNEIL
Do you believe implementation services are required or at least highly 
recommended?

No. Usually, PAV is an added cost, but PAV is so simple, I never saw the need 
for 'implementation services'.


Or is the reseller blowing smoke?

I would think so.

Know any good 
documentation for planning PAV implementation?  

I implemented dynamic PAV in 2000, after the crisis.
We used the standard doc -- it was on a Shark.

You will have to look at HDS doc, for how to allocate it in their 'Storage 
Advisor'.

The rest is 'simple':
Define the alias/base relationship in the IOCDS.
Turn on the flag in IODF.
Turn on the flag in WLM.
Sit back and watch.

If you have IOSQ issues before implementation, you will see noticible 
improvement, afterwards.

Otherwise, use the RMF device activity data, before and after.
You can do the analysis using an RMF Device Activity Report.
But, it will be easier with MICS, MXG, or equivalent.

-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Stopping zOS

2010-04-20 Thread Mark Pace
How do you stop zOS?
I stop all the subsystems, then stop JES, and finally
Z EOD

But then what actually stops zOS?  SHUTDOWN in z/VM causes VM to go into a
disabled wait.  Does anything on zOS do the same thing?

-- 
Mark Pace
Mainline Information Systems
1700 Summit Lake Drive
Tallahassee, FL. 32317

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread Gerhard Postpischil

On 4/20/2010 12:28 PM, Mark Pace wrote:

But then what actually stops zOS?  SHUTDOWN in z/VM causes VM to go into a
disabled wait.  Does anything on zOS do the same thing?


QUIESCE


Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread Mark Zelden
On Tue, 20 Apr 2010 12:28:05 -0400, Mark Pace mpac...@gmail.com wrote:

How do you stop zOS?
I stop all the subsystems, then stop JES, and finally
Z EOD

But then what actually stops zOS?  SHUTDOWN in z/VM causes VM to go into a
disabled wait.  Does anything on zOS do the same thing?


Only in a sysplex of some sort (monoplex, basic, parallel). 

V XCF,sysname,OFFLINE   

... which puts the system in a x'0A2' wait state with reason code 4.

The command is invalid in a local sysplex - COUPLExx specifies
 COUPLE SYSPLEX(LOCAL)  

Otherwise you have to use the hardware reset function.

There is also a QUIESCE command, which puts the system in a x'CCC' 
wait state that is restartable.  You wouldn't want to normally do that
these days.  

Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:mzel...@flash.net  
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mark Pace
 Sent: Tuesday, April 20, 2010 11:28 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Stopping zOS
 
 How do you stop zOS?
 I stop all the subsystems, then stop JES, and finally
 Z EOD
 
 But then what actually stops zOS?  SHUTDOWN in z/VM causes VM 
 to go into a
 disabled wait.  Does anything on zOS do the same thing?
 
 -- 
 Mark Pace

VARY XCF,sysname,OFFLINE

This will cause z/OS to tell all other systems in the SYSPLEX that it is 
shutting down. It then goes into a hard wait.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread Tony Harminc
On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote:

 There is also a QUIESCE command, which puts the system in a x'CCC'
 wait state that is restartable.  You wouldn't want to normally do that
 these days.

Why?

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread John Kelly
snip
Any lessons learned to be shared from those that have implemented PAVs 
recently?
/snip

Doesn't look like you're a government agency, so you probably don't have 
to deal with VION which is a good thing.
I implemented PAV on our HDS USP-V and it's pretty much like Ted said, ie 
simple - once you get the contract stuff out of the way. Their ShadowImage 
is a different can of worms though, VION doesn't have much support, so 
that probably clouds my opinion.

Jack Kelly
202-502-2390 (Office)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread Mackenzie, Bruce
There is an HDS manual entitled 

Hitachi TagmaStore(r)
Universal Storage Platform
and Network Storage Controller
Compatible PAV for IBM(r) z/OS(r) User's Guide
(Includes PAV and Hyper PAV)

which will help.  Basically as long as you have someone fluent enough in 
STORNAV to set up the alias pools (for HYPERPAVs) the manual will help.  The 
other part is that there is a corresponding device definition change that is 
required on the MVS side.  You need to define base devices and alias devices 
within a single LCU.  Personally I would recommend HYPERPAVs but then I don't 
know your environment.  As well you may want to do a performance analysis to 
determine the optimum base to alias ratio.  

I hope this helps.  

Bruce  

   

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Rebecca Martin
Sent: Tuesday, April 20, 2010 11:43 AM
To: IBM-MAIN@bama.ua.edu
Subject: PAV Implementation

We are looking into the possibility of  implementing PAVs on our HDS USP-V.  
Our HDS reseller says we have to buy implementation services from them to 
implement PAVs.  Their implementation services are very pricey, as you might 
imagine.  

Do you believe implementation services are required or at least highly 
recommended?  Or is the reseller blowing smoke?  Know any good 
documentation for planning PAV implementation?  

Any lessons learned to be shared from those that have implemented PAVs 
recently?  

Thanks
Rebecca

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


NOTICE OF CONFIDENTIALITY
This communication including any information transmitted with it is 
intended only for the use of the addressees and is confidential. 
If you are not an intended recipient or responsible for delivering 
the message to an intended recipient, any review, disclosure, 
conversion to hard copy, dissemination, reproduction or other use 
of any part of this communication is strictly prohibited, as is the 
taking or omitting of any action in reliance upon this communication. 
If you receive this communication in error or without authorization 
please notify us immediately by return e-mail or otherwise and 
permanently delete the entire communication from any computer, 
disk drive, or other storage medium.

If the above disclaimer is not properly readable, it can be found at 
www.td.com/legal
   
AVERTISSEMENT DE CONFIDENTIALITE   
Ce courriel, ainsi que tout renseignement ci-inclus, destiné uniquement 
aux destinataires susmentionnés,  est confidentiel.  Si vous 
n'êtes pas le destinataire prévu ou un agent responsable de la 
livraison de ce courriel, tout examen, divulgation, copie, impression, 
reproduction, distribution, ou autre utilisation d'une partie de ce 
courriel est strictement interdit de même que toute intervention ou 
abstraction à cet égard.  Si vous avez reçu ce message par erreur ou 
sans autorisation, veuillez en aviser immédiatement l'expéditeur par 
retour de courriel ou par un autre moyen et supprimer immédiatement 
cette communication entière de tout système électronique.

Si l'avis de non-responsabilité ci-dessus n'est pas lisible, vous 
pouvez le consulter à www.td.com/francais/legale

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony Harminc
 Sent: Tuesday, April 20, 2010 11:39 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Stopping zOS
 
 On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote:
 
  There is also a QUIESCE command, which puts the system in a x'CCC'
  wait state that is restartable.  You wouldn't want to 
 normally do that
  these days.
 
 Why?
 
 Tony H.

The IP connectivity goes into the toliet and all the clients would need to 
reconnect. QUIESCE is not of any particular use, other than perhaps after a Z 
EOD to make sure that all I/O is complete. I.e. you'd never want to do a 
restart after doing a QUIESCE.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets®

9151 Boulevard 26 . N. Richland Hills . TX 76010
(817) 255-3225 phone . (817)-961-6183 cell
john.mck...@healthmarkets.com . www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets® is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA 
Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread carlos roberto visconde
Try:

$P

P RMF

P TSO

P SDSF

Z NET,QUICK

F BPXOINIT,SHUTDOWN=FORKINIT

F OMVS,STOPPFS=ZFS

F OMVS,SHUTDOWN

C DFSCMF

$PJES2

#STOP (RACF)

sds,
visconde
2010/4/20 McKown, John john.mck...@healthmarkets.com

  -Original Message-
  From: IBM Mainframe Discussion List
  [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony Harminc
  Sent: Tuesday, April 20, 2010 11:39 AM
  To: IBM-MAIN@bama.ua.edu
  Subject: Re: Stopping zOS
 
  On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote:
 
   There is also a QUIESCE command, which puts the system in a x'CCC'
   wait state that is restartable.  You wouldn't want to
  normally do that
   these days.
 
  Why?
 
  Tony H.

 The IP connectivity goes into the toliet and all the clients would need to
 reconnect. QUIESCE is not of any particular use, other than perhaps after a
 Z EOD to make sure that all I/O is complete. I.e. you'd never want to do a
 restart after doing a QUIESCE.

 --
 John McKown
 Systems Engineer IV
 IT

 Administrative Services Group

 HealthMarketsŽ

 9151 Boulevard 26 . N. Richland Hills . TX 76010
 (817) 255-3225 phone . (817)-961-6183 cell
 john.mck...@healthmarkets.com . 
 www.HealthMarkets.comhttp://www.healthmarkets.com/

 Confidentiality Notice: This e-mail message may contain confidential or
 proprietary information. If you are not the intended recipient, please
 contact the sender by reply e-mail and destroy all copies of the original
 message. HealthMarketsŽ is the brand name for products underwritten and
 issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake
 Life Insurance CompanyŽ, Mid-West National Life Insurance Company of
 TennesseeSM and The MEGA Life and Health Insurance Company.SM



 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread Mark Zelden
On Tue, 20 Apr 2010 12:39:22 -0400, Tony Harminc t...@harminc.net wrote:

On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote:

 There is also a QUIESCE command, which puts the system in a x'CCC'
 wait state that is restartable.  You wouldn't want to normally do that
 these days.


1)  If you still run a FEP (front end processor), it keeps running.  It really
doesn't like the fact that the host system went away and you didn't tell it. 
I've seen NCPs crash after this and even VTAM once you restarted the
system.  I admit I haven't done this in a very long time..

2) Same issue with TCPIP.  Although I suspect connections / links
would just timeout and fail.   It would look like a crashed system after
a short period of time.   

3) SYSPLEX / **GRS / MIM or anything else that relies on heart beats from a
healthy system.  I could name a bunch of other ISV products I know 
of also, but I won't.

**  (this note from the operator commands manual):  If this system is
actively using global resource serialization to share global resources
and the global resource serialization complex is not the 
same as the sysplex, issue a VARY GRS (*),QUIESCE command
before issuing the QUIESCE command. Issuing a VARY GRS (*),QUIESCE 
command before issuing the QUIESCE command prevents the disruption 
of the global resource serialization ring.

So it's a similar theme for all of these.  There is so much connectivity from
z/OS to other platforms and systems, you can't really live with a quiesced
system and restart it.  You might as well shut it down nicely and do
a system reset.  

Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:mzel...@flash.net  
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread Gibney, Dave
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
 Behalf Of McKown, John
 Sent: Tuesday, April 20, 2010 9:57 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Stopping zOS
 
  -Original Message-
  From: IBM Mainframe Discussion List
  [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony Harminc
  Sent: Tuesday, April 20, 2010 11:39 AM
  To: IBM-MAIN@bama.ua.edu
  Subject: Re: Stopping zOS
 
  On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote:
 
   There is also a QUIESCE command, which puts the system in a x'CCC'
   wait state that is restartable.  You wouldn't want to
  normally do that
   these days.
 
  Why?
 
  Tony H.
 
 The IP connectivity goes into the toliet and all the clients would need
 to reconnect. QUIESCE is not of any particular use, other than perhaps
 after a Z EOD to make sure that all I/O is complete. I.e. you'd never
 want to do a restart after doing a QUIESCE.


  In the resource limited days here before the z9-BC I sometimes QUIESCEd the 
sandbox(s) for provide some marginally more resources to production during the 
few days of heavy load. Everything (except TCPIP connections) picked up nicely 
upon restart. Even a 3270 connection could resume if you'd not attempted to use 
it during the wait time.

  Once, when I didn't understand what I could do by declaring my z/OS TCPIP 
stack a router (and before the network folks configured just who they'd let be 
a router), I configured my sandbox as such by mistake. JUST BEFORE LEAVING FOR 
THE DAY. A couple hours later, ops called and said my sandbox was the reason 
the network was down. I told them to QUIESCE the sandbox. The network healed 
almost instantly. That wasn't the most pleasant post-mortem I've ever been part 
of :)

  But, yes, as an normal thing, there's very little point in QUIESCE or fully 
shutting down a monoplex LPAR these days.

Dave Gibney
Information Technology Services
Washington State University


 
 --
 John McKown
 Systems Engineer IV
 IT
 
 Administrative Services Group
 
 HealthMarkets®
 
 9151 Boulevard 26 . N. Richland Hills . TX 76010
 (817) 255-3225 phone . (817)-961-6183 cell
 john.mck...@healthmarkets.com . www.HealthMarkets.com
 
 Confidentiality Notice: This e-mail message may contain confidential or
 proprietary information. If you are not the intended recipient, please
 contact the sender by reply e-mail and destroy all copies of the
 original message. HealthMarkets® is the brand name for products
 underwritten and issued by the insurance subsidiaries of HealthMarkets,
 Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life
 Insurance Company of TennesseeSM and The MEGA Life and Health Insurance
 Company.SM
 
 
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Stopping zOS

2010-04-20 Thread Tony Harminc
On 20 April 2010 12:39, Tony Harminc t...@harminc.net wrote:
 On 20 April 2010 12:35, Mark Zelden mzel...@flash.net wrote:

 There is also a QUIESCE command, which puts the system in a x'CCC'
 wait state that is restartable.  You wouldn't want to normally do that
 these days.

 Why?

I didn't phrase my question clearly; I wasn't asking about the wisdom
of trying to restart, but about why the QUIESCE itself would be a bad
idea.

The original reason for QUIESCE, IIRC, is that it ensured that all
CPUs in an MP would be stopped, whereas the old hit STOP would stop
only the one whose STOP button you pressed. And in turn, the reason
for hitting STOP before re-IPLing is to avoid that improbable but very
nasty possibility of doing an I/O reset while a DASD write was in
progress (for your JES checkpoint, say).

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread Ted MacNEIL
You need to define base devices and alias devices within a single LCU.  
Personally I would recommend HYPERPAVs but then I don't know your environment.

You will (usually) see such an improvement, that HIPERPAVs may be overkill.
Again, environmentally specific.


As well you may want to do a performance analysis to determine the optimum 
base to alias ratio.  

This again is simple.
Define enough base pairs to cover your online disk.
Then make the rest aliases.

No need to get stuck in analysis paralysis.

As NIKI used to say: 'just do it'!
-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread Mike Shorkend
We implemented HIPERPAV on our USP last year. It is a priced feature but we
did not require any services from Hitachi. As other posters have mentioned,
implementing PAV/HIPERPAV is pretty straightforward. IOSQ time disappeared
entirely.
The only down side was that going to HIPERPAV (but not  PAV) requires a 2107
emulation. As we were still on a 2105, it required a power recycle to the
box , which of course meant a sysplex-wide outage plus an outage to
distributed servers using the box

Mike

On Tue, Apr 20, 2010 at 8:35 PM, Ted MacNEIL eamacn...@yahoo.ca wrote:

 You need to define base devices and alias devices within a single LCU.
  Personally I would recommend HYPERPAVs but then I don't know your
 environment.

 You will (usually) see such an improvement, that HIPERPAVs may be overkill.
 Again, environmentally specific.


 As well you may want to do a performance analysis to determine the optimum
 base to alias ratio.

 This again is simple.
 Define enough base pairs to cover your online disk.
 Then make the rest aliases.

 No need to get stuck in analysis paralysis.

 As NIKI used to say: 'just do it'!
 -
 Too busy driving to stop for gas!

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




-- 
Mike Shorkend
m...@shorkend.com
www.shorkend.com
Tel: +972524208743
Fax: +97239772196

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread Rebecca Martin
On Tue, 20 Apr 2010 12:33:48 -0400, Mackenzie, Bruce 
bruce.macken...@td.com wrote:

There is an HDS manual entitled

Hitachi TagmaStore(r)
Universal Storage Platform
and Network Storage Controller
Compatible PAV for IBM(r) z/OS(r) User's Guide
(Includes PAV and Hyper PAV)

which will help.  Basically as long as you have someone fluent enough in 
STORNAV to set up the alias pools (for HYPERPAVs) the manual will help.  The 
other part is that there is a corresponding device definition change that is 
required on the MVS side.  You need to define base devices and alias devices 
within a single LCU.  Personally I would recommend HYPERPAVs but then I 
don't know your environment.  As well you may want to do a performance 
analysis to determine the optimum base to alias ratio.

I hope this helps.

Bruce


Thank you that helps a lot!  And Ted, thank you too for your suggestions!  We 
need to do this without costly implemenation services the resellar quoted us!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread Ted MacNEIL
And Ted, thank you too for your suggestions!
We need to do this without costly implemenation services the resellar quoted 
us!  

You can.
Just get the feature and do it.

The implementation services sounds like a cash grab!

I'm available off-line for advice.

-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PAV Implementation

2010-04-20 Thread Rebecca Martin
On Tue, 20 Apr 2010 18:26:43 +, Ted MacNEIL eamacn...@yahoo.ca 
The implementation services sounds like a cash grab!

My thoughts exactly!  

Thanks to everybody that has replied.  

I'll let you know where we go with this.  The working through the contract 
part (provided we move forward with PAV - and we do need it to reduce IOSQ 
time) - with our vendor - will take the longest!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: (slightly OT - Linux) Did IBM bet on the wrong OS?

2010-04-20 Thread Anne Lynn Wheeler
bob.gool...@gmail.com (Bob goolsby) writes:
 And what would have been the alternative OS for IBM to have backed?  OS/2???

re:
http://www.garlic.com/~lynn/2010h.html#34 (slightly OT - Linux) Did IBM bet on 
the wrong OS?/a

at the beginning, a major market and gave ibm/pc big kick-start was
large corporation mainframe terminal emulation market. however, there
was growing home market ... with a large gaming component and small
business market (somewhat SOHO ... or small private, closed LANs
networks).

Later, for the closed business environment there was growing use of
scripting add-ons to business applications that provided various kinds
of added value ... with open access to the basic system. This was
analogous to gaming market where the application frequently took over
all aspects of low-level machine operation.

at the jan96 msdc held at mascone center ... a major theme was
supporting the internet ... but the big banners all over the place were
preserving your investment (basically all the BASIC/scripting
capability would carry over to the internet environment). this sets
things up for the large number of the integrity problems that are still
going on today.

Internet attachment appliance has a whole lot more security requirements
from that of the small, closed (safe) business lan environment and
totally different from the gaming markets. You don't want foreign
applications from the internet to automatically execute on your machine
... and/or take over all aspects of your machine operation. Trying to
meet the diametrically opposing security requirements on a single
platform has been an enormous challenge (but frequently is at the root
of the majority of the exploits in the world today).

-- 
42yrs virtualization experience (since Jan68), online at home since Mar1970

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM QUESTION - MOVING TO DASD FROM TAPE - ML2

2010-04-20 Thread Darth Keller
This is just one of the reasons I really like this group.  It gives me the 
chance to hear about how other shops are doing things that are different 
than my approach to similar issues.  I'm so used to dealing with a 
homogeneous shop (1 kind of DASD) that I wasn't even thinking about using 
older, slower DASD for ML2.   Although putting my ML2 on a tapeless 
Virtual Tape System is effectively doing that also.  We're just choosing 
to eliminate the ML1 as I have lots of ways  places I can use all that 
DASD space. 

Our recall times from the VTS are more than adequate for our purposes as 
we've got fairly good standards (or at least standards that work for us) 
for how long datasets remain on primary.  And if we find there are some 
applications that are having an issue with the small delays recalling from 
ML2, I'll adjust their management classes to give them a more suitable 
time on primary. 

This e-mail message and all attachments transmitted with it may
contain legally privileged and/or confidential information intended
solely for the use of the addressee(s). If the reader of this
message is not the intended recipient, you are hereby notified that
any reading, dissemination, distribution, copying, forwarding or
other use of this message or its attachments is strictly
prohibited. If you have received this message in error, please
notify the sender immediately and delete this message and all
copies and backups thereof. Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JOB - etc

2010-04-20 Thread Jim Mulder
IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 04/20/2010 
07:24:56 AM:
  Yes to all of that  Puzzled me too ... Never seen it before  I 
am
  aware of the concatenation restriction on APF authorised load 
libraries
  (and the integrity reasoning behind it), but there are no steplibs in 
the
  job and the Joblib is, obviously, the same for all steps.
  
 What is that integrity reasoning?  Doesn't LINKLIST nowadays support
 a mixture of authorized and unauthorized libraries, with the 
authorization
 of the step depending on the status of the individual data set from
 which the module was loaded?
 
 Is it merely that since the programmer controls the content of STEPLIB
 there's little utility in supporting similar behavior in STEPLIB?

  For an ordinary concatenation, contents supervisor knows only
whether the entire concatenation is authorized, via a bit in the
DEB which is set by OPEN processing. 
 
  For LNKLST, contents supervisor built the concatenation and did 
the OPEN, so it can be aware of the authorization separately for each 
data set. 

  The isn't much value in having that granularity for STEPLIB, since
an authorized jobstep can't load anything from an unauthorized library. 



Jim Mulder   z/OS System Test   IBM Corp.  Poughkeepsie,  NY

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: (slightly OT - Linux) Did IBM bet on the wrong OS?

2010-04-20 Thread David Cartwright
On Tue, 20 Apr 2010 11:06:53 -0400, Anne  Lynn Wheeler 
l...@garlic.com wrote:
--snip


the mainstream unix market from the early 80s ... was up until then new
computer vendors spent huge amount of money on proprietary computer and
proprietary operating system. The advent of single chip processors
drastically dropped the cost of developing computer system (in
workstation and mini market) ... and doing new proprietary operating
system became many times larger than doing the hardware. To drop the
cost of operating system to compareable to hardware costs ... required
adopting portable, relatively off-the-shelf software ... at the time it
was unix.snip


Ah yes. In 1983 my mentor at Monsanto in Brussels offered me work back in 
the UK and for various reasons I decided to go.  I ended up at a one horse 
operation in South London reselling Onyx boxes which I think were Zylog Z80 
and Fortune office systems  - a really neat Moto6800 box with its own version 
of UNIX (Onyx used 4.2).  Mentor went shortly afterwards, probably pushed, 
then Plexus replaced Onyx (Z800? with System III).  These were all really nice 
boxes that what today is called an SME could afford.  I recall some word 
processing software from Redwood, but what stuck for the rest of my career 
was a hatred of printers, the flimsy mechanical beasts of the day would never 
do what you wanted and always broke. Don't talk to me about sheet feeders!
One of the customers, a burglar alarm company, bought the one horse outfit 
and I spent a couple of weeks in the shadow of Strangeways prison in 
Manchester coupling a serial card in a Plexus to an alarm switchboard so it 
would print out the details of where to go when someone broke in.  Sanity 
soon prevailed and I used some GUIDE contacts to get back to real computers, 
an Amdahl V7 near the Tower of London (you were not allowed to build within 
arrow shot of the Tower).

My old mentor was responsible for many of the macros I used in file 172 and 
instilled in me his Assembler standards - comment everything, one page per 
sub-routine, one in and one out etc. etc..  Anyone heard of Dean Moorcroft 
this century?   There were some real characters in computers then.

DC

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


TCPIP question

2010-04-20 Thread Pommier, Rex R.
Hi List,

I know this is IBM-main and not the TCPIP list but I get better responses here 
anyway.  :-)

That said, is there some way of getting the IP address that is bound to an OSA 
card from the z/OS console?


We have operations staff trying to bring up our Z at a hotsite but I can't 
remote into a TN3270 session.  We can't ping the address it is supposed to be 
using either.  I do have remote access to the console, but nothing else and 
would like to figure out what IP address is beingbound to the OSA card.  If I 
kill and restart TCPIP, it shows the port come active but the IP address I have 
documented at that port doesn't respond.

Thanks.

Rex

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


IBM Redbooks | z/OS Version 1 Release 11 Implementation

2010-04-20 Thread McKown, John
Might be of some interest. I haven't read it yet.

http://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/sg247729.html?Open

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCPIP question

2010-04-20 Thread Richard Peurifoy

On 4/20/2010 3:06 PM, Pommier, Rex R. wrote:

Hi List,

I know this is IBM-main and not the TCPIP list but I get better responses here 
anyway.  :-)

That said, is there some way of getting the IP address that is bound to an OSA 
card from the z/OS console?


We have operations staff trying to bring up our Z at a hotsite but I can't 
remote into a TN3270 session.  We can't ping the address it is supposed to be 
using either.  I do have remote access to the console, but nothing else and 
would like to figure out what IP address is beingbound to the OSA card.  If I 
kill and restart TCPIP, it shows the port come active but the IP address I have 
documented at that port doesn't respond.

Thanks.

Rex


D TCPIP,,N,HOME

will show the addresses for each device.

You might also want to do a

D TCPIP,,N,ROUTE

to check you route statements.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCPIP question

2010-04-20 Thread Patrick Lyon
On Tue, 20 Apr 2010 15:05:14 -0500, Pommier, Rex R. 
rex.pomm...@cnasurety.com wrote:

Hi List,

I know this is IBM-main and not the TCPIP list but I get better responses 
here anyway.  :-)

That said, is there some way of getting the IP address that is bound to an 
OSA card from the z/OS console?


We have operations staff trying to bring up our Z at a hotsite but I can't 
remote into a TN3270 session.  We can't ping the address it is supposed to be 
using either.  I do have remote access to the console, but nothing else and 
would like to figure out what IP address is beingbound to the OSA card.  If I 
kill and restart TCPIP, it shows the port come active but the IP address I have 
documented at that port doesn't respond.

Thanks.

Rex


Rex, you may also want to try doing a TRACERT ip address from a command 
prompt and see if it is even getting there.  There may be some ACLs set up 
that restrict you from getting there.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCPIP question

2010-04-20 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Pommier, Rex R.
 Sent: Tuesday, April 20, 2010 3:05 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: TCPIP question
 
 Hi List,
 
 I know this is IBM-main and not the TCPIP list but I get 
 better responses here anyway.  :-)
 
 That said, is there some way of getting the IP address that 
 is bound to an OSA card from the z/OS console?
 
 
 We have operations staff trying to bring up our Z at a 
 hotsite but I can't remote into a TN3270 session.  We can't 
 ping the address it is supposed to be using either.  I do 
 have remote access to the console, but nothing else and would 
 like to figure out what IP address is beingbound to the OSA 
 card.  If I kill and restart TCPIP, it shows the port come 
 active but the IP address I have documented at that port 
 doesn't respond.
 
 Thanks.
 
 Rex

D TCPIP,,NETSTAT,HOME

example response:

response
EZZ2500I NETSTAT CS V1R10 TCPIP 682
HOME ADDRESS LIST:
ADDRESS  LINK FLG
10.170.30.8  OSA00L   P
10.170.30.9  OSA52L
10.170.30.10 VIPA1L
192.168.151.1IQDFCL
192.168.152.1IQDFDL
127.0.0.1LOOPBACK
6 OF 6 RECORDS DISPLAYED
END OF THE REPORT
/response

The P under FLG indicates this is the PRIMARY address.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JOB - etc

2010-04-20 Thread Rick Fochtman

---snip-


From:   Peter Nuttall
Date:   Tue, 20 Apr 2010 07:48:46 +0200

Yes to all of that  Puzzled me too ... Never seen it before  I am
aware of the concatenation restriction on APF authorised load libraries
(and the integrity reasoning behind it), but there are no steplibs in the
job and the Joblib is, obviously, the same for all steps.

   


What is that integrity reasoning?  Doesn't LINKLIST nowadays support
a mixture of authorized and unauthorized libraries, with the authorization
of the step depending on the status of the individual data set from
which the module was loaded?

Is it merely that since the programmer controls the content of STEPLIB
there's little utility in supporting similar behavior in STEPLIB?

-- gil
 


unsnip--
I suspect that it's based on the premise that the LINKLIST libraries are 
controlled by a security-conscious Systems Programming staff, whereas 
STEPLIB can access any loadlib, including, perhaps, a library with 
modules of malicious intent or design.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCPIP question

2010-04-20 Thread Pommier, Rex R.
Thanks, John, Patrick, and Richard.  I knew it had to be something
simple (needless to say I had a head-slap DUH moment).  I was looking in
the FM under D TELNET commands and forgot completely about NETSTAT.

Thanks again.

Rex

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of McKown, John
Sent: Tuesday, April 20, 2010 3:32 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: TCPIP question

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Pommier, Rex R.
 Sent: Tuesday, April 20, 2010 3:05 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: TCPIP question
 
 Hi List,
 
 I know this is IBM-main and not the TCPIP list but I get 
 better responses here anyway.  :-)
 
 That said, is there some way of getting the IP address that 
 is bound to an OSA card from the z/OS console?
 
 
 We have operations staff trying to bring up our Z at a 
 hotsite but I can't remote into a TN3270 session.  We can't 
 ping the address it is supposed to be using either.  I do 
 have remote access to the console, but nothing else and would 
 like to figure out what IP address is beingbound to the OSA 
 card.  If I kill and restart TCPIP, it shows the port come 
 active but the IP address I have documented at that port 
 doesn't respond.
 
 Thanks.
 
 Rex

D TCPIP,,NETSTAT,HOME

example response:

response
EZZ2500I NETSTAT CS V1R10 TCPIP 682
HOME ADDRESS LIST:
ADDRESS  LINK FLG
10.170.30.8  OSA00L   P
10.170.30.9  OSA52L
10.170.30.10 VIPA1L
192.168.151.1IQDFCL
192.168.152.1IQDFDL
127.0.0.1LOOPBACK
6 OF 6 RECORDS DISPLAYED
END OF THE REPORT
/response

The P under FLG indicates this is the PRIMARY address.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or
proprietary information. If you are not the intended recipient, please
contact the sender by reply e-mail and destroy all copies of the
original message. HealthMarkets(r) is the brand name for products
underwritten and issued by the insurance subsidiaries of HealthMarkets,
Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life
Insurance Company of TennesseeSM and The MEGA Life and Health Insurance
Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc‏

2010-04-20 Thread john gilmore
Chris Craddock and now Jim Mulder have exhausted this topic; but moribund 
threads often take a long time to die here; instead, like a second-tier 
operatic heroine, they go on singing interminably.

 

An authorized step cannot load a member from an unauthorized library; and an 
unauthorized step cannot of course load a member from an authorized library.  E 
basta.

John Gilmore Ashland, MA 01721-1817 USA


  
_
The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with 
Hotmail. 
http://www.windowslive.com/campaign/thenewbusy?tile=multicalendarocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_5

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc‏

2010-04-20 Thread Gerhard Postpischil

On 4/20/2010 5:18 PM, john gilmore wrote:

An authorized step cannot load a member from an unauthorized
library; and an unauthorized step cannot of course load a
member from an authorized library.  E basta.


An authorized step can go into key zero and set the appropriate 
DEB bit for the unauthorized library. I've been doing this 
since the early days of MVS to test and debug authorized code 
before wasting space in the normal authorized libraries.


Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc?

2010-04-20 Thread Binyamin Dissen
On Tue, 20 Apr 2010 21:18:52 + john gilmore john_w_gilm...@msn.com
wrote:

:Chris Craddock and now Jim Mulder have exhausted this topic; but moribund 
threads often take a long time to die here; instead, like a second-tier 
operatic heroine, they go on singing interminably.

:An authorized step cannot load a member from an unauthorized library; 

Correct

:  and an 
unauthorized step cannot of course load a member from an authorized library.  E 
basta.

False.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JO B - etc‏

2010-04-20 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
john gilmore
Sent: Tuesday, April 20, 2010 4:19 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc‏

Chris Craddock and now Jim Mulder have exhausted this topic; but moribund 
threads often take a long time to die here; instead, like a second-tier 
operatic heroine, they go on singing interminably.

 

An authorized step cannot load a member from an unauthorized library; and an 
unauthorized step cannot of course load a member from an authorized library.  E 
basta.

SNIP

Actually, an authorized program can attach a daughter task, have it MODESET to 
PROB. The daughter task then does a LOAD(s), then POSTs the JS TCB when done. 
The authorized program, which is still in SUPSTATE under the JS TCB,  promptly 
resets the JSCBAUTH

I know of about three products that did this for various reasons. I don't know 
if they still do.

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc?

2010-04-20 Thread Binyamin Dissen
On Tue, 20 Apr 2010 17:33:45 -0400 Gerhard Postpischil gerh...@valley.net
wrote:

:On 4/20/2010 5:18 PM, john gilmore wrote:
: An authorized step cannot load a member from an unauthorized
: library; and an unauthorized step cannot of course load a
: member from an authorized library.  E basta.

:An authorized step can go into key zero and set the appropriate 
:DEB bit for the unauthorized library. I've been doing this 
:since the early days of MVS to test and debug authorized code 
:before wasting space in the normal authorized libraries.

Or it can use BSAM to read the module and perform relocation. An authorized
program can pretty much do anything in the computer.

The point was that the system attempts to protect the authorized routine by
not allowing the direct method of loading from an unauthorized library.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF autho risation i n middle o f JOB - et c‏‏

2010-04-20 Thread john gilmore
Gerhard Postpischil writes:
 
An authorized step can go into key zero and set the appropriate DEB bit for 
the unauthorized library. I've been doing this since the early days of MVS to 
test and debug authorized code before wasting space in the normal authorized 
libraries.
 
Your riposte, if that's what it is, comes down to the assertion that you know 
how to make an unauthorized library into an authorized one dynamically, at 
which point an authorized task or jobstep can load something from it.  
 
I know how to do this, and I am happy to stipulate that you do too.  My point 
that an authorized step cannot load something from an unauthorized library 
stands.  
 
 
John Gilmore Ashland, MA 01721-1817 USA


  
_
Hotmail is redefining busy with tools for the New Busy. Get more from your 
inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JO B - etc‏

2010-04-20 Thread Jim Mulder
IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 04/20/2010 
05:42:36 PM:

 Actually, an authorized program can attach a daughter task, have it 
 MODESET to PROB. The daughter task then does a LOAD(s), then POSTs 
 the JS TCB when done. The authorized program, which is still in 
 SUPSTATE under the JS TCB,  promptly resets the JSCBAUTH
 
 I know of about three products that did this for various reasons. I 
 don't know if they still do.

  An authorized program certainly has the power to circumvent
the system's attempts to help you avoid system integrity exposures.
That doesn't mean it is a good idea to do so.

  Now, simply LOADing code from an untrusted source into an APF 
authorized address space may arguably not be a problem.  But I would
strongly recommend against executing that code. 

Jim Mulder   z/OS System Test   IBM Corp.  Poughkeepsie,  NY

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ADRNAPF was IEBCOP Y losing APF authori sation in mi ddle of JOB - etc‏

2010-04-20 Thread Sam Siegel
With all of the discussion about APF and loading programs from various types
of libraries, I'm hoping someone can provide some clarification for
me regarding the ADRNAPF of the load macro.

The doc indicates that a module can be loaded from a non-apf library
when ADRNAPF is used from an authorized program in supervisor state.  The
doc further states that the it is the loading programs responsibility to
ensure that program loaded from the non-apf library receives control in
problem state.

Please confirm that when the non-apf program receives control in problem
state, it cannot change to supervisor state, discounting the possibility of
using a magic svc, etc.

Thanks,
Sam

2010/4/20 john gilmore john_w_gilm...@msn.com

 Chris Craddock and now Jim Mulder have exhausted this topic; but moribund
 threads often take a long time to die here; instead, like a second-tier
 operatic heroine, they go on singing interminably.



 An authorized step cannot load a member from an unauthorized library; and
 an unauthorized step cannot of course load a member from an authorized
 library.  E basta.

 John Gilmore Ashland, MA 01721-1817 USA



 _
 The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with
 Hotmail.

 http://www.windowslive.com/campaign/thenewbusy?tile=multicalendarocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_5

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JOB - etc

2010-04-20 Thread Paul Gilmartin
On Tue, 20 Apr 2010 15:36:30 -0500, Rick Fochtman wrote:

---snip-

From:Peter Nuttall
Date:Tue, 20 Apr 2010 07:48:46 +0200

Yes to all of that  Puzzled me too ... Never seen it before  I am
aware of the concatenation restriction on APF authorised load libraries
(and the integrity reasoning behind it), but there are no steplibs in the
job and the Joblib is, obviously, the same for all steps.



What is that integrity reasoning?  Doesn't LINKLIST nowadays support
a mixture of authorized and unauthorized libraries, with the authorization
of the step depending on the status of the individual data set from
which the module was loaded?

Is it merely that since the programmer controls the content of STEPLIB
there's little utility in supporting similar behavior in STEPLIB?

-- gil


unsnip--
I suspect that it's based on the premise that the LINKLIST libraries are
controlled by a security-conscious Systems Programming staff, whereas
STEPLIB can access any loadlib, including, perhaps, a library with
modules of malicious intent or design.

???

It can do that now; they just better not be authorized (unless
they're GIMSMP).

I was envisioning that, as with LINKLIST, a load module loaded
from an authorized catenand would run authorized; a load module
loaded from an unauthorized catenand would run unauthorized.
No security problem.  Should have been easy to do, given that
Jim M. says this determined by a bit in the DEB set at OPEN,
and OPEN surely knows what data set the DEB belongs to.

But, Jim says (and I agree, as stated above) that there's
minimal value in mixing authorized and authorized data sets
in STEPLIB.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Where ABEND reason code?

2010-04-20 Thread Charles Mills
If I ATTACH a sub-task and it ABENDs, I know the ABEND code is in the ECB
(in that double 12-bit format). Where is the reason code? TCBARC?

 

Thanks in advance,

 

Charles Mills




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOPY losing APF authorisation in middle of JOB - etc

2010-04-20 Thread Tony Harminc
On 20 April 2010 19:16, Paul Gilmartin paulgboul...@aim.com wrote:

 I was envisioning that, as with LINKLIST, a load module loaded
 from an authorized catenand would run authorized; a load module
 loaded from an unauthorized catenand would run unauthorized.
 No security problem.  Should have been easy to do, given that
 Jim M. says this determined by a bit in the DEB set at OPEN,
 and OPEN surely knows what data set the DEB belongs to.

But there's only one DEB for the whole concatenation. And the magic
flag isn't in the section that represents each concatenation, though I
suppose it could be.

 But, Jim says (and I agree, as stated above) that there's
 minimal value in mixing authorized and authorized data sets in STEPLIB.

There might be a wee bit of an argument for doing it for JOBLIB, but
still not enough to put in the effort.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ADRNAPF was IEBCOP Y losing APF authori sation i n mi ddle of JOB - etc‏

2010-04-20 Thread Tony Harminc
On 20 April 2010 19:09, Sam Siegel s...@pscsi.net wrote:

 With all of the discussion about APF and loading programs from various types
 of libraries, I'm hoping someone can provide some clarification for
 me regarding the ADRNAPF of the load macro.

 The doc indicates that a module can be loaded from a non-apf library
 when ADRNAPF is used from an authorized program in supervisor state.  The
 doc further states that the it is the loading programs responsibility to
 ensure that program loaded from the non-apf library receives control in
 problem state.

 Please confirm that when the non-apf program receives control in problem
 state, it cannot change to supervisor state, discounting the possibility of
 using a magic svc, etc.

How do you propose to pass control to your newly loaded code in
problem state? If you just MODESET to problem state and BALR, then
presumably the called program could issue a MODESET back to supervisor
state, just like any other code running in an APF authorized job step.
If not, then one must assume that the jobstep has lost APF
authorization, and that seems most unlikely in this context.

If you use SYNCH or ATTACH with JSTCB=YES, then you're in a whole
different world, but System Integrity is still very much your
responsibility.

Be careful.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


DEB (was: IEBCOPY losing APF authorisation)

2010-04-20 Thread Paul Gilmartin
On Tue, 20 Apr 2010 19:37:57 -0400, Tony Harminc wrote:

On 20 April 2010 19:16, Paul Gilmartin wrote:

 I was envisioning that, as with LINKLIST, a load module loaded
 from an authorized catenand would run authorized; a load module
 loaded from an unauthorized catenand would run unauthorized.
 No security problem.  Should have been easy to do, given that
 Jim M. says this determined by a bit in the DEB set at OPEN,
 and OPEN surely knows what data set the DEB belongs to.

But there's only one DEB for the whole concatenation. And the magic
flag isn't in the section that represents each concatenation, though I
suppose it could be.

I had thought there was a DEB for each Extent in each Data set
in the concatenation.  I guess I don't understand how DEBs work.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DEB (was: IEBCOPY losing APF authorisation)

2010-04-20 Thread Gerhard Postpischil

On 4/20/2010 7:48 PM, Paul Gilmartin wrote:

I had thought there was a DEB for each Extent in each Data set
in the concatenation.  I guess I don't understand how DEBs work.


The DEB has a prefix, with mostly access method information, a 
basic section with links (DCB, TCB) and flags, and a device 
dependent variable section. For DASD, each extent of each file 
uses sixteen bytes to contain the mode flags, UCB address, start 
and end CCHH addresses, and a halfword track count. For a BPAM 
data set, it additionally contains 1-15 bytes relating the first 
extent of each data set in the concatenation to the physical 
number in the DEB.


Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc?

2010-04-20 Thread Gerhard Postpischil

On 4/20/2010 5:54 PM, Binyamin Dissen wrote:

Or it can use BSAM to read the module and perform relocation. An authorized
program can pretty much do anything in the computer.


I've got a subroutine to do that, too, with provision for 
passing an arbitrary relocation address. It's used in a debugger 
to do a quick CLCL to check for changes to the module code.



The point was that the system attempts to protect the authorized routine by
not allowing the direct method of loading from an unauthorized library.


I have no issue with the concept, only the language of the 
statement, which is demonstrably false.



Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF autho risation i n middle o f JOB - et c‏‏

2010-04-20 Thread Gerhard Postpischil

On 4/20/2010 6:11 PM, john gilmore wrote:

Your riposte, if that's what it is, comes down to the
assertion that you know how to make an unauthorized library
into an authorized one dynamically, at which point an
authorized task or jobstep can load something from it.

I know how to do this, and I am happy to stipulate that you
do too.  My point that an authorized step cannot load
something from an unauthorized library stands.


http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zsecurity/zsecc_060.htm 


(sorry about the wrap)

Authorized libraries are defined in an APF list, or in the link 
pack area. Any module in the link pack area (pageable LPA, 
modified LPA, fixed LPA, or dynamic LPA) will be treated by the 
system as though it came from an APF-authorized library.


IBM defines an authorized library as one that is specified in 
the system's static or dynamic APF table (the others are not 
relevant to this argument). Authorizing the DEB does not 
authorize the library, Q.E.D.




Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Getting Partition name defined in the IODF

2010-04-20 Thread Dinesh Thakur
Hi,

How Can I get the partition name defined in a IODF. I want to get this data
using REXX. I dont want to use the d m=cpu command.
Is it possible.


-- 
Regards,
Dinesh Thakur
Mainframe Sysprog Supporting MQ

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ICH409I 878-000 ABEND DURING RACHECK PROCESSING

2010-04-20 Thread Charles Mills
I'm getting the subject message followed eventually by an S40D-10 ABEND.

The offending program is a C++ program that is using ATTACH to load the IBM
OS PL/I Version 2 compiler (5668-910). The compiler gets at least a ways
into its processing before the ABEND. It's hard to tell exactly where the
ABEND occurs because S40D makes a real mess of things: spool datasets are
incomplete, the NOTIFY message does not have the return code, the job log
says (UNKNOWN)  MINUTES EXECUTION TIME, etc.  

S40D-10 is No storage was available in either the local system queue area
(LSQA) or the extended local system queue area (ELSQA) for the RTM2WA.

The REGION is 100M and I've got the PL/I compiler limited to SIZE(1000K).
The C++ program runs without problem in 60M if it does not ATTACH the PL/I
compiler. I can ATTACH at least some other programs (haven't tested every
program g) without error.

What sorts of things should I be looking for?

Thanks,

Charles Mills

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Getting Partition name defined in the IODF

2010-04-20 Thread Field, Alan C.
Look for fields in the ECVT. 

- Original Message -
From: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
To: IBM-MAIN@bama.ua.edu IBM-MAIN@bama.ua.edu
Sent: Tue Apr 20 19:57:27 2010
Subject: Getting Partition name defined in the IODF

Hi,

How Can I get the partition name defined in a IODF. I want to get this data
using REXX. I dont want to use the d m=cpu command.
Is it possible.


-- 
Regards,
Dinesh Thakur
Mainframe Sysprog Supporting MQ

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEBCOP Y losing A PF authori sation in middle of JOB - etc‏

2010-04-20 Thread Ted MacNEIL
Chris Craddock and now Jim Mulder have exhausted this topic; but moribund 
threads often take a long time to die here; instead, like a second-tier 
operatic heroine, they go on singing interminably.

I'd say there are still outstanding questions; the OP said it happened again.
Since the answer to the question WHY? has not been heard, how does this make 
the thread moribund?
-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ADRNAPF was IEBCOP Y losing APF authori sation i n mi ddle of JOB - etc‏

2010-04-20 Thread Chris Craddock
On Tue, Apr 20, 2010 at 6:09 PM, Sam Siegel s...@pscsi.net wrote:

 With all of the discussion about APF and loading programs from various
 types
 of libraries, I'm hoping someone can provide some clarification for
 me regarding the ADRNAPF of the load macro.

 The doc indicates that a module can be loaded from a non-apf library
 when ADRNAPF is used from an authorized program in supervisor state.  The
 doc further states that the it is the loading programs responsibility to
 ensure that program loaded from the non-apf library receives control in
 problem state.

 Please confirm that when the non-apf program receives control in problem
 state, it cannot change to supervisor state, discounting the possibility of
 using a magic svc, etc.



the point of ADRNAPF is to allow supervisor state system functions like
(say) the initiator or IMS to load garden variety programs from garden
variety load libraries without jumping through hoops. That almost certainly
existed (undocumented) for a long time and then at some point somebody
probably said oh that would probably be a useful function for ISVs too and
added the macro documentation to allow access to it. The warning about the
loading program's responsibility for maintaining integrity should be fairly
obvious. System components can be relied upon NOT to allow the loaded
program to get control in a privileged condition. Anyone else that uses
those functions has to follow the same rules.


-- 
This email might be from the
artist formerly known as CC
(or not) You be the judge.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html