Re: Rexx - calling assembler question
R1 contains the address of the PLIST. It will contain one entry (ie the first word of the PLIST will have the VL bit set). this entry will point to a 2 byte length field, followed by a character string whose length is in the first 2 bytes. IOW, a standard batch parameter list. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Scott Ford To: IBM-MAIN@bama.ua.edu, Date: 05/18/2012 10:37 AM Subject:Rexx - calling assembler question Sent by:IBM Mainframe Discussion List All: I am in the process of writing a Rexx program that will call an Assembler program and pass parameters. The program is simple.. - Rexx: /* TSTGFILE */ trace i say 'Address is: 'address() address TSO "CALL 'SFORD.LINKLIB(TESTCALL)' 'CLASS(USER' " Assembler: TESTCALL CSECT TESTCALL AMODE 31 TESTCALL RMODE ANY YREGS SPACE 3 SAVE (14,12),,'TESTCALL..&SYSDATE..&SYSTIME' LRR12,R15 USING TESTCALL,R12 L R4,0(R1) STR4,8(R13) STR13,4(R4) LRR13,R4 L R1,4(R1) MVC CLASSN(8),0(R4) MVC SUBMSGA+20(8),CLASSN SUBMSGA WTO 'PARM1:',ROUTCDE=11 BAILOUT DS0H L R13,SAVEAREA+4 RETURN (14,12),RC=0 CLASSN DSCL8 PROFNDSCL8 SAVEAREA DS18F Execution JCL: //REXXGRP JOB ,SYSTEMS,CLASS=A,MSGCLASS=X, // MSGLEVEL=(1,1),REGION=0M,NOTIFY=&SYSUID //STEP1EXEC PGM=IKJEFT01,DYNAMNBR=99 //STEPLIB DD DSN=SFORD.LINKLIB,DISP=SHR //SYSEXEC DD DSN=SFORD.CLIST.LIBRARY,DISP=SHR //SYSOUT DD SYSOUT=* //SYSPRINT DD SYSOUT=* //SYSTSPRT DD SYSOUT=* //SYSTSIN DD * %TSTGFILE /* - Output: J E S 2 J O B L O G -- S Y S T E M A D C D -- N O 09.17.26 JOB00225 FRIDAY,18 MAY 2012 09.17.26 JOB00225 IRR010I USERID SFORDIS ASSIGNED TO THIS JOB. 09.17.26 JOB00225 ICH70001I SFORDLAST ACCESS AT 09:17:12 ON FRIDAY, MAY 18, 09.17.26 JOB00225 $HASP373 REXXGRP STARTED - INIT 1- CLASS A - SYS ADCD 09.17.26 JOB00225 IEF403I REXXGRP - STARTED - TIME=09.17.26 09.17.27 JOB00225 +PARM1:CL 09.17.27 JOB00225 IEF404I REXXGRP - ENDED - TIME=09.17.27 09.17.27 JOB00225 $HASP395 REXXGRP ENDED I assumed I misunderstand how parameters are passed in Rexx to Assembler...I thought that R1 pointed to the Adcon list...can someone be so kind as to point this old fellow .the right way Regards, Scott J Ford Software Engineer http://www.identityforge.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: SLIP PER Sotroage Alteration SVC dump
Either use STATUS REGS which shows the PSW and REGS when the slip trapped, or look at the contents of the SDUMP CSA resident buffer (CVTSDBUF) which has data on the state of the system when the slip trap hit. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Micheal Butz To: IBM-MAIN@bama.ua.edu Date: 04/06/2012 03:42 PM Subject: SLIP PER Sotroage Alteration SVC dump Sent by: IBM Mainframe Discussion List Hi, I just got a hit and generated an SVC dump from a SLIP Storage Alteration My memory sort of escapes me on what IPCS option I would find the culprit that caused the storage overlay >From memory I do believe it would be one of the IPCS traces if someone could help I would appreciate it Thanks -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Friday fun: Halon dumps and POK Resets
I was told a similar story from operators at my first job in downtown Chicago. The computer room was on Michigan Ave, overlooking Grant Park, on the fifth floor. The tape drives were on the east side of the building (facing Grant Park/Lake Michigan), near the windows. Every day around sunrise, they would have the same problem with the tape drives unloading, until the windows were shaded over. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Barry Merrill To: IBM-MAIN@bama.ua.edu Date: 03/23/2012 11:13 AM Subject: Re: Friday fun: Halon dumps and POK Resets Sent by: IBM Mainframe Discussion List At State Farm in 1973, a new bank of tape drives were installed in late May, and they ran fine until Jun 15, when we began to see very strange tape ABENDS (starting with Fnnx as I recall), perhaps a dozen each day, that would then not occur until the next evening. After 10 days and much research by IBM, I decided to print the step records with those ABEND codes, and noticed that the time of the first instance of each day's ABEND was one or two minutes later than the prior day's first ABEND, but only up to June 22, when its first time was earlier than the first time on June 21, and subsequent days were also failing earlier by a minute or two on each successive day. I immediately concluded it must be somehow related to sunset, so the late Tim Wuthrich and I estimated the projected time of that day's first abend, stayed late, and were adjacent to the new drives when we saw the sun come thru the window, and one of the tapes that was being read immediately started to rewind! Those 3420 tape drives had an optical sensor that read the reflection from the silver strip at the end of the physical tape, and the sun got into that sensor, causing a false detection of end of tape. Installed blinds on that window and solved the problem. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Pre-Friday fun: Halon dumps and POK Resets
I worked at a place that had a cold site for D/R and the Halon dump switch was just above the light switch. One time a service guy got called in because the "always on" lights in the room were out, he opens the door but because of the dark, instead of stepping in and hitting the switch, slaps his hand around the wall to try and feel for the switch. Well guess what he hit first? The force of the halon dump blew out ceiling tiles and broke a bunch of light fixtures and light bulbs. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: zMan To: IBM-MAIN@bama.ua.edu Date: 03/22/2012 12:35 PM Subject: Pre-Friday fun: Halon dumps and POK Resets Sent by: IBM Mainframe Discussion List So over the years I've heard a few good stories about accidental (or deliberate) Halon dumps and BRS pressings. Like operators playing Frisbee in the machine room and discovering that the Halon button really, really needs a cover on it... Who else has stories to share? -- zMan -- "I've got a mainframe and I'm not afraid to use it" -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Program FLIH backdoor - This is a criminal breach of security!
Gene, All that an AC=1 module that is in an APF authorized module can do is to start running with the JSCBAUTH bit on if, and only if, it is invoked as a Job Step Task from the initiator, or other initiator-like process (z/OS UNIX Services, for instance). However, a PCFLIH backdoor can allow a problem state, non-system key program that is not running APF authorized to receive control in an authorized state simply by causing a program interrupt to occur. Now I don't know if this particular backdoor does this or not, but if it does (or worse, can be spoofed by a caller to do this) than it would constitute a violation of z/OS system integrity. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Pate, Gene" To: IBM-MAIN@bama.ua.edu Date: 03/05/2012 08:30 AM Subject: Re: Program FLIH backdoor - This is a criminal breach of security! Sent by: IBM Mainframe Discussion List I am amazed at the uproar over this. Is there anything that a PCFLIH backdoor can accomplish that any AC=1 module in any APF authorized library cannot? Gene Pate CSX Technology Enterprise Architecture -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: ACF2/RACF User Appliation Logical Access
Based on my past experiences with ACF2, I believe that ACF2 acts as if each rule line contains, in RACF terms, as asterisk after the last character. For example, if there are the following resources protected: APPL APPL1 APPL2 APPX Under RACF, access to APPL would only allow access to that resource. However (as I said this is based on old data, and may be incorrect) ACF2 would treat the resource as if it was specified as APPL*, so access to APPL would allow access to APPL1 and APPL2 as well as APPL. If this is incorrect I would welcome being corrected. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Shmuel Metz (Seymour J.)" To: IBM-MAIN@bama.ua.edu Date: 01/06/2012 10:07 AM Subject: Re: ACF2/RACF User Appliation Logical Access Sent by: IBM Mainframe Discussion List In <04b3da7b71b3ab408ca62ba6046bcf8f23d673a...@gvw0676exc.americas.hpqcorp.net>, on 01/05/2012 at 11:49 PM, "Henke, George" said: >Does anyone know how ACF2 validates a users access to specific >applications? Not without knowing how the installation has defined each. >Recently we tried to migrate from ACF2 to RACF and were forced to >fallback because ACF2 was somehow *wildcarding* a user's access to >applications whereas RACF was iterating through a list of >applications. What are you trying to say? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: [DB2 z/OS] USER CATALOG - Rules of Thumb and best practices
I don't have any DB2 specific advice regarding user catalogs, but when you ask about each member having its own catalog, if you mean "member" in the sense of DB2 data sharing, that really won't work, since DB2 treats the whole group as a logical entity. Now if you are referring to individual subsystems, I would recommend that you have at least one user catalog per DB2 subsystem or DSG, or at a minimum that you don't define the aliases for development and production in the same user catalog. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Rodney Krick To: IBM-MAIN@bama.ua.edu Date: 11/10/2011 12:56 PM Subject: [DB2 z/OS] USER CATALOG - Rules of Thumb and best practices Sent by: IBM Mainframe Discussion List Hi, I'm looking for some DB2 specific recommendations regarding User Catalogs, specially if there are any rules of thumb as a start point for defining the infrastructure for DB2 (like each member has its own catalog or something like that). I've searched the forum and asked daddy google, but didn't get smarter. The guys from DB2-L recommended me to post this to this list (IBM-Main). If some of you guys could share one or two links I would be very grateful! Thank you in advance! Rodney -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Testing g RTM routine
Michael, When you mention testing the "RTM" routine, I have to ask, do you mean the FRR routine or the RMTR? I think most of the responders assume you meant the FRR. If you meant the RMTR, that is much more difficult, because you need a way to ensure that one or more SRB's remain that haven't been dispatched yet. There is a possible way to do this, but be aware that it should NEVER be done on a production system, and could be risky even on a general purpose test system (but that is true of all SRB related testing). All the testing I have done with this sort of code has been run on a z/OS system that is running as a VM guest that I have total control over, to the point of being able to set VM trace traps to interrupt the whole machine. The procedure I have used could result in the hanging of the target address space, and/or the whole system, so I am hesitant to provide much detail, other than to say that it requires multiple SRB's that perform a spin loop, and use of the PURGEDQ macro to drive the RMTR routine. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Micheal Butz To: IBM-MAIN@bama.ua.edu Date: 10/27/2011 08:37 PM Subject: Testing g RTM routine Sent by: IBM Mainframe Discussion List Hi, Would anyone know how to test the RTM routine of a SRB when I issue a schedule even though SRB activity is asynchronous it takes off automatically -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS UNIX file can't be deleted. (Was confusing and confused)
Complaining about a correction is one thing. Knowingly providing an invalid response (referencing a VTAM command to delete a "file" which is an unheard of structure to VTAM) was uncalled for and could have delayed the OP from being able to resolve the problem that he reported. And the claim of confusion meant that the message text was ignored, since the first line of text spelled out that the problem was in the /tmp filesystem. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Shmuel Metz (Seymour J.)" To: IBM-MAIN@bama.ua.edu Date: 10/25/2011 06:29 PM Subject: Re: z/OS UNIX file can't be deleted. (Was confusing and confused) Sent by: IBM Mainframe Discussion List In <1505488263-1319523459-cardhu_decombobulator_blackberry.rim.net-690171122-@b11.c1.bise6.blackberry>, on 10/25/2011 at 06:17 AM, Ted MacNEIL said: >There is also the group that is like a dog with a bone and has >nothing better to do but bitch about a TLA that even IBM uses in both >contexts. That's the null set. But there *is* the group of those who reply solely to complain about a correction. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS Control block question
Walt, Thanks, I missed an important qualifier what I should have said was "all non-job step TCB's under a given JSTCB will point to the same TIOT." === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Walter Farrell/Poughkeepsie/IBM@IBMUS To: IBM-MAIN@bama.ua.edu Date: 10/24/2011 08:23 AM Subject: Re: z/OS Control block question Sent by: IBM Mainframe Discussion List On Sat, 22 Oct 2011 19:29:11 -0500, Wayne Driscoll wrote: >Please explain how "all TCB's under a given JSTCB will point to the same >TIOT" is incorrect, but "every TCB with the same TCBJSTCB will normally >have the same TIOT" is true, when the two statements make the same point? I -think- he's using a different definition of "under" than you are, Wayne. For example, the Region Control Task (RCT) is a jobstep task, and "under" it (subtask) is the initiator (also, iirc, a jobstep task), and "under" the initiator (subtask) is the user's jobstep task. -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS Control block question
Actually, no. There are 3 requirements for using JSCTB=YES on an attach macro, the first is that you have to be authorized, the second is that you have to have NO subtasks that have been attached without JSTCB=YES specified and the third is that you must be a JOB STEP TCB. Also,once you have a JSTCB=YES subtask running you cannot attach any subtasks with JSTCB=NO specified. Look at the return codes from ATTACH in the Authorized Services Reference, in particular RC=14 and RC=18 for more details.. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Micheal Butz To: IBM-MAIN@bama.ua.edu Date: 10/23/2011 12:04 AM Subject: Re: z/OS Control block question Sent by: IBM Mainframe Discussion List Cann't a Authorized program do a ATTACH JSTCB=YES anytime -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Wayne Driscoll Sent: Saturday, October 22, 2011 8:29 PM To: IBM-MAIN@bama.ua.edu Subject: Re: z/OS Control block question Please explain how "all TCB's under a given JSTCB will point to the same TIOT" is incorrect, but "every TCB with the same TCBJSTCB will normally have the same TIOT" is true, when the two statements make the same point? ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Shmuel Metz (Seymour J.)" To: IBM-MAIN@bama.ua.edu Date: 10/22/2011 06:28 PM Subject: Re: z/OS Control block question Sent by: IBM Mainframe Discussion List In , on 10/20/2011 at 10:05 AM, Wayne Driscoll said: >but all TCB's under a given JSTCB will point to the same TIOT. Actually not. There will generally be more than one JSTCB. What is true is that every TCB with the same TCBJSTCB will normally[1] have the same TIOT. [1] I'm not aware of any exceptions. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS Control block question
Please explain how "all TCB's under a given JSTCB will point to the same TIOT" is incorrect, but "every TCB with the same TCBJSTCB will normally have the same TIOT" is true, when the two statements make the same point? ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Shmuel Metz (Seymour J.)" To: IBM-MAIN@bama.ua.edu Date: 10/22/2011 06:28 PM Subject: Re: z/OS Control block question Sent by: IBM Mainframe Discussion List In , on 10/20/2011 at 10:05 AM, Wayne Driscoll said: >but all TCB's under a given JSTCB will point to the same TIOT. Actually not. There will generally be more than one JSTCB. What is true is that every TCB with the same TCBJSTCB will normally[1] have the same TIOT. [1] I'm not aware of any exceptions. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS Control block question
Resending so the comments are attached to the correct thread. I did something stupid in my mail client. Sorry, the additional load, while it won't hurt, isn't needed. I was thinking of TCBJPQ, which is only populated for the JSTCB. TCBTIO is populated for all TCB's, but all TCB's under a given JSTCB will point to the same TIOT. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com ======= From: Wayne Driscoll/Chicago/IBM@IBMUS To: IBM-MAIN@bama.ua.edu Date: 10/20/2011 06:31 AM Subject: Re: z/OS Control block question Sent by: IBM Mainframe Discussion List John, Your program also assumes that the routine is running under an RB in the Job Step Task. In a multi-tasking application (for instance under TSO/E) that will not be the case. In that case, you will need to add a L 4,TCBJSTCB Get Jobstep Task After the L 4,PSATOLD === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Roberts, John J" To: IBM-MAIN@bama.ua.edu Date: 10/19/2011 04:43 PM Subject: Re: z/OS Control block question Sent by: IBM Mainframe Discussion List My little subprog: *** *SUBROUTINE TO OBTAIN SYSTEM INFORMATION * *** GETJINFO CSECT GETJINFO AMODE 31 GETJINFO RMODE ANY LENTRY STM 14,12,12(13) BALR 12,0 USING *,12 L 2,0(1) GET PTR TO RETURN AREA USING ZSYSINFO,2 * *ADDRESS KEY CB'S * USING PSA,0 L 3,PSAAOLD LOCATE ASCB USING ASCB,3 L 4,PSATOLD LOCATE TCB USING TCB,4 L 5,TCBTIOLOCATE TIOT USING TIOT1,5 L 6,TCBJSCB LOCATE JSCB USING IEZJSCB,6 L 7,ASCBASXB LOCATE ASXB USING ASXB,7 L 8,ASXBSENV LOCATE ACEE USING ACEE,8 * *SAVE SYSTEM INFO FIELDS *--- XCZSYSINFO(256),ZSYSINFO MVC ZSYSPGMN,JSCBPGMN GET PROGRAM NAME MVC ZSYSUSER,ACEEUSRI GET USERID MVC ZSYSGRPN,ACEEGRPN GET GROUP MVC ZSYSJOBN,TIOCNJOB GET JOB NAME MVC ZSYSSTEP,TIOCSTEP GET STEP NAME * *BUILD THE DDNAME LIST *- ZAP ZSYSNDDN,=P'0' SET DDNAME COUNTER LA11,SSYSDD POINT TO DUMMY ENTRY LA15,ZSYSDD POINT TO FIRST SLOT LA14,TIOENTRY POINT TO FIRST TIOT DD ENTRY USING TIOENTRY,14 LDDN01 DS0H CLI TIOELNGH,X'00' IS THIS THE END OF THE TIOT? BELDDN99 YEAH - BREAK OUT CPZSYSNDDN,=P'512'ABOUT TO OVERFLOW? BNL LDDN99 YES - STOP B4 WE BUST LIMIT APZSYSNDDN,=P'1' NO - BUMP COUNT XC0(64,15),0(15) CLEAR SLOT MVC 0(8,15),TIOEDDNMSAVE DDNAME ZAP 8(2,15),=P'0' PRESET CONCAT SEQUENCE CLI TIOEDDNM,X'40' IS THIS A CONCAT ENTRY? BNE LDDN02 NO - SKIP MVC 0(8,15),0(11) YES - RESET DDNAME ZAP 8(2,15),8(2,11) PROPAGATE ... AP8(2,15),=P'1' ... CONCAT SEQUENCE LDDN02 DS0H LR11,15 SAVE PTR TO PRIOR ENTRY SR1,1 ICM 1,B'0111',TIOEJFCB LOCATE JFCB MVC 10(44,15),16(1) LA15,54(15) BUMP SLOT POINTER SR1,1 IC1,TIOELNGH LOAD CURRENT ENTRY LENGTH LA14,0(1,14) POINT TO NEXT TIOT DD ENTRY B LDDN01 LDDN99 DS0H DROP 14 * *EXIT * SR15,15 SET RC=0 L 14,12(13) RESTORE R14 LM0,12,20(13) RESTORE R0 TO R12 BR14 RETURN SSYSDD DS0CL54 DUMMY DD ENTRY DCCL8'' DCPL2'0' DCCL44'*' LTORG ZSYSINFO DSECT ZSYSJOBN DSCL8 CURRENT JOB NAME ZSYSSTEP DSCL16CURRENT JOBSTEP AND PROCSTEP ZSYSPGMN DSCL8 CURRENT PROGRAM NAME ZSYSUSER DSCL8 CURRENT USERID ZSYSGRPN DSCL8 CURRENT GROUP DSCL206 RESERVED FOR EXPANSION ZSYSNDDN DSPL2 COUNT OF DDNAME ENTRIES ZSYSDD DS512XL
Re: Storage usage in a job
Sorry, the additional load, while it won't hurt, isn't needed. I was thinking of TCBJPQ, which is only populated for the JSTCB. TCBTIO is populated for all TCB's, but all TCB's under a given JSTCB will point to the same TIOT. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Wayne Driscoll/Chicago/IBM@IBMUS To: IBM-MAIN@bama.ua.edu Date: 10/21/2010 03:28 PM Subject: Re: Storage usage in a job Sent by: IBM Mainframe Discussion List So the job allocated almost 8 meg below the line, and almost 1.7 gig above the line, so I would say that something used the bulk of the private area. Looking at a dump to see what TCB subpool and key combination used the bulk of the storage would be the start. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Phil Smith To: IBM-MAIN@bama.ua.edu Date: 10/21/2010 02:43 PM Subject: Re: Storage usage in a job Sent by: IBM Mainframe Discussion List Tom Marchant asked: >You've had some other hints, but I didn't see this mentioned. What was displayed in the IEF374I message in JESYSMSG? IEF374I STEP/RUN /STOP 2010292.0955 CPU 345MIN 59.72SEC SRB0MIN 00.44SEC VIRT 7752K SYS 272K EXT 1675360K SYS 12044K -- ...phsiii -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS Control block question
John, Your program also assumes that the routine is running under an RB in the Job Step Task. In a multi-tasking application (for instance under TSO/E) that will not be the case. In that case, you will need to add a L 4,TCBJSTCB Get Jobstep Task After the L 4,PSATOLD === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Roberts, John J" To: IBM-MAIN@bama.ua.edu Date: 10/19/2011 04:43 PM Subject: Re: z/OS Control block question Sent by: IBM Mainframe Discussion List My little subprog: *** *SUBROUTINE TO OBTAIN SYSTEM INFORMATION * *** GETJINFO CSECT GETJINFO AMODE 31 GETJINFO RMODE ANY LENTRY STM 14,12,12(13) BALR 12,0 USING *,12 L 2,0(1) GET PTR TO RETURN AREA USING ZSYSINFO,2 * *ADDRESS KEY CB'S * USING PSA,0 L 3,PSAAOLD LOCATE ASCB USING ASCB,3 L 4,PSATOLD LOCATE TCB USING TCB,4 L 5,TCBTIOLOCATE TIOT USING TIOT1,5 L 6,TCBJSCB LOCATE JSCB USING IEZJSCB,6 L 7,ASCBASXB LOCATE ASXB USING ASXB,7 L 8,ASXBSENV LOCATE ACEE USING ACEE,8 * *SAVE SYSTEM INFO FIELDS *--- XCZSYSINFO(256),ZSYSINFO MVC ZSYSPGMN,JSCBPGMN GET PROGRAM NAME MVC ZSYSUSER,ACEEUSRI GET USERID MVC ZSYSGRPN,ACEEGRPN GET GROUP MVC ZSYSJOBN,TIOCNJOB GET JOB NAME MVC ZSYSSTEP,TIOCSTEP GET STEP NAME * *BUILD THE DDNAME LIST *- ZAP ZSYSNDDN,=P'0' SET DDNAME COUNTER LA11,SSYSDD POINT TO DUMMY ENTRY LA15,ZSYSDD POINT TO FIRST SLOT LA14,TIOENTRY POINT TO FIRST TIOT DD ENTRY USING TIOENTRY,14 LDDN01 DS0H CLI TIOELNGH,X'00' IS THIS THE END OF THE TIOT? BELDDN99 YEAH - BREAK OUT CPZSYSNDDN,=P'512'ABOUT TO OVERFLOW? BNL LDDN99 YES - STOP B4 WE BUST LIMIT APZSYSNDDN,=P'1' NO - BUMP COUNT XC0(64,15),0(15) CLEAR SLOT MVC 0(8,15),TIOEDDNMSAVE DDNAME ZAP 8(2,15),=P'0' PRESET CONCAT SEQUENCE CLI TIOEDDNM,X'40' IS THIS A CONCAT ENTRY? BNE LDDN02 NO - SKIP MVC 0(8,15),0(11) YES - RESET DDNAME ZAP 8(2,15),8(2,11) PROPAGATE ... AP8(2,15),=P'1' ... CONCAT SEQUENCE LDDN02 DS0H LR11,15 SAVE PTR TO PRIOR ENTRY SR1,1 ICM 1,B'0111',TIOEJFCB LOCATE JFCB MVC 10(44,15),16(1) LA15,54(15) BUMP SLOT POINTER SR1,1 IC1,TIOELNGH LOAD CURRENT ENTRY LENGTH LA14,0(1,14) POINT TO NEXT TIOT DD ENTRY B LDDN01 LDDN99 DS0H DROP 14 * *EXIT * SR15,15 SET RC=0 L 14,12(13) RESTORE R14 LM0,12,20(13) RESTORE R0 TO R12 BR14 RETURN SSYSDD DS0CL54 DUMMY DD ENTRY DCCL8'' DCPL2'0' DCCL44'*' LTORG ZSYSINFO DSECT ZSYSJOBN DSCL8 CURRENT JOB NAME ZSYSSTEP DSCL16CURRENT JOBSTEP AND PROCSTEP ZSYSPGMN DSCL8 CURRENT PROGRAM NAME ZSYSUSER DSCL8 CURRENT USERID ZSYSGRPN DSCL8 CURRENT GROUP DSCL206 RESERVED FOR EXPANSION ZSYSNDDN DSPL2 COUNT OF DDNAME ENTRIES ZSYSDD DS512XL54 ARRAY OF DDNAME ENTRIES IHAPSA DSECT=YES,LIST=YES IHAASCB DSECT=YES,LIST=YES IHAASXB DSECT=YES,LIST=YES IHAACEE IEZJSCB IKJTCB DSECT=YES,LIST=YES TIOT DSECT IEFTIOT1 END -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SYSTEM ABEND CODE 0F8 REASON CODE 00000014 under TESTAUTH
When you set a breakpoint in TSO TEST (or TESTAUTH), the TEST processor copies the current instruction off, and then inserts an SVC 97 instruction (0A61). Because you have an EUT FRR established, you are prohibited from issuing SVC instructions (other than 13). Because of this, when the TEST SVC is executed, the SVCFLIH issues the 0F8 abend. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Micheal Butz To: IBM-MAIN@bama.ua.edu Date: 10/17/2011 08:19 PM Subject: SYSTEM ABEND CODE 0F8 REASON CODE 0014 under TESTAUTH Sent by: IBM Mainframe Discussion List Hi, I am trying to establish a FRR in a TSO command processor program that is not re-entrant this is because Later I schedule a SRB and I want to use the routine I established as a FRR, as input to the SRBFRRA parameter While tracing thru TESTAUTH After establishing a breakpoint at the STM inst I get the following abend SETFRR A,FRRAD=SWAPFRR,WRKREGS=(7,8),EUT=YES *MACDATE03/23/2006 L 7,PSACSTK-PSA(0,0)ADDR OF CURRENT CL7,PSANSTK-PSA(0,0)IS CURRENT STACK *NORMAL STACK JNE *+8 NO, BRANCH OIPSAMFLGS-PSA(0),X'80' IND EUT TYPE FRR STM 14,3,16(7)SAVE REGS 14-3 SYSTEM ABEND CODE 0F8 REASON CODE 0014 under TESTAUTH -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TSO TEST Debugging with TPUT and input paramters
According to http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/ikj4b790/10.2?SHELF=EZ2ZO213&DT=2011062238 , "If the TPUT specifies an ASID or user ID, the message is sent to the target terminal. ASID and USERID TPUTs from programs not in supervisor state or not authorized under APF are prefixed with a plus sign (+) to prevent possible counterfeiting of system messages to an operator console." So they are valid for unauthorized programs. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Shmuel Metz (Seymour J.)" To: IBM-MAIN@bama.ua.edu Date: 10/09/2011 09:56 AM Subject: Re: TSO TEST Debugging with TPUT and input paramters Sent by: IBM Mainframe Discussion List In , on 10/07/2011 at 01:38 PM, Wayne Driscoll said: >TPUT has supported a USERID= operand, which will route the TPUT to a >logged on TSO user, for as long as I can remember. Doesn't that require authorizarion? My recollection is that it was in support of SEND, not for unprivileged programs. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TSO TEST Debugging with TPUT and input paramters
TPUT has supported a USERID= operand, which will route the TPUT to a logged on TSO user, for as long as I can remember. If the user isn't logged on, the message gets dropped on the floor. If not running under TSO, TPUT without USERID= will produce no output. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Ed Gould To: IBM-MAIN@bama.ua.edu Date: 10/07/2011 01:03 PM Subject: Re: TSO TEST Debugging with TPUT and input paramters Sent by: IBM Mainframe Discussion List Tony: AFAIK and its been this way since TSO/E first came out. TPUT will only work IN TSO putline/getline will work in batch and TSO. CICS has never worked . Ed - Original Message - From: Tony Harminc To: IBM-MAIN@bama.ua.edu Cc: Sent: Friday, October 7, 2011 12:30 PM Subject: Re: TSO TEST Debugging with TPUT and input paramters On 7 October 2011 13:47, Shmuel Metz (Seymour J.) wrote: > In > , > on 10/06/2011 > at 06:03 PM, Tony Harminc said: > >>Certainly any program can issue TPUT when running under TSO. >>(For that matter any program running in batch or CICS or whatever >>can issue TPUT to an online TSO terminal.) > > The first part is correct. Though it's not, of course, logically required, I infer from the context that you think the second part is incorrect. Please give details. Tony H. "You may have mail!" -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DCB exlst 16
Sam, It was a good thing you posted the code sample. The program is actually providing EXLST entries 13 and 06. The X'80' bit indicates that this is the end of list, Once the EOL bit is turned off, you are left with x'06' which is the EOV exit, as you seem to suspect. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Sam Siegel To: IBM-MAIN@bama.ua.edu Date: 09/13/2011 08:05 AM Subject: DCB exlst 16 Sent by: IBM Mainframe Discussion List Hello readers. I've got an old problem state assembler program that does certain sub totaling whenever the DCB EXLST 16 is driven. When exit 16 is driven, the current dataset name is obtained from the JFCB and a totaling subprogram is called. DCB EXLST 13 and 16 are used. Exit 16 is documented as reserved. However my code labels it as some type of EOV exit. When executing exit 16, my code does not use information provided by registers 0 or 1. All registers are saved on entry and restored prior to exit. >From the doc and based on my understanding, the documented EOV exits are driven on VOLUME switch or on DSN switch when like-DCB datasets are concatenated. The program is being converted to COBOL. The IO and RDJFCB will be placed in an assembler subroutine. My questions is, when is EXLST 16 driven? And if anyone knows, what is the purpose of exit 16? Thanks, Sam P.S. Relevant sections of code are listed below. * start RDJFCB code OPEN DS0H OPEN (INTRANS,(INPUT)) RDJFCB (INTRANS) GET INTRANS ALLOC RETRIEVAL LIST MVC SVARLA,ARLAREA SAVE ADDR TO ALLOC RETRIEVAL LIST MVC JFCB#,ARLRTRVD SAVE # JFCB'S RETRIEVED L R14,SVARLA ADDRESS JFCB FOR DSN MVC DSNNAME,4(R14) MOVE DSNNAME TO SUB208 PARM * end RDJFCB code *** start of dcb exit 16 EXEOVDS0H STM R0,R15,SAVEEX LAR13,SAVEEX2 MVC FUNCTION,=C'SUB' INDICATE SUBTOTAL CALL GETSUB,(SUB208,PARMPR),VL SRR2,R2 CLEAR REGISTER LHR2,JFCB# LOAD NUMBER OF JFCB'S REMAINING EXEOV1 BCTR R2,0 DECREMENT # OF JFCB'S REMAINING TO SHR2,JFCB# ..LIST AND SAVE IT FOR LATER L R14,SVARLA ADDRESS JFCB FOR DSN SRR2,R2 CLEAR REGISTER LHR2,0(R14) LOAD LENGTH OF JFCB ENTRY ARR14,R2 POINT TO NEXT JFCB IN ALLOC LIST MVC DSNNAME,4(R14) MOVE DSNNAME TO SUB208 PARM STR14,SVARLA SAVE ADDRESS JFCB LMR0,R15,SAVEEX *** end of dcb exit 16 *** start of DCB and EXLST definition INTRANS DCB DDNAME=INTRANS, * MACRF=GM, * DSORG=PS, * EXLST=EXLST,* EODAD=RDINEOF EXLSTDS0F DCX'13',AL3(EXJFCB) DCX'86',AL3(EXEOV) ..FLAG END OF LIST EXJFCB IHAARL DSECT=NO *** end of DCB and EXLST definition -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Enforcing job name conventions - which exit?
IKJEFF10 runs in the TSO user address space, under the TCB of the submit command. This means that it can display a message to the user terminal. In addition it has access to TSO/E control blocks that exist in the submittor address space. IEFUJV runs in the Converter or Interpreter, not in the submitting address space. It has more limited means of communicating to the submittor. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Paul Gilmartin To: IBM-MAIN@bama.ua.edu Date: 08/10/2011 10:46 AM Subject: Re: Enforcing job name conventions - which exit? Sent by: IBM Mainframe Discussion List On Wed, 10 Aug 2011 10:25:37 -0400, Scott Rowe wrote: >Two what? > >There is one TSO submit exit (IKJEFF10), and one job verification exit >(IEFUJV). These two exit points were created for different purposes and >functions. > What can be done in IKJEFF10 that couldn't equally well be done in IEFUJV? Can IEFUJV detect that the job is being submitted from a TSO session (whether by SUBMIT or writing directly to INTRDR) and take any special action needed for TSO? Does IEFUJV get control too late to perform actions required for TSO? Or does IEFUJV get control too early, before some control blocks required for TSO operations are set up? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another DB2 question...SYSIBM.SYSPLANDEP...how is this updated
Dave, Is the DBRM bound into a plan, or is the DBRM bound into a PACKAGE, then the plan is bound with the PACKLIST parm? In the former case (which is no longer supported as of DB2 V10 btw) SYSPLANDEP will be updated when the BIND PLAN is performed. However, in the latter case, SYSPLANDEP will be empty, and the dependancies will be recorded in SYSPACKDEP. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Dave Day To: IBM-MAIN@bama.ua.edu Date: 08/06/2011 11:44 AM Subject: Another DB2 question...SYSIBM.SYSPLANDEP...how is this updated Sent by: IBM Mainframe Discussion List I can't find in any manual where it states how SYSIBM.SYSPLANDEP is updated. I made the assumption it would be done at BIND time. I have a DBRM that contains both dynamic and static SQL. This DBRM is bound into a plan. I can run the program and the SQL will execute successfully. However, when I query SYSIBM.SYSPLANDEP, there are no rows for my plan. I used SPUFI to query. Once with a WHERE clause specifying my plan name, and another without the WHERE clause. With the WHERE clause returned no rows. Without the WHERE clause returned rows, but a search of the rows did not contain my plan name in the DNAME column. I have completed the sign-up for the DB2-L list, but don't have access to it yet. I guess they will process this in due time, but I thought someone on this list might know what causes this catalog table to be updated. Thanks for the help. --Dave Day -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Netview security problem
Eileen, Actually the comment that "Netview itself does not invoke security checking" is correct. Netview issues the MGCRE macro, which passes a command to the console interface. The interface console determines what command is being issued, and performs security checks to insure that the userid that is either defaulted, or requested by the caller of the MGCRE macro via the UTOKEN parameter is authorized to issue the command. My guess is that NETVIEW passes the UTOKEN of the user signed to the NETVIEW session if AUTHCHK=SOURCEID, and passes the UTOKEN of the NETVIEW address space if AUTHCHK=TARGETID . In either case, NETVIEW isn't making the security requests, they are made by the console service, in the same way that console services validates instructions issued from SDSF, the TSO OPER command, or any other application that issues MGCRE. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Barkow, Eileen" To: IBM-MAIN@bama.ua.edu Date: 08/05/2011 02:52 PM Subject: Re: Netview security problem Sent by: IBM Mainframe Discussion List Thanks for your comments Chris, but I think that you missed the point of the excerpt I included, which was just in response to someone saying that Netview itself does not invoke security checking - it does invoke security checking and how it does it depends upon the AUTHCHK option. AUTHCHK used to default to TARGETID, which used the userid of the task running (the Netview operator) as opposed to SOURCEID (the 5.4 default), which uses the id of the invoker. My problem was not with the inclusion or exclusion of the word 'MVS' in front of the command. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Chris Mason Sent: Friday, August 05, 2011 3:44 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Netview security problem Eileen > In NetView V5R4 there was a change to allow the D (DISPLAY), F (MODIFY), and V (VARY) commands to be issued from a NetView operator task without the MVS prefix. How massively amusing! I think I'll say that one more time: how really massively amusing! Today there is NetView. 15 years or so ago, Tivoli got into the act and started putting "Tivoli" in front of NetView in the product name although they had absolutely nothing whatsoever in this world to do with MVS NetView[1]. Before NetView and long before "Tivoli" was added to the name, there was NCCF (Network Communications Control Facility) which was bundled together with a number of products which used NCCF as an enabling environment as a sort of network management CICS but with a few basic functions. Before NCCF, those basic functions were supported by a product NOSP (Network Operation Support Program). Dates: NOSP (1978 or so), NCCF (1980 or so), NetView (1986 or so). Now, all readers are invited to propose what functions NOSP supported. Wait, while the cogs turn ... Why it's " D (DISPLAY), F (MODIFY), and V (VARY) commands to be issued from a" NOSP "operator task without" any thought of any sort of "prefix." Naturally, they were only the VTAM flavours of these commands. - Ok, I've had my joke! > In NetView V5R4 there was a change to allow the D (DISPLAY), F (MODIFY), and V (VARY) commands to be issued from a NetView operator task without the MVS prefix. These commands are now sent to the VTAM command processor where they are checked to determine if they are VTAM commands If they are not VTAM commands, they are forwarded to the MVS command processor (CNMCMVS) where they are processed the same as if they had been entered using the MVS command including security checking. I'm going to rephrase this entirely correct but thoroughly misleading paragraph so that it has the appropriate nuances. > In NetView V5R4 there was a change to allow even the non-VTAM D (DISPLAY), F (MODIFY), and V (VARY) commands to be issued from a NetView operator task without the MVS prefix. The VTAM command processor obviously takes these commands and then checks them in order to determine whether or not they are VTAM commands. If they are VTAM commands, they are processed as usual. If they are not VTAM commands, they are forwarded to the MVS command processor (CNMCMVS) where they are processed the same as if they had been entered using the MVS command. This processing includes security checking. Because NetView development so much insists on holding the poor put-upon system programmer's hand - and has done so ever since NetView was assembled from its constituent parts because - so one was lead to believe by NetView development - the poor lambs of system programmers bleated that putting the components together as individual - separately priced - products made the
Re: Re-entrant module stores into itself with no 0C4
MVS will only load modules marked as re-entrant into key zero storage if they are loaded from an APF authorized library. Modules loaded from non-authorized libraries are loaded into program key (usually 8) key. Note that it really isn't the library that is authorized, it is the full concatenation of libraries, so if one non-authorized library is added to a list of authorized libraries, it will be treated as non-authorized. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Gary DiPillo To: IBM-MAIN@bama.ua.edu Date: 07/19/2011 02:43 PM Subject: Re-entrant module stores into itself with no 0C4 Sent by: IBM Mainframe Discussion List I have run into a situation I have never seen before and did not think was possible. I must be missing something, but I haven't got a clue as to what. I have a batch program (A) that is re-entrant. However, statically linked to it is a program (B) that is not re-entrant. When this program B is called, it stores program (A)'s R13 in a save area within program (B)'s own storage. No ABEND, no program check. I used to think this was worthy of an 0C4. This program (B) issues a LOAD EP=C and stores the entry point address of the loaded program (C) in a data area within program (B). Again, no 0C4. Program (B) then CALLs the loaded program (C), which is also link-edited as re-entrant. Module (C) stores all kinds of data in data areas within itself. Again, no 0C4. The three programs involved are are all Assembler and linked RN, RU, even though two of them (B) and (C) are not re-entrant (my error). They are all in the same load library which is the only library the the batch job step's STEPLIB. None of the programs is in the LPA, nor is the library in the LINKLIST, nor are the programs in any other LINKLISTed library. My z/OS V1R10 image is a guest running under z/VM. Can someone suggest how these programs that are marked as re-entrant can be loaded and executed without error even though they are storing data within themselves? TIA, Gary DiPillo -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Making Z/OS easier - Effectively replacing JCL with Unix like commands
In my 20 plus year career I have seen a lot more people with mainframe backgrounds expressing a willingness to learn and integrate usage of non-mainframe technology than I have seen people from an "open-systems" background show a willingness to learn anything about the mainframe. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "R.S." To: IBM-MAIN@bama.ua.edu Date: 07/18/2011 03:50 PM Subject: Re: Making Z/OS easier - Effectively replacing JCL with Unix like commands Sent by: IBM Mainframe Discussion List W dniu 2011-07-18 22:15, Paul Gilmartin pisze: [...] > As upper management perceives, even through media such as airline > magazines, that (some; I'm confident not all) z/OS systems programmers > exhibit public delight in unwillingness to assimilate new technology and > in performing their jobs in a needlessly difficult, even painful manner, I'm not 'upper management', I'm very downlevel manager and I don't read airline magazines at all, I prefer some good redbook instead... HOWEVER MY OPINION IS EXACTLY AS THE ABOVE! Yes, majority of mainframe people I ever met do their job in needlessly difficult, sometimes even painful manner. SOme of them are absolutely unwilling to assimilate anything "new", even like DFSMS (is it modern? is it "cool"? did it come from "colorful worlds of Windows, Apple etc."?). Of course there are also people more opne-minded, but the majority... Oh, someone could say there are old farts and young wolves. No, the division is not so simple, I know clever open-minded gray-haired folks and young but very "old-minded" adepts. > it bodes ill for the future of the platform. Yes, I wish it would be untrue. -- Radoslaw Skorupka Lodz, Poland -- Tre tej wiadomoci moe zawiera informacje prawnie chronione Banku przeznaczone wycznie do uytku subowego adresata. Odbiorc moe by jedynie jej adresat z wyczeniem dostpu osób trzecich. Jeeli nie jeste adresatem niniejszej wiadomoci lub pracownikiem upowanionym do jej przekazania adresatowi, informujemy, e jej rozpowszechnianie, kopiowanie, rozprowadzanie lub inne dziaanie o podobnym charakterze jest prawnie zabronione i moe by karalne. Jeeli otrzymae t wiadomo omykowo, prosimy niezwocznie zawiadomi nadawc wysyajc odpowied oraz trwale usun t wiadomo wczajc w to wszelkie jej kopie wydrukowane lub zapisane na dysku. This e-mail may contain legally privileged information of the Bank and is intended solely for business use of the addressee. This e-mail may only be received by the addressee and may not be disclosed to any third parties. If you are not the intended addressee of this e-mail or the employee authorised to forward it to the addressee, be advised that any dissemination, copying, distribution or any other similar activity is legally prohibited and may be punishable. If you received this e-mail by mistake please advise the sender immediately by using the reply facility in your e-mail software and delete permanently this e-mail including any copies of it either printed or saved to hard drive. BRE Bank SA, 00-950 Warszawa, ul. Senatorska 18, tel. +48 (22) 829 00 00, fax +48 (22) 829 00 33, e-mail: i...@brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237, NIP: 526-021-50-88. Wedug stanu na dzie 01.01.2011 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 168.346.696 zotych. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Annoyance with the IEZJSAB macro
TRT is just one of a handful of instructions that modify all (or in the case of TRT) some of R2. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Mike Schwab To: IBM-MAIN@bama.ua.edu Date: 07/08/2011 04:13 PM Subject: Re: Annoyance with the IEZJSAB macro Sent by: IBM Mainframe Discussion List Doesn't the TRanslate and Test instruction set R2 to an address? On Fri, Jul 8, 2011 at 3:42 PM, Rick Fochtman wrote: > Ted MacNEIL wrote: > >>> When I learned Assembler, I was taught that registers 1,1,14 and 15 could >>> NEVER be expected to remain unchanged accross a macro invokation. >> >> Where is the second R1 maintained? >> (8-{]} >> > > Pardon me; I meant R0. Finger check? :-) > > Rick -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Real return address for link and attach
Donald, You seem to be asking about what happens to the "real" R14, is that correct? How do you define "real", If you are asking where the contents of R14 at the point the LINK(X) or ATTACH(X) macro is issued in the calling program are stored, the answer is simple, they aren't. Both of these macros (along with most other IBM defined macros) clearly document the contents of the registers when control returns to the caller. For ATTACH(X), R14 is used a work register by the system. For LINK(X), if the LINK(X) is successful, when the target program gets invoked, R14 will contain the return address, which will be the address of the SVC 3 instruction in the CVT. If the link fails, and an ERRET routine was coded, on entry to the ERRET, R14 was used as a work register by the system. Since the system uses R14 (most system macros use without saving Registers 14, 15, 0 and 1) if you care about the contents, it is the coder's responsibility to save them before issuing the macro, and restoring them after the macro expansion (and at any error points that the macro could pass control to). ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Donald Likens To: IBM-MAIN@bama.ua.edu Date: 07/05/2011 08:30 AM Subject: Re: Real return address for link and attach Sent by: IBM Mainframe Discussion List This has all been interesting but I don't think my question has been answered (sorry if I missed it). Some said I could get the real return address in the save area trace but I do not think that is correct since the calling program saves the registers and R14 points to LINK(x) or ATTACH(x) when the calling program is called. As for the PRB/SVRB discussion application programs run under a PRB. It was my understanding that attach returned to the OS but in my case I am seeing some pretty wierd things going on if the attached task ends immediately. As to the reference to LINK/Attach manuals it simply states that the registers are changed (I had already looked there). It didn't say what it did with the real R14. Any help is appreciated. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DR Plans (WAS: Escon and Ficon Extensions)
I worked for a company in 1988 after the Mother's Day Phone telephone switching station fire. We had a site in the Chicago area, and a second in Arizona, connected by 2 T1 lines. The lines were from different carriers, and there was only one point on the route that the lines had in common, sadly, it was the central office that caught fire. Took almost a month for Illinois Bell and AT&T to get things back to normal. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Ted MacNEIL To: IBM-MAIN@bama.ua.edu Date: 06/22/2011 03:18 PM Subject: Re: DR Plans (WAS: Escon and Ficon Extensions) Sent by: IBM Mainframe Discussion List >It's amazing what comes up in an actual disaster that never made it into our semi-annual tests. Considering the circumstances of a disaster, it wouldn't amaze me. In 1969, the Canadian government started forcing all financial institutions, over a certain size, to implement a DR plan, and test it. After the first few attempts, they came back to the Banks, and said: We hope you have the disaster you planned for! They made the Banks get real, or they would start regulating it. I worked for a company that never got to the point where a user could enter a transaction, nor submit a job, yet they classified all tests successful. The classic example (written up in DR Journal) was a company, in New Orleans, during Katrina. They had a DR Site in Arizona, got the apps up, the staff up, and even had a box of cell phones for everybody to use. The problem was that the phones all had New Orleans' area codes. So, nobody could call them because the CO servicing them was under water, hence offline. - Ted MacNEIL eamacn...@yahoo.ca Twitter: @TedMacNEIL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to diagnose memory leak?
GFS - GETMAIN, FREEMAIN, STORAGE Trace http://publib.boulder.ibm.com/infocenter/zos/v1r9/index.jsp?topic=/com.ibm.zos.r9.ieav100/gfs.htm === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Ted MacNEIL To: IBM-MAIN@bama.ua.edu Date: 06/06/2011 03:24 PM Subject: Re: How to diagnose memory leak? Sent by: IBM Mainframe Discussion List I've been working with z/OS & its predecessors since 1971 and I must have missed the memo7m - Ted MacNEIL eamacn...@yahoo.ca Twitter: @TedMacNEIL -Original Message- From: "Maxfield, John" Sender: IBM Mainframe Discussion List Date: Mon, 6 Jun 2011 14:19:11 To: Reply-To: IBM Mainframe Discussion List Subject: Re: How to diagnose memory leak? No... I meant GFS trace -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Ted MacNEIL Sent: Monday, June 06, 2011 12:07 PM To: IBM-MAIN@bama.ua.edu Subject: Re: How to diagnose memory leak? >GFS trace data can be used to detect this sort of thing. If you search the web for "GFS trace" you should be able to find what you need to know. You can map the trace records with IPCS. But you should consider using a program to process the trace records to expose the leak. ITYM GTF trace. - Ted MacNEIL eamacn...@yahoo.ca Twitter: @TedMacNEIL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: POHD: vs UTE (was: USS vs USS)
Chris, I have gone out of my way to respond to this, and this will be my only comment. Your objection to using USS when referring to z/OS Unix System Services seems to be rooted in the concept that "it does matter since it can cause ambiguity." However, you made this complaint about the TLA choice in a thread titled "Ported Tools in z/OS ADCD." However when I read the message, it makes reference to a few Unix file structures, but no reference to problems with logging on, which is the only place that Unformatted System Services will come into play, so were is the ambiguity? === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Chris Mason To: IBM-MAIN@bama.ua.edu Date: 05/04/2011 09:03 PM Subject: Re: POHD: vs UTE (was: USS vs USS) Sent by: IBM Mainframe Discussion List Kirk Before I address this ridiculous post directly, let me remind you how we got here. Ted MacNeil decided to make the claim that something that was wrong was right. Unchallenged your to be nurtured "newbies" might get the impression that he was indeed right and so they might continue in all innocence with the error. As I have indicated many times before, it does matter since it can cause ambiguity. The discussion has actually established what is right and what is wrong and Ted MacNeil has been obliged to depart - we hope - admitting that he is wrong but sticking to his wrongness out of spite. In trying to get that cleared up I deliberately created a new thread containing the words "unnecessary controversy" so that any who needed to stay away could and only the recalcitrants and recusants need participate - along with a few who have seen the light and helped out, as it were. Unfortunately, yet another thread was started with rather poor "list-craft" since it was not linked to the "unnecessary controversy" thread. Here the errors persisted in the shape of some saying what was wrong was right but maybe it shouldn't be. Again some cleaning up was required and, because the connection was not made, a certain amount of repetition was needed to be sure the correct message got through. This was and continues to be a technical exchange about proper words. Unlike with a rose, we don't have smell to guide us. Nevertheless, this second thread had a peculiar thread title, sufficiently peculiar for there to be no need for those not thinking they needed to be involved to participate. So, given the thread titles, I don't see why you're making this fuss. It is not obligatory actually to read each post which crops up on IBM-MAIN. I don't. It was only the month change that - some, including myself, might say unfortunately - somehow prompted me to look into something involving "ported tools". Chris Mason On Wed, 4 May 2011 18:11:02 -0500, Kirk Wolf wrote: >Maybe its time to have two lists - one for "Pedantic or Historical >Discussions" (POHD) , and one for "Useful Technical Exchange" (UTE) >(sorry if these acronyms are taken, I fully expect this thread to >blossom to discuss improper usage :-) > >A rough count of recent traffic on the "USS" TLA yields well over a >hundred posts, whereas only a handful of UTE on z/OS UNIX. > >Discussing two lists will likely turn pedantic, and since it has >probably been discussed before, historical. > >Unfortunately, many folks (and poor newbies) interested in UTE will >just tune out, since a few on list seem to think that POHD == UTE. > >Kirk Wolf >Dovetailed Technologies >http://dovetail.com > >PS> Here's a mildly aggressive idea: prefix your new UTE threads with >"UTE:" and as the OP be diligent and respond to any posts on your >thread that vector to pedantic or historical discussions with an >altered subject line prefixed "RE: POHD:"Note that I have >preemptively tagged this thread "POHD:" -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Problem with LPA=xx on IEASYSxx
Forgive me for asking the simple question first - After you updated PARMLIB to modify the contents of the LPA, did you remember to IPL with CLPA? === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Hilario G." To: IBM-MAIN@bama.ua.edu Date: 05/03/2011 02:18 AM Subject: Problem with LPA=xx on IEASYSxx Sent by: IBM Mainframe Discussion List Hi, I have an extrange problem for mi. On the member IEASYSxx y have a sentence for the LPALST library concatenations (LPA=xx). I discovered that the SVC for CICS when I start CICS isssue a problem that couldn't found the SVC 216. I follow the SYSLOG and not appear any sentence that the system use the LPAxx that I put on IEASYSxx. I appreciate any suggestions. Kind Regards. Hilario. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fear the Internet, was Cool Things You Can Do in z/OS
Shmuel, The setfacl command is supported on most "recent" linux distributions with SELinux disabled. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Shmuel Metz (Seymour J.)" To: IBM-MAIN@bama.ua.edu Date: 04/28/2011 08:31 PM Subject: Re: Fear the Internet, was Cool Things You Can Do in z/OS Sent by: IBM Mainframe Discussion List In , on 04/25/2011 at 01:46 PM, "McKown, John" said: >I may have misunderstood. I do find it confusing. But ACLs (Access >Control Lists) work even if you don't have SELinux working. I use >them all the time on Linux. I believe that you'll find that you have SELinux installed. I believe that the confusion is the distinction between SELinux basic enablement and addons utilizing that enablement. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixing Auth and Non-Auth Modules
I hope that this SVC has been removed. These "super-secret" SVC's are nothing more than MASSIVE integrity exposures, that can be relatively easily spoofed, and should be banned from any and all z/OS sites. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Emily A. Rambo" To: IBM-MAIN@bama.ua.edu Date: 04/22/2011 11:27 AM Subject: Re: Mixing Auth and Non-Auth Modules Sent by: IBM Mainframe Discussion List If there's no way to get what you need without using the functions that IBM requires be authorized, here's another possibility. We had a sysprog years ago who coded a user SVC that could be called to flip the JSCBAUTH bit on or off, with a very short list of program names in an internal table that are allowed to call the user SVC. It was needed for a dynamic allocation common module (SVC99) because IBM required that the caller be authorized in order to code the WAIT FOR UNITS parameter. We were having a lot of contention with tape drives at the time (pre virtual tape days). The dynalloc module called the user SVC to get itself authorized if wait for units was requested, it issued the SVC99, then called the user SVC again to de-authorize. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IPCS Setdef asid
All that SETDEF ASID(xxx) does is set the default ASID used when attempting to access dump storage for that IPCS session. It (nor any other IPCS command that I know of) perform any actions that would update the original dump dataset, which would be required to change the contents of PSAAOLD. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: michealbutz To: IBM-MAIN@bama.ua.edu Date: 03/26/2011 09:53 PM Subject: IPCS Setdef asid Sent by: IBM Mainframe Discussion List Hi, I would think that setdef asid would make that the psaaold asid However I try that command it doesn't seem to work out that way -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Dynamic calls from COBOL
Phil, In order for MVS program management to find load module CALL, I think you need to add an ALIAS statement in the Binder Control cards: INCLUDE TESTPGMS(DCALLEE) ALIAS CALL NAMEDCALLEE(R) === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Phil Smith To: IBM-MAIN@bama.ua.edu Date: 03/18/2011 03:05 PM Subject: Dynamic calls from COBOL Sent by: IBM Mainframe Discussion List Hoping someone here has more experience with dynamic linking than I do. I'm trying to get something to be dynamically callable from COBOL on z/OS. This is old-style dynamic calling, not DLL stuff. So I've found http://publib.boulder.ibm.com/infocenter/pdthelp/v1r1/index.jsp?topic=/com.ibm.entcobol.doc_4.1/PGandLR/ref/rpsub08.htm and have followed that (I believe), but get S806 ABENDs when calling the *second* entry point in the target module. So either I've missed something, the example is wrong, I'm using some wrong option on the linkedit, or it's gremlins. The callee, with entry points DCALLEE and CALL (yeah, stupid names, but I've been tinkering): --- Identification Division. Program-ID. DCALLEE. Environment Division. Configuration Section. Data Division. Working-Storage Section. Procedure Division. Display "DCALLEE got called". goback. Entry "CALL". Display "CALL got called". GOBACK. End Program "DCALLEE". --- JCL to compile/linkedit the callee: --- //IGYWC PROC //COBOL EXEC PGM=IGYCRCTL,REGION=2048K, // PARM='LIB,DYNAM,NODLL' //STEPLIB DDDISP=SHR,DSNAME=IGY340.SIGYCOMP //SYSPRINT DDSYSOUT=* //SYSLIB DDDISP=SHR,DSN=PHS.PDS.SOURCE(DCALLEE) // DDDISP=SHR,DSN=VSH.BASE230.SAMPLIB //SYSLIN DDDISP=SHR,DSN=PHS.PDS.OBJ(DCALLEE) //SYSUT1 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT2 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT3 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT4 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT5 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT6 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT7 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) // PEND // EXEC IGYWC //* //COBOL.SYSIN DD DSN=PHS.PDS.SOURCE(DCALLEE),DISP=SHR //* //LKED EXEC PGM=IEWBLINK,COND=(8,LT), // PARM='LIST,AMODE=31,MAP,LET,RENT,DYNAM(NO)' //SYSPRINT DDSYSOUT=* //SYSLIB DDDISP=SHR,DSN=CEE.SCEELKED //TESTPGMS DDDISP=SHR,DSN=PHS.PDS.OBJ //SYSLMOD DDDISP=SHR,DSN=PHS.PDS.LOAD //SYSUT1 DDUNIT=SYSDA,SPACE=(CYL,(3,1)) //SYSLIN DD* INCLUDE TESTPGMS(DCALLEE) NAMEDCALLEE(R) /* --- The caller: --- PROCESS DYNAM NODLL Identification Division. Program-ID. "DCALLER". Environment Division. Configuration Section. Data Division. Working-Storage Section. 77 pgm Pic X(8). Procedure Division. move "DCALLEE " to pgm. call pgm. move "CALL" to pgm. call pgm. Stop Run . End Program "DCALLER". --- JCL to compile/linkedit/run the caller: --- //IGYWC PROC //COBOL EXEC PGM=IGYCRCTL,REGION=2048K, // PARM='LIB,DYNAM,NODLL' //STEPLIB DDDISP=SHR,DSNAME=IGY340.SIGYCOMP //SYSPRINT DDSYSOUT=* //SYSLIB DDDISP=SHR,DSN=PHS.PDS.SOURCE(DCALLER) // DDDISP=SHR,DSN=VSH.BASE230.SAMPLIB //SYSLIN DDDISP=SHR,DSN=PHS.PDS.OBJ(DCALLER) //SYSUT1 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT2 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT3 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT4 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT5 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT6 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT7 DDUNIT=SYSDA,SPACE=(CYL,(1,1)) // PEND // EXEC IGYWC //* //COBOL.SYSIN DD DSN=PHS.PDS.SOURCE(DCALLER),DISP=SHR //* //LKED EXEC PGM=IEWBLINK,COND=(8,LT), // PARM='LIST,AMODE=31,MAP,LET,RENT,DYNAM(NO)' //SYSPRINT DDSYSOUT=* //SYSLIB DDDISP=SHR,DSN=CEE.SCEELKED //TESTPGMS DDDISP=SHR,DSN=PHS.PDS.OBJ //SYSLMOD DDDISP=SHR,DSN=PHS.PDS.LOAD //SYSUT1 DDUNIT=SYSDA,SPACE=(CYL,(3,1)) //SYSLIN DD* INCLUDE TESTPGMS(DCALLER) NAMEDCALLER(R) /* //RUN EXEC PGM=DCALLER,REGION=0K //* //STEPLIB DD DISP=SHR,DSN=PHS.PDS.LOAD //SYSOUT DD SYSOUT=* //SYSPRINT DD SYSOUT=* //* --- Any and all ideas greatly appreciated! -- ...phsiii Phil Smith III
Re: ASC. Mode
Unless your PSW is in AR mode, access registers are ignored, so until you issue the SAC 512, you will always be referencing data in the PRIMARY. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "McKown, John" To: IBM-MAIN@bama.ua.edu Date: 02/18/2011 02:02 PM Subject: Re: ASC. Mode Sent by: IBM Mainframe Discussion List > -Original Message- > From: IBM Mainframe Discussion List > [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Kristine Harper > Sent: Friday, February 18, 2011 1:59 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: ASC. Mode > > ASC mode is determined by PSW bits 16 and 17, and tells the > system where to find the referenced data (the data referenced > by the address in the GPRs). When ASC mode is secondary, SAC > is 256 and you are in cross memory mode. And the data resides > in the secondary address space. > > Kristine Harper > IMS R&D > NEON Enterprise Software In today's z/OS environment, is there any reason to use SAC 512 instead of just using AR mode with an ALET? -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Home 1= PRIMARY != SECONDARY
When you issue a PC-ss instruction, when the PC routine gets invoked, HOME is unchanged. Primary becomes the ASID of the PC routine, and SASN depends on the definition of the PC routine, and will either be the same as the address space that issued the PC (SASN=OLD), or the same as the primary (SASN=NEW). Now if that PC routine issues another PC-ss instruction, HOME again is unchanged, but the Primary and the secondary are again dependent upon the PC routine definition, but will either be the ASID that issued the PC or the ASID that the PC runs in. So now PRIMARY != HOME on PC-ss. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: michealbutz To: IBM-MAIN@bama.ua.edu Date: 01/27/2011 03:30 PM Subject: Re: Home 1= PRIMARY != SECONDARY Sent by: IBM Mainframe Discussion List Space Switching PC Primary != Secondary But Primary = HOME Home is where the code lives if lives in ASID 10 When it gets Control The PC is in ASID 10 The Asid Who issued the PC Is secondary right ??? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Binyamin Dissen Sent: Thursday, January 27, 2011 3:54 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Home 1= PRIMARY != SECONDARY On Thu, 27 Jan 2011 15:19:14 -0500 michealbutz wrote: :> Would anyone know in what scenario :> HOME id not = PRIMARY is not = SECONDARY Most typically when executing a space switching PC. A very normal situation. -- Binyamin Dissen http://www.dissensoftware.com Director, Dissen Software, Bar & Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: FITS requirement
Frank, I believe FITS is an acronym for "Field Information Tracking System" but I clearly could be wrong. Maybe John Eells, or Lynn Wheeler would know for sure. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Frank Swarbrick To: IBM-MAIN@bama.ua.edu Date: 12/07/2010 06:21 PM Subject: Re: FITS requirement Sent by: IBM Mainframe Discussion List >>> On 12/7/2010 at 2:45 PM, in message , Mark Zelden wrote: >> FITS is the name of the system used to submit formal requirements to IBM. >> > > I assume this is all the OP really wanted to know. If there is an acronym > behind the name, that would be only slightly interesting to know. > > Had his PMR started "a requirement needs to be submitted via FITS" or > something to that effect, it would have made more sense to him. Well, yes and no. I am simply curious as to what the acronym FITS in this context actually stands for. Or is it just a random set of four letters someone decided to give as the name for the system? Although I think you did answer the underlying "question", which is the fact that FITS is, apparently, an "IBM requirements entry system" or some such thing. So rather than being a type of requirement, which is what I had though, it is the system in which the requirement is entered. Thanks! Frank -- Frank Swarbrick Applications Architect - Mainframe Applications Development FirstBank Data Corporation - Lakewood, CO USA P: 303-235-1403 The information contained in this electronic communication and any document attached hereto or transmitted herewith is confidential and intended for the exclusive use of the individual or entity named above. If the reader of this message is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any examination, use, dissemination, distribution or copying of this communication or any part thereof is strictly prohibited. If you have received this communication in error, please immediately notify the sender by reply e-mail and destroy this communication. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Optional exec on RUNCPOOL subcommand
When you use the EXEC((myexec)) IPCS sets the IPCS SYMBOL "X" to the current cell. Your exec is assuming that X is a REXX variable. To get the address of the cell into a REXX variable you would need to use the IPCS EVALSYM command, ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Micheal Butz To: IBM-MAIN@bama.ua.edu Date: 12/06/2010 02:56 PM Subject: Optional exec on RUNCPOOL subcommand Sent by: IBM Mainframe Discussion List The documentation for the RUNCPOOL command says you can append a optional exec. Rexx or clist To the RUNCPOOL subcommand with the symbol X pointing to the current cell. Well I just have a small rexx exec which does the following /* rexx */ Address = X say ' cell address =' Address And all that gets displayed is cell address = address Sent from my iPhone -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Storage usage in a job
So the job allocated almost 8 meg below the line, and almost 1.7 gig above the line, so I would say that something used the bulk of the private area. Looking at a dump to see what TCB subpool and key combination used the bulk of the storage would be the start. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Phil Smith To: IBM-MAIN@bama.ua.edu Date: 10/21/2010 02:43 PM Subject: Re: Storage usage in a job Sent by: IBM Mainframe Discussion List Tom Marchant asked: >You've had some other hints, but I didn't see this mentioned. What was displayed in the IEF374I message in JESYSMSG? IEF374I STEP/RUN /STOP 2010292.0955 CPU 345MIN 59.72SEC SRB0MIN 00.44SEC VIRT 7752K SYS 272K EXT 1675360K SYS 12044K -- ...phsiii -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe hacking?
Ricc, Yes, APF authorization still allows the keys to the kingdom. That is why installations are expected to severely limit update access to APF authorized load libraries, the SETPROG MVS command, all datasets in the PARMLIB concatenation and all libraries defined as system level PROCLIBS. If a general user has write auth to an APF authorized dataset, your system, by definition, is unsecure. That is why IBM and ISV's provide integrity statements and take seriously all reports of integrity holes. This is also why IBM refuses to provide any sort of details on integrity APAR's, so that shops without the appropriate PTF's applied are less likely to be compromised. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Ricc Harding To: IBM-MAIN@bama.ua.edu Date: 10/14/2010 12:10 PM Subject: Re: Mainframe hacking? Sent by: IBM Mainframe Discussion List Yes Ed, these sites all had RACF installed and yes, it still required the VTOC "data set is RACF protected bit" to be flipped for the data set protection call to even be made. The needed resource manager calls became more apparent as the resources which were being protected grew. The ACF2 "protectall" vs RACF "protectnone" philosophy soon became the guiding light to making RACF actually usable as a security system by also implementing "protectall". However APF authorization still allows the keys to the kingdom with no trace for the clever programmer. And vendor PC calls are now the new point of entry for system penetration attempts since they have all but replaced most of the user written SVC's. The landscape changes but the dirt is still the same. The new hacker's lament might be "so many entry points to choose from and so little time to play". Vigilance and automation in security checking are the keys to catching the silly things but the "clever programmer" still must have the integrity and character to NOT do what they have both the ability and opportunity to do. Quis custodiet ipsos custodes -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Which TCB data element point to VSM
If you use the VSMDATA verb exit from IPCS, it provides performs this function, totalling storage by TCB, Subpool and Residency. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Micheal Butz To: IBM-MAIN@bama.ua.edu Date: 08/25/2010 09:06 AM Subject: Re: Which TCB data element point to VSM Sent by: IBM Mainframe Discussion List Thankx. BTW. There isn't a quick way of seeing how much storage or even how storage is allocated to a TCB in a subpool I would have to add all the DQESIZE(s) together Sent from my iPhone On Aug 25, 2010, at 9:10 AM, Steve Austin wrote: > TCBMSS, TCBUKYSP, TCBAE and TCBEAE > > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Micheal Butz > Sent: 25 August 2010 13:56 > To: IBM-MAIN@bama.ua.edu > Subject: Re: Which TCB data element point to VSM > > That's for the whole Address space I am looking for the Virtual > Storage Associated with a TCB > > Sent from my iPhone > > On Aug 25, 2010, at 8:27 AM, Bertus Bekker - Business Connexion > > wrote: > >> You might want to look at the LDA which as far as I can remember >> hangs off the ASCB or ASXB, Michael >> >> >> From: IBM Mainframe Discussion List on behalf of Micheal Butz >> Sent: Wed 2010-08-25 14:21 >> To: IBM-MAIN@bama.ua.edu >> Subject: Which TCB data element point to VSM >> >> Hi >> >> I am looking at a Dump. I know Virtual Storage is associated with a >> TCB >> >> would anyone know what TCB/STCB. data element Points to the VSM >> >> Sent from my iPhone >> >> --- >> --- >> For IBM-MAIN subscribe / signoff / archive access instructions, >> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN >> INFO >> Search the archives at http://bama.ua.edu/archives/ibm-main.html > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > - > --- > - > This email has been scanned for all known viruses by the MessageLabs > Email > Security Service and the Macro 4 internal virus protection system. > . > --- > - > > - > --- > - > This email has been scanned for all known viruses by the MessageLabs > Email > Security Service and the Macro 4 internal virus protection system. > . > --- > - > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: db2 dbrm
The DBRM is basically the "object module" output from a pre-compile, and used as input to the bind.The DBRM lib concatenation is determined when a plan or package is bound. This is stored in SYSIBM.SYSDBRM (for DBRM's bound directly into plans) or SYSIBM.SYSPACKAGE (for packages). === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Ed Finnell To: IBM-MAIN@bama.ua.edu Date: 08/03/2010 11:47 AM Subject: Re: db2 dbrm Sent by: IBM Mainframe Discussion List In a message dated 8/3/2010 11:28:55 A.M. Central Daylight Time, ron5...@gmail.com writes: how we will know from the region which DBRM data set the program is picking the module? >> The specification for DBRM is in DSNZPARM customization. Each instance of DB/2 will have a unique DBRM and an 'action character'. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ecb paramter on Attach
Joe, You have it backwards. When task is created via ATTACH, and the ECB= parameter is coded, that ECB will be posted by the operating system when the task terminates. If the parent task detaches a task before that task terminates, the child task will be abnormally terminated. The purpose of the ECB is to allow the parent to have a way of knowing that all of its subtasks have terminated (normally or abnormally), and are ready to be safely detached. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Joe Reichman To: IBM-MAIN@bama.ua.edu Date: 07/04/2010 03:22 PM Subject: ecb paramter on Attach Sent by: IBM Mainframe Discussion List Just to clarify the ECB= parameter on the Attach Is posted when the Main Task does a DETACH -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Unix systems and Serialization mechanism
Mark Your right, thanks for the correction, rack it up to a senior moment. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Mark Zelden To: IBM-MAIN@bama.ua.edu Date: 07/02/2010 10:45 AM Subject: Re: Unix systems and Serialization mechanism Sent by: IBM Mainframe Discussion List >I think you are comparing apples to oranges. DISP= can be specified in >JCL, the program isn't coded using DISP=OLD, it is inherited. In >addition, as DISP=OLD is the default, if the JCL coder omits the DISP >clause on the JCL, OLD is assumed. The default has always been (NEW,DELETE,DELETE).Thankfully if someone forgets to code disp on an important data set (or even a unimportant one) that is in use the job will wait until it is canceled or fail due to duplicate data set if it is not in use. Of course I've never done such a thing. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Unix systems and Serialization mechanism
Paul, I think you are comparing apples to oranges. DISP= can be specified in JCL, the program isn't coded using DISP=OLD, it is inherited. In addition, as DISP=OLD is the default, if the JCL coder omits the DISP clause on the JCL, OLD is assumed. And then if there isn't a shell interface to flock() (I don't know if there is one or not), that is a major difference between UNIX and z/OS. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Paul Gilmartin To: IBM-MAIN@bama.ua.edu Date: 07/02/2010 09:01 AM Subject: Re: Unix systems and Serialization mechanism Sent by: IBM Mainframe Discussion List On Fri, 2 Jul 2010 07:19:24 -0500, McKown, John wrote: > >No. UNIX does not have that functionality. I've looked for it. The closest is called an "advisory lock". This is the flock() function in UNIX. But all programs which access the file must code the flock() themselves. > Even as all z/OS programs desiring serialization must code DISP=OLD themselves. The UNIX kernel provides internal serialization sufficient to prevent directory corruption (as z/OS protects VTOCs). Neither UNIX nor z/OS protects against data corruption except by various elective mechanisms. >http://linux.about.com/library/cmd/blcmdl2_flock.htm > Is there a shell interface to flock()? Is the lock automatically freed when the requesting process terminates, for whatever cause? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Same ASID in Space-Switching PC Routine
To find the PRIMARY ASID, use the EPAR instruction, then use the LOCASCB macro if you need the ASCB address. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Adam Johanson To: IBM-MAIN@bama.ua.edu Date: 05/27/2010 03:40 PM Subject: Re: Same ASID in Space-Switching PC Routine Sent by: IBM Mainframe Discussion List Wayne, Yeah, I'm getting the ASCB from PSAAOLD and my confusion was that I didn't know that the ASCBASID is for the home address space, rather than the primary. Thanks, Adam Johanson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Same ASID in Space-Switching PC Routine
Where are you getting the source for the ASID and TCB address? If you are using PSAAOLD and PSATOLD, then you are seeing what is expected. When you issue a PC-ss, the PASN (in CR4) will be changed, and the SASN (in CR3) may be changed, depending on how the PC routine is defined. However, the HASN (which is located from the contents of the PSA) is not changed. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Adam Johanson To: IBM-MAIN@bama.ua.edu Date: 05/27/2010 02:35 PM Subject: Same ASID in Space-Switching PC Routine Sent by: IBM Mainframe Discussion List So I finally have a need to write a PC routine. I've been wanting to do this for a while. However, I'm seeing something that's not behaving like I expect it to. My server address space creates the PC routine (among other things) and then just sits there. For testing, I'm calling the PC routine via a plain old batch job. In the small program run by the batch job, I WTO'd out the TCB address and ASID before invoking the PC routine, and put the same WTOs in the PC routine itself. Since it's a space-switching PC routine, I expected the ASID from the WTO in the PC routine to match the server address space, but it doesn't; it's the same ASID for the batch job. Am I not understanding something correctly? Thanks in advance, Adam Johanson IMS Systems Programming, USAA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Accessing Cross Memory Storage in REXX
And even if you do use an SRB, there is still no guarantee that the results won't be "unpredictable." While the SRB approach protects you from some problems, it still doesn't provide access to any serialization techniques in use by the target address space. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Chris Craddock To: IBM-MAIN@bama.ua.edu Date: 05/10/2010 09:34 PM Subject: Re: Accessing Cross Memory Storage in REXX Sent by: IBM Mainframe Discussion List On Mon, May 10, 2010 at 4:37 PM, Rick Fochtman wrote: > - > > Highly unlikely unless I'm missing something obvious. The only LEGAL way to > access memory in some other address space is via an SRB. You need to be in > sup state and key zero to schedule an SRB and REXX runs key 8 and problem > state. But if we're allowed to cheat then I'll play :-) > > PS> I didn't know there were any mainframe people at Queens... > -- > Not strictly true, but the mechanisms are NOT for the meek! I've found > other ways but in the interests of safety, I'll not share them. > Notice that I said "Legal". Nothing else is supported by the z/OS software architecture - regardless of whether something else is possible under the hardware architecture. Any grinning idiot with an APF library can study PoPs and contrive ways of gaining addressability to some other address space, but since z/OS doesn't know (or allow!) what you would be doing, the results are most kindly described as "unpredictable". -- This email might be from the artist formerly known as CC (or not) You be the judge. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: supervisory state vs. authorized program
Radoslaw, It is possible to get into Supervisor State and/or system key without running APF authorized. It happens all the time, via either an SVC routine, or via the PC routines anchored in the System Function Table (SVT). If system functions always require APF authorization, , then the routines executed by say the OPEN SVC on behalf of a non-authorized program (ie your business applications) would not be able to perform these functions. Some functions do require APF authorization (ie the JSCBAUTH bit set), but most allow OR Sup State OR System Key without APF auth. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "R.S." To: IBM-MAIN@bama.ua.edu Date: 04/21/2010 01:40 AM Subject: Re: supervisory state vs. authorized program Sent by: IBM Mainframe Discussion List Tony Harminc pisze: > On 20 April 2010 11:01, Paul Gilmartin wrote: > >> Summarizing what no one has stated absolutely clearly yet, supervisor >> state is a hardware state, controlled by a bit in the PSW; authorized >> is a software state defined by flags set by the OS reflecting bits >> in the load module and the library from which it was loaded. > > Right. But it's a bit more muddled than that, because some operating > system services required that the caller be "authorized", but in many > cases this authorization can be APF authorization (regardless of what > machine state the program is running with), *or* being in supervisor > state. Often enough these services will also accept running in a > "system key" (generally a key < 8) as well. Isn't the APF prerequisite for both, supervisor state and key<8? If yes, then such services simply require APF. Supervisor state include APF, so the "or" above is redundant. > The bottom line is that an APF authorized program can get itself into > supervisor state and/or a system key, and a program running in > supervisor state can do absolutely anything with the machine, > including reading or changing any data in main storage or on disk, > bypassing all security, and even stopping the entire complex. [OT] IMHO the most dangerous is regular program running in problem state driven by idiot, who has authorization to change production data. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym BRE Banku SA bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Internal (program) start of an STC - MGCRE vs. ASCRE
John, To use the TCBSENV field, you issue a RACROUTE REQUEST=VERIFY,ENVIRN=CREATE and specify ACEE= passing the address of a fullword where RACF returns the ACEE. You then store that address in TCBSENV, You also need to specify that the ACEE is created below the line. You are also responsible for issuing the RACROUTE REQUEST=VERIFY,ENVIRN=DELETE when the use logs off. One thing to beware is that the TCBSENV is not propagated to subtasks, so if any services that use ATTACH are allowed, then you will need a way to get the subtask TCBSENV populated. However, I have to say that I agree that the best approach is to use UNIX services, since UNIX has been required since OS/390 1.5. People may not "like" it, but they do need it. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "McKown, John" To: IBM-MAIN@bama.ua.edu Date: 04/16/2010 08:25 AM Subject: Re: Internal (program) start of an STC - MGCRE vs. ASCRE Sent by: IBM Mainframe Discussion List > -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Rob Scott > Sent: Friday, April 16, 2010 7:51 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Internal (program) start of an STC - MGCRE vs. ASCRE > > >>I don't think I can use a single STC because I want the STC > to service multiple users, each with their own RACF security > environment (different z/OS RACF ids). > > This is possible within z/OS and exactly why the TCBSENV > field exists. > > Rob Scott Now that you mention it, I remember that ROSCOE did this too. Unfortunately, I don't know how to do this, and can't find documentation on it that I understand (I think this is some RACROUTE function, VERIFYX?). I do seem to understand the BPX1SEC service, which is address space oriented. Perhaps I should just "go UNIX" and use POSIX threads with the BPX1TLS (pthread_security_np) service. I don't know why, but these just seem easier to use, to me. Then again, there's the RACF callable service: IRRSIA00. Also, if I use a separate address space, I don't need to worry about deleting the ACEE. I don't know what happens when a subtask does a VERIFYX to set the TCBSENV terminates. I would like a RACF SMF records to be cut like happens with CICS on the CESN and CESF commands. I haven't seen a "Programming RACF Interfaces for Dummies" book around. Not that I'm likely to actually __do__ this. My company is very tight on CPU and likely would not approve me "doing things in order to lea! rn" anymore. Another point is the SDSF OWNER field. With different STCs, one per user, I think the SDSF OWNER would show who was "logged on" to the service via that STC. Of course, I could make the STC respond to a MODIFY command such as: F STCNAME,LIST USERS or some such. Also, the resource usage would be recorded to a specific STC, and thus user, in the SMF records cut for the STC. At least I hope the SMF records would show the "logged on" RACF id for the STC. But, if I use the MGCRE to do a START, then I'm going to put the RACF id in the start: START STCJCL.racfid or maybe use a started JOB: START STCJCL,JOBNAME=racfid. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How many mainframes are there?
My first job out of college was as a systems programmer. When I was hired, the group consisted of 8 sysprogs, and of them at least 2 had been hired straight out college as sysprogs. Also, during my tenure, we hired 2 other college grads as sysprogs. 4 of the five of us all went to the same college, which did teach a lot of systems level information. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Howard Brazee To: IBM-MAIN@bama.ua.edu Date: 04/12/2010 02:23 PM Subject: Re: How many mainframes are there? Sent by: IBM Mainframe Discussion List On 12 Apr 2010 07:40:55 -0700, wgshi...@benekeith.com (Greg Shirey) wrote: >An instructor from Verhoef made the observation in a class I attended >that he had never met a mainframe systems programmer whose first job >was as a systems programmer, and his students invariably would say that >they were invited to become a systems programmer. So, he always said >"Welcome to the club" when someone in his class would admit that they'd >just begun as a systems programmer. I remember when all of the applications programmers started off elsewhere.Then schools started offering programming courses, and people without experience applied based upon their education. How common has it been to get a college education in systems programming? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ASG
August, In 1999 when CA purchased Platinum Technology, the Justice Department required that CA divest of these products. If I recall correctly, the products, along with some R&D and support (and possibly other) assets were placed in escrow. At some point ASG purchased the products. I don't remember the exact details, but I highly doubt that these products could be legally licensed from anyone other than ASG or their agents at this point in time. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: August Carideo To: IBM-MAIN@bama.ua.edu Date: 04/09/2010 03:00 PM Subject: ASG Sent by: IBM Mainframe Discussion List Does anyone know if Zeke, Zack, Oasis are available from anyone else besides ASG I rem some products CA had were also available from others vendors after some type of monopoly lawsuit. I can't rem if any of the above fell into that category thanks, Augie -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition required for any SMP/E use
Bob, You are correct, I had the PPT option incorrect, thanks for jogging my memory. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Bob Rutledge To: IBM-MAIN@bama.ua.edu Date: 04/02/2010 06:04 PM Subject: Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition required for any SMP/E use Sent by: IBM Mainframe Discussion List Wayne Driscoll wrote: > Thankfully, APF authorization and system resource access security are 2 > separate things. When the OPEN SVC gets invoked, it will perform a > RACROUTE REQUEST=AUTH call for the dataset being opened, regardless of the > value in JSCBAUTH. The only way that security checks are bypassed is via > the NODSI option in the PPT. I think you mean NOPASS. NODSI bypasses the SYSDSN enqueues. Bob -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition required for any SMP/E use
Paul, Thankfully, APF authorization and system resource access security are 2 separate things. When the OPEN SVC gets invoked, it will perform a RACROUTE REQUEST=AUTH call for the dataset being opened, regardless of the value in JSCBAUTH. The only way that security checks are bypassed is via the NODSI option in the PPT. Now an APF authorized program could switch to key 0 and update various fields so the security system thinks they have more authority than they really should, but that isn't an issue when using a utility, particularly one that is covered under the z/OS statement of integrity. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Paul Gilmartin To: IBM-MAIN@bama.ua.edu Date: 04/02/2010 05:04 PM Subject: Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition required for any SMP/E use Sent by: IBM Mainframe Discussion List On Fri, 2 Apr 2010 16:47:54 -0500, Wayne Driscoll wrote: >Ed's concern is much more valid and realistic than Gil's. In Gil's case, >having SYSPUNCH refer to SYS1.PARMLIB, or some other protected dataset >really won't cause a problem, because APF authorization doesn't >automatically bypass the security system. However, a maliciously coded > OK. Educate me. I had thought that once a program was APF authorized, it became the responsibility of that program to issue the SAF calls and respect the replies; if not, the program could do anything it wanted. For example, suppose someone link edited IEBGENER into an APF authorized library and marked it AC=1. Now, I do: //STEP EXEC PGM=IEBGENER //STEPLIB DD DISP=SHR,DSN=... //SYSUT2DD DISP=SHR,DSN=SYS1.PARMLIB(...) //SYSUT1DD * ... Where does it fail? >HLASM user exit could, since it contains customer supplied code. Of >course, if the Assembler is invoked via SMP/E authorized, those HLASM >exits will have to be located in an APF authorized library, or else a 306 >abend will occur, so the writer of the malicious exit will still need a >way to update an APF library. > And that wouldn't happen, except at Bob Shannon's site. Thanks, gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition required for any SMP/E use
Ed's concern is much more valid and realistic than Gil's. In Gil's case, having SYSPUNCH refer to SYS1.PARMLIB, or some other protected dataset really won't cause a problem, because APF authorization doesn't automatically bypass the security system. However, a maliciously coded HLASM user exit could, since it contains customer supplied code. Of course, if the Assembler is invoked via SMP/E authorized, those HLASM exits will have to be located in an APF authorized library, or else a 306 abend will occur, so the writer of the malicious exit will still need a way to update an APF library. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Edward Jaffe To: IBM-MAIN@bama.ua.edu Date: 04/02/2010 04:31 PM Subject: Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition required for any SMP/E use Sent by: IBM Mainframe Discussion List Paul Gilmartin wrote: > And I see that GIMSMP is linked with AC=1; ASMA90 with AC=0; > both in authorized libraries. > > So, now sheer conjecture. ASMA90 may or may not do exhaustive > SAF checking. Why should it feel obliged to? It was designed > to run unauthorized. So a maliciously crafty programmer could > code an SMP/E APPLY step which invokes ASMA90; preallocate > SYSPUNCH; and supply PUNCH statements which overwrite a member > in what? SYS1.PARMLIB? > Or have your HLASM source/library/print user exits now suddenly getting control in an authorized environment. -- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe Executive article on the death of tape
Ed, Just to clarify, the place you were at with a DR scenario was to go offsite to an "obsolete system" was a company that you left 12-15 years ago. At the time, the site was either running MVS/XA with a 3090-200 at the main location and a 4381-Q13 at the offsite location, or running MVS/ESA with 3090-x00E's at both sites. I know because I worked there before you, and still are in touch with people that currently work there. Today they use a third party disaster recovery system, and have for at least 8-10 years. Wayne Driscoll -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ed Gould Sent: Monday, March 29, 2010 11:21 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Mainframe Executive article on the death of tape Ted: But there are more than a few out there that do not. I shudder at such places. Some places have 24 X 7 X 7 requirements and they still do not have it. I was at one place and their DR scenario was to go offsite to an obsolete system that was 10 years old when it was started. They sit there at board meetings and with a straight face say they have DR working perfectly. Chuckle chuckle The system they want to IPL won't because they refuse to believe you cannot just IPL any old version of MVS. Ed -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: WTO Alternative using HLASM
Chris, While Conrad is correct that you cannot issue SVC's in the DSME exits, as Binyamin Dissen noted in his reply, WTO has a LINKAGE=BRANCH entry which can be issued in SRB mode, so the product Juergen mentioned may not be " defective goods" because they most likely obey the rules, and use branch entry WTO in the exits. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Chris Mason To: IBM-MAIN@bama.ua.edu Date: 03/29/2010 12:02 PM Subject: Re: WTO Alternative using HLASM Sent by: IBM Mainframe Discussion List Juergen When Conrad first posted, I noted it was a VTAM topic so I checked the Communications Server SNA Customization manual. > why is it not allowed to use WTOs in DSME-Exit? You will find the following line in the "Design requirements" section for each exit: Do not issue any SVCs if this exit routine is running in SRB mode. Well, now, the question now arises as to whether or not the exit runs in SRB mode, does it not? It turns out that only the USERVAR - most of the time - and DSME exits are documented as running in SRB mode. Thus Conrad has done his "due diligence" with respect to the DSME exit. > We bought an exit from IBM and it uses WTOs. If this is an USERVAR exit or a DSME exit, you have bought defective goods. Perhaps you can reclaim from your credit card company! > So it (WTO) can be used. Not officially if the exit you acquired is the USERVAR exit or the DSME exit. - Actually, long ago when I had my education systems with which to play, I wrote up all of the VTAM exits which existed at the time. Mostly what I did was extract the information which is presented to the exits. Initially I used WTO but that was such a mess on the console that I changed all the WTOs to WTLs ("write to log" - is that an official macro or did I just create one wrapped around the SVC?). I believe I must have indulged in this exercise before the DSME exit was available and so I can't comment on whether or not it might work - but unofficially - and certainly not in a *production* system - if you want to be supported ... Chris Mason On Sun, 28 Mar 2010 23:58:49 -0500, Juergen Keller wrote: >hello Conrad, >why is it not allowed to use WTOs in DSME-Exit? We bought an exit from IBM >and it uses WTOs. So it can be used. >regards Juergen -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Subpools - specifically 241
If you have access to a sandbox LPAR, and take the time to read the appropriate manuals before running something, I think it is worth trying. Sadly the knowledge transfer of this sort of expertise is disappearing, so I don't think we should issue blanket discouragement to those who express an interest in this sort of learning. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Bob Shannon To: IBM-MAIN@bama.ua.edu Date: 03/25/2010 09:59 AM Subject: Re: Subpools - specifically 241 Sent by: IBM Mainframe Discussion List >I was wondering if anyone is using subpool 241 in their processing. >I had an earlier thread about using subpool 241 with a key of 9. > Based on the info I have read and some of you have given me, I'm thinking of trying to still use > subpool 241 but with a key of 0. >I have been trying to find info on how to use the subpools - but it seems like 2 pages in > one manual and then 3 in another. Does anyone know if there is a someplace I can find > information on how to use this properly? Things like - what state does the program need to be >in - problem or supervisor? Any other gotchas like that. >Thanks in advance for your time. At the risk of being a grinch, you should consider hiring someone to write the code you need. This is not the place for trial and error. Bob Shannon Rocket Software -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Trying to understand ALLOWUSERKEYCSA and subpool storage
Diane, Based on the below code snip segment, your installation has a "magic" SVC to get into SUP STATE KEY 0. which is also an integrity exposure, but that is another topic. If the code that acquires the code is able to get into SUP STATE KEY 0 to do the STORAGE OBTAIN, simply get the storage in KEY 0, and change the updating code to get into sup state around the updates. Subpool 241 is non-fetch protected, which means that any key can reference the storage, so as has been mentioned, readers won't care a bit, just the updating programs need to be modified. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Diane Goodwin To: IBM-MAIN@bama.ua.edu Date: 03/24/2010 09:18 AM Subject: Trying to understand ALLOWUSERKEYCSA and subpool storage Sent by: IBM Mainframe Discussion List Please bear with me. I'm primarily a CICS system programmer. I posted something similar to the CICS List but now I really need to understand it from the z/OS or MVS side of things. We have multiple CICS regions (address spaces) in an LPAR and they all currently share a piece of MVS storage. This area holds common information that all regions access. Only 2 regions actually update the information - all the others just read. Our program acquired the area using the following: LAR1,SVCSAVE HOLD AREA FOR SVC 255 SVC 255 GET INTO SUP. STATE WITH KEY 0 STORAGE OBTAIN,LENGTH=20480,SP=241,KEY=9 STR1,MVSCSADR STORE AREA ADDR. IN CSAEXT ICR11,=X'80' SPKA 0(R11) CHANGE TO KEY 8 CICS MODESET MODE=PROB SWITCH TO PROBLEM STATE The new default of ALLOWUSERKEYCSA of "NO" of course makes this fail. We did set it to YES since this is necessary for our CICS to run. However, I've been given the task to see if we can have a shared area and run with the default of NO. Subpool 241 is CSA, system, not fetch proteced, pageable storage. The closest I can find is 228 - which is CSA, system, not fetch protected but FIXED. However, will that still cause me issues since it is CSA? What about subpool 226 - says it is SQA, system, not fetch protected but FIXED? Might I be able to use that? The size of this area is not that large - 20,480 bytes. I'd be grateful for any light and wisdom you can shed on this subject for me. thanks in advance for your time, Diane Goodwin IT Systems Programmer Amica Insurance -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ICH14070I SETROPTS RACLIST REFRESH had no effect on class DSNADM.
Jim, The DSN* classes used by DB2 are indeed set up with RACLIST=DISALLOWED. In order to get these classes loaded into a RACF dataspace, a DB2 subystem has to first issue the RACROUTE REQUEST=LIST,GLOBAL=YES. This is done at DB2 startup with the security exit (d...@xac) enabled. Once this has been done, you can then issue the SETR CLASS(DSNADM) REFRESH to update the dataspace. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Jim McAlpine To: IBM-MAIN@bama.ua.edu Date: 03/19/2010 11:04 AM Subject: Re: ICH14070I SETROPTS RACLIST REFRESH had no effect on class DSNADM. Sent by: IBM Mainframe Discussion List On Fri, Mar 19, 2010 at 3:48 PM, Rob Scott wrote: > Looks like class DSNADM is shipped as RACLIST=DISALLOWED in the CDT > > > Rob Scott > Developer > Rocket Software > 275 Grove Street * Newton, MA 02466-2272 * USA > Tel: +1.617.614.2305 > Email: rsc...@rs.com > Web: www.rocketsoftware.com > > Fantastic, that's just made my day. Fortunately it's Friday and I'm going home shortly. Thanks anyway Rob. Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: RACHECK call: determining whether and which TCBSENV (TCB ACEE) is in charge
George, You are correct, I got the two control blocks mixed up. I did indeed mean ASXBSENV is used to locate the ACEE. Sorry for any confusion. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: George Fogg To: IBM-MAIN@bama.ua.edu Date: 03/16/2010 07:09 PM Subject: Re: RACHECK call: determining whether and which TCBSENV (TCB ACEE) is in charge Sent by: IBM Mainframe Discussion List > Only the TCBSENV for the current TCB is used if non-zero. If the current > TCBSENV is zero, then ACEESENV is used. > Never heard of a ACEESENV. I think you mean ASXBSENV. George Fogg -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: RACHECK call: determining whether and which TCBSENV (TCB ACEE) is in charge
Only the TCBSENV for the current TCB is used if non-zero. If the current TCBSENV is zero, then ACEESENV is used. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Dr. Stephen Fedtke" To: IBM-MAIN@bama.ua.edu Date: 03/16/2010 05:25 PM Subject: RACHECK call: determining whether and which TCBSENV (TCB ACEE) is in charge Sent by: IBM Mainframe Discussion List hi all, when there is a need to determine the TCBSENV (TCB ACEE) in charge for a given RACHECK call, determining it for the current TCB is quite easy: L R14,PSATOLD-FLC(0,0)LOAD CURRENT TASK CONTRO ICM R15,B'',TCBSENV-TCB(R14) BNZ tcbacee_given my question: 1) does racf only honor the TCBSENV of the current task, or is there a need to check the entire TCB tree above, means checking the TCBSENV field of the mother tcb, and its mother ... in order to identify any non-zero TCBSENV field? 2) is there a risk for an infinite loop in the tcb-mother-child structure by just looping until TCBOTC = 0? thanks for any info or code. best stephen --- Dr. Stephen Fedtke Enterprise-IT-Security.com Seestrasse 3a CH-6300 Zug Switzerland Tel. ++41-(0)41-710-4005 www.enterprise-it-security.com Meet you at Share in Seattle! Get current information on "Outsourcing: How to Avoid Security Pitfalls"(session 5244) (Seattle, March 2010, 15 to 19); for details refer to www.share.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: About ENQ - some basic questions
One place that MAY use it would JES2 for the SPOOL datasets. Since all spool datasets have the same name, if JES2 had the ENQ on the dataset name, you would be unable to delete or create additional SPOOL datasets while JES2 is running. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Paul Gilmartin To: IBM-MAIN@bama.ua.edu Date: 02/22/2010 04:29 PM Subject: Re: About ENQ - some basic questions Sent by: IBM Mainframe Discussion List On Tue, 23 Feb 2010 00:11:28 +0200, Binyamin Dissen wrote: > >:>>>> You may want to look into handling the ENQs yourself and not let SVC99 do >:>>>> them. Look at S99FLAG2 bit S99NORES. This tells SVC99 to not do the >:>>>> ENQ/DEQ. > >:>>> Unless I'm missing something, I hope this facility isn't >:>>> available to nonauthorized callers. > >:>>You are correct it's not. > >:>Still, I'm trying to imagine what even an authorized program >:>could usefully and safely do with a data set allocated with >:>no ENQ, given that absent that ENQ any other program, even >:>unauthorized, could make that data set, all its extents, and >:>its DSCBs vanish without warning. > >:>Perhaps with a reserve on the VTOC(s)? > >You are aware, of course, that an authorized program can access the dataset >without even going thru OPEN and without a single DD statement? > Of course. I simply assume that an authorized program can read the VTOC with EXCP. Or write it. (Someone must be able to do it.) Given that capability, what does SVC 99 with S99NORES avail. I suppose catalog lookup. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Rumba on zOS 1.11 telnet connection refused
IIRC, in z/OS 1,9 the TN3270 server process was no longer supported in the stack, but had to be run in it's own address space. It was possible to separate these functions earlier, but if you haven't, that would be the first thing to look at. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: John Mattson To: IBM-MAIN@bama.ua.edu Date: 02/11/2010 03:14 PM Subject: Rumba on zOS 1.11 telnet connection refused Sent by: IBM Mainframe Discussion List I am going from zOS 1.8 to 1.11 and have most of it up and running. One problem is that Rumba, Hummingbird, and other TN3270E apps get their connections refused by zOS 1.11. I have dug in the install docs, and applied the RACF updates in the ServerPac. My only guess is that something has tightened up the security. Anyone help? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PDS vs. PDSE
Eric, This is probably due to the fact that PDS/E's require a minimum of 1 page per member (Point 14 in Radalsow's summary). Since these are JCL members, I would imagine that a fair number of them are 15-20 line members, with the 4K minimum member size,for an FB-80 dataset that works out to just over 51 records, so any JCL that is under 51 lines will still take up 4K each, while in a PDS an 80 byte member takes 80 bytes in the PDS itself (after the directory of course). ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Eric Bielefeld To: IBM-MAIN@bama.ua.edu Date: 02/11/2010 09:40 AM Subject: Re: PDS vs. PDSE Sent by: IBM Mainframe Discussion List I just discovered something about PDS/Es that I don't remember being discussed. This discussion inspired me to copy my JCL PDS to a PDS/E on one of my accounts. Notice that the % full went from 62 to 95%. I used the same blksize. I figured that since the PDS was 62% full, I'd make the PDS/E 2 cylinders less. Here are the results: Tracks % XT Device Dsorg Recfm Lrecl Blksz $IQLG.JCL.CNTL 120 62 1 3390 PO FB 80 7520 $IQLG.JCLN.CNTL 120 95 2 3390 PO-E FB 80 7520 That's almost a third more space used. Any comments? I'm sure there are a few who know why that is out there. This PDS has just over a thousand members. Eric -- Eric Bielefeld Systems Programmer IBM MVS Technical Services Dubuque, Iowa 563-845-4363 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IPCS - How to find Load Point
To find the Load Point of a module, I have used field XTLMSBAD - Address of main Storage Block, offset x'0C' into the XLST structure. I use this in conjunction with XTLMSBLN a 3 byte field at offset 9 that is the length of the main storage block. Note that this block is NOT part of the intended program interface, so changes are possible to this block. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Thompson, Steve" To: IBM-MAIN@bama.ua.edu Date: 02/10/2010 01:57 PM Subject: IPCS - How to find Load Point Sent by: IBM Mainframe Discussion List I am doing some work with diagnostic tools that run in an IPCS environment. I need to, programmatically, find the load point of a module (NOT the EPA unless that is the Load Point). I have looked up and tried different things, and FINDMOD doesn't find what I'm looking for. I have been doing scans and Google and can't seem to get the answer to what I need. I have written a REXX routine that does the following (within IPCS): PSAAOLD to ASCB. ASCBASXB to ASXB. ASXBLTCB to the LAST TCB in the Address space. That TCB's TCBJSTCB points me to MY Job Step TCB. [Reason for this is, I don't know if I am an STC or a JOB, JES2 or JES3, but my code does have multiple TCBs.] Ok, now the JS TCB's TCBJPQ points to the CDE chain [the JS TCB is where the primary program issues multiple loads]. Now I can run the CDE chain to find module FOO. Once I find it, that CDE's CDENTPT is the EPA of the module (just as published). Here's the problem. Looking at the Data Areas for LLE and for XTLST I don't see where the load point is kept. My problem is, I need to find a particular string inside this load module. And I need to start at the Load Point with a FIND for this string. In the current case I'm looking at the Load point is x'CA' BEFORE the EPA (I know because I have the listing to this particular module). In other cases where I need to do this, the offset will be different. Does anyone know how I can get the Load point address out of one of these control blocks? Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DB2 V7 - Implications to storage increasing RID Pool
Dataspaces (and hiperspaces, which is actually what DB2 used for bufferpool extensions prior to DB2 V8) have a maximum size of 2 GiB even in z/OS so it is correct that DB2 V7 was strictly 31 bit. The use of hiperpools and EDMPOOL in a dataspace allowed DB2 virtually storage to grow "horizontally" by having additional data or hiper spaces each a max of 2GiB in size. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Joel C. Ewing" To: IBM-MAIN@bama.ua.edu Date: 02/05/2010 05:23 PM Subject: Re: DB2 V7 - Implications to storage increasing RID Pool Sent by: IBM Mainframe Discussion List This is not completely true. Not everything in DB2 V7 was required to be under the bar. Although the main address space was only 31-bit, V7 supported placing buffer pools in a 64-bit-addressable dataspace so that DB2 V7 could effectively make use of more than 2 GB of real storage. We ran in that mode for a number of years before going to V8. JC Ewing On 02/03/2010 04:38 PM, Mohammad Khan wrote: > V7 is a 31-bit app therefore everything is under the bar there. Increase the > pool only if you have enough real memory to go with it otherwise results may > not be to your liking. Even if there is enough real memory to go with it do > check that you are not taking away virtual storage from another critical part > of DBM1 address space e.g. virtual buffer pools, remember it all has to fit in > under 2GB. This increase can help with DB2 performance if you are > encountering many RID pool failures DUE TO POOL SHORTAGE but doesn't help > if the failure is due RDS RID limit. Then again you may be able to tune some of > these queries to use better access path and not rely on RID soting. > HTH > Mohammad > > > On Wed, 3 Feb 2010 04:06:55 -0800, Patrick Falcone > wrote: > >> Curious if anyone can shed light on the subject matter. We're taking the > default of 4 mb and want to increase to around 100 mb for the RID pool. It > appears in V7 the RID is allocated below the bar, in V8 it looks like the lists > part of the RID get moved above the bar. >> >> Do we need to be concerned about region or any other storage metrics, > performance implications to DB2? >> >> TIA... >> -- Joel C. Ewing, Fort Smith, ARjremoveccapsew...@acm.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IPCS & 64bit Storage
Dan, While I haven't started on this path yet, I believe that for 64 bit data access, you need to use the SYMBOL SERVICE rather than the STORAGE ACCESS service. It appears that when you define the ERS block you need to specify ABITS=64 to generate the LAD area as a 64bit field rather than a 32 bit field. Hope this helps, sorry I can't be more detailed. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: DanD To: IBM-MAIN@bama.ua.edu Date: 01/27/2010 12:23 PM Subject: IPCS & 64bit Storage Sent by: IBM Mainframe Discussion List Has anyone used the IPCS ADPLSACC service to access 64bit storage in a dump? Is it possible at all? If not, any suggestions on how to access 64bit storage in a VERBX routine. Thanks in advance. DanD -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: TELNET Inherited Region
I believe that the ASSIZEMAX from the OMVS segment is used if it was specified, otherwise the size set in BPXPRMxx MAXASSIZE will be used. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Dennis Trojak To: IBM-MAIN@bama.ua.edu Date: 01/13/2010 02:50 PM Subject: TELNET Inherited Region Sent by: IBM Mainframe Discussion List Maybe someone on the list can help since IBM is going around in circles trying to identify where my problem is. I am trying to run an IBM supplied JAVA script for a z/OS product installation from a TELNET session in my Windows DOS command screen. It cannot be run from ISHELL or OMVS. When I TELNET to my z/OS host I am getting a region size of 54M as shown by a monitor product and this is NOT acceptable to Java. They have locked onto the 54M and say it must be an IEFUSI problem even though the only one installed is the dummy in SYS1.LPALIB. I also do NOT have IEFUSI specified in the SMF parms for OMVS. Curiously enough when I check the INETD process it also has 54M which may be the source of the error but again I have no idea why it would default to that. My ISHELL/OMVS sessions get 200M as requested on the TSO LOGON so at least that part is working correctly. Since the Java folks don't speak SMF or IEFUSI and the z/OS folks don't speak Java/USS, does anybody out there recognize what is really happening? Dennis -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Where have the control blocks gone? -- Now down in the dumps
Or you can use SYSMDUMP DD SYSOUT=class And then use your handy dandy sysout management tool to save the dump to a disk dataset, and use IPCS. See http://bama.ua.edu/cgi-bin/wa?A2=ind0709&L=ibm-main&P=R28921&I=1&X=- === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Don Poitras To: IBM-MAIN@bama.ua.edu Date: 01/06/2010 01:10 PM Subject: Re: Where have the control blocks gone? -- Now down in the dumps Sent by: IBM Mainframe Discussion List Thompson, Steve wrote: > > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Don Poitras > Sent: Wednesday, January 06, 2010 12:10 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Where have the control blocks gone? > > > > Use FREE=CLOSE on the SYSMDUMP DD. > > > That only works if you are not interested in any other ABEND or dump > producing event that occurs. > > If DISP=MOD would work for SYSMDUMP, I could figure out how to split the > dumps by processing the file with REXX or some such. > > [I have a special case with my stuff -- the things I work on are > multi-threaded, multi-tasking and one failure may not be related at all > to another.] > > Let me give you an example: Program "DRIVER" is running. In a daughter > TCB a program is writing to DASD and gets an Sx37. Let's say that 10 > seconds later, under a different TCB the program I am interested in > (SHUCKS) finally gets the S0C3 I set up. That's the dump I really want > to look at. > > But let's have even more fun. Before I can get to the dump DSN with > IEBGENER (which would have to be invoked within this JOBSTEP to deal > with the DISP=OLD...), another program under a different TCB ABENDS. I > just lost the dump I'm really interested in. In this case, my only > choice for this is a SLIP. > > So the SYSMDUMP just can't handle this level of complexity. > > Welcome to the world of a developer. Thankfully, I have the ability to > issue MVS commands and can set SLIPs when and as I need them. > > But for the typical programmer/analyst in a production world situation > that does get to use IPCS, you don't get to do this. > > There's the rub. You can have multiple SYSMDUMPs. e.g. //SYSMDUMP DD DISP=SHR,DSN=SASDTP.SYSMDUMP,FREE=CLOSE //SYSMDUMP DD DISP=SHR,DSN=SASDTP.SYSMDUM2,FREE=CLOSE and if you just can't stand not getting _every_ dump, code a SYSUDUMP as the last one (without FREE=CLOSE): -- Don Poitras - zSeries R & D - SAS Institute Inc. - SAS Campus Drive mailto:sas...@sas.com (919)531-5637 Fax:677- Cary, NC 27513 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMF type 101 records
I'm not sure which manual has the details, but if you look in db2hlq.SDSNMACS member DSNDQWAS you will see the mapping DSECT for the SMF header, === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Mark Pace To: IBM-MAIN@bama.ua.edu Date: 12/21/2009 01:33 PM Subject: SMF type 101 records Sent by: IBM Mainframe Discussion List Do you know where to find the format of the DB2 SMF 101 record? I have found most of the record layouts in the SMF manual. However for 101 it says to look in the DB2 Administration Guide. I have found 4 Administration Guide: Planning Administration Guide: Implementation Administration Guide: Performance Administrative API Reference It's not listed in any of the 4 manuals. -- Mark Pace Mainline Information Systems 1700 Summit Lake Drive Tallahassee, FL. 32317 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Now is time for banks to replace core system according to Accenture
Well according to both my recollection, and Wikipedia ( http://en.wikipedia.org/wiki/Accenture) Accenture started out as a division of Arthur Andersen, but split from Arthur Andersen in 1989, but was still part of the AWSC administrative entity. It wasn't until August of 2000 that Andersen Consulting was split from AWSC and became Accenture. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "R.S." To: IBM-MAIN@bama.ua.edu Date: 12/02/2009 03:51 PM Subject: Re: Now is time for banks to replace core system according to Accenture Sent by: IBM Mainframe Discussion List Howard Brazee pisze: > On 2 Dec 2009 00:17:46 -0800, r.skoru...@would you snip my address.com? (R.S.) > wrote: > >>>> Does anyone remember who Accenture was? >>> Arthur Andersen, IIRC. >> No. Former name of Accenture was Andersen Consulting (www.ac.com), not >> Arthur Andersen. >> It was separate entity lng time before Enron bankrupcy. > > If Accenture was Anderson Consulting and Anderson Consulting was > Arthur Anderson, then Accenture was Arthur Anderson. > > I've worked with people who said they were one, and with people who > said they were the other. My English is poor, but I strongly believe it is not something proper or even kind to change someone's name. Andersen is not Anderson. And Andersen Consulting is (was) not Arthur Andersen. Just like Amdahl/Oracle/Storagetek is not IBM. Puma is not Adidas. Disclaimer: I just share information I have. I didn't say nothing good or bad about AC or any other company. I do not work for any of them. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym BRE Banku SA bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: question on STORAGE function - TCB may become non-dispatchable?
Well if the intent is to support above the bar storage, then GETMAIN or STORAGE won't help, as they only manage 24 or 31 bit storage. Requests for above the bar storage require usage of the IARV64 service. Since the storage is owned by the address space, this service will still require (at some point in its processing) the local lock, so suspensions due to lock unavailability will still come in to play. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "McKown, John" To: IBM-MAIN@bama.ua.edu Date: 12/02/2009 11:07 AM Subject: Re: question on STORAGE function - TCB may become non-dispatchable? Sent by: IBM Mainframe Discussion List > -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Rob Scott > Sent: Wednesday, December 02, 2009 11:02 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: question on STORAGE function - TCB may become > non-dispatchable? > > I am curious as to why the developer wants to bypass normal > CICS storage services (which probably is just a case of > compare-and-swapping a chunk on some sort of SM domain queue) > > This sounds very much like a case of "Doctor, it hurts when I > do this ..." > > > Rob Scott CICS does not support "above the bar" storage. As I recall the original question it was how to load a large VSAM file into memory above the bar because if loaded into CICS DSA, the region went SOS. Most people there said to rearchitecture the application to use some other, supported, method. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: question on STORAGE function - TCB may become non-dispatchable?
A PC-cp doesn't have any sort of implicit wait, so I don't see what they are referring to in that sense. Both GETMAIN (a type one SVC) and the STORAGE PC routine will, at some point have to get the local lock, which will cause a suspension if and only if the lock is unavailable. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "McKown, John" To: IBM-MAIN@bama.ua.edu Date: 12/02/2009 10:11 AM Subject: question on STORAGE function - TCB may become non-dispatchable? Sent by: IBM Mainframe Discussion List There is an ongoing discussion on the CICS-L list about doing a STORAGE macro or GETMAIN/FREEMAIN. Some are saying that these functions can result in a "wait" for the CICS QR TCB (the TCB under which most of the CICS transactions are run). The discussion has now become that the STORAGE macro issues a PC, which does an implicit "wait". My opinion has been that a normal STORAGE function does not do a ss-PC or cause the TCB to wait. It may take some CPU and cause response time problems, but the z/OS TCB does not go into a WAIT or SUSPEND state (non-dispatchable). Anybody have a definate response as to whether a STORAGE function can cause the TCB to become z/OS non-dispatchable. I agree that it is not a good idea to do this in CICS. John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What's up with WTO?
D23- What form of the WTO are you using? What release of z/OS, what has changed on your system recently? === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Steve Comstock To: IBM-MAIN@bama.ua.edu Date: 11/23/2009 01:40 PM Subject: What's up with WTO? Sent by: IBM Mainframe Discussion List [cross posted to ibm-assembler] All of a sudden, WTO code I've used for ages is abending with SD23. I've checked and rechecked the code. I've created a minimalist program. Same story. Is there something going on with WTO? -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques ==> Ask about being added to our opt-in list: <== ==> * Early announcement of new courses <== ==> * Early announcement of new techincal papers <== ==> * Early announcement of new promotions <== -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IEBUPDTE Supports Only LRECL <=80 :-(
copy file from PDS to zFS file. run sed script to perform updates. copy file back to PDS === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Edward Jaffe To: IBM-MAIN@bama.ua.edu Date: 11/12/2009 12:05 PM Subject: IEBUPDTE Supports Only LRECL <=80 :-( Sent by: IBM Mainframe Discussion List The 80-column punch card is still haunting me... Setting up an infrastructure for some new development, I recently discovered (the "hard" way) that IEBUPDTE works only with LRECL <= 80. I find this to be an incredibly oppressive restriction. I now have need for IEBUPDTE function with LRECL > 80. Has someone written a utility, perhaps available via CBT tape, that performs IEBUPDTE-like functions with LRECL > 80? -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ESTAE/ESTAEX are anchored, where?
One possibility - your program set an ESTAE, then called another routine that either 1 - Bypassed the ESTAE(X) call, but did an ESTAE(X) 0 call or 2 - Issued the ESTAE(X) but issued 2 ESTAE(X) 0 calls. You could run a GTF trace on the ESTAE SVC, for ESTAEX, I'm not sure. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Thompson, Steve" To: IBM-MAIN@bama.ua.edu Date: 11/11/2009 02:48 PM Subject: Re: ESTAE/ESTAEX are anchored, where? Sent by: IBM Mainframe Discussion List -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Wayne Driscoll Sent: Wednesday, November 11, 2009 2:31 PM To: IBM-MAIN@bama.ua.edu Subject: Re: ESTAE/ESTAEX are anchored, where? TCBSTAB points to the SCB stack. Thanks. Right after sending out that query, it occurred to me to scan SYS1.MACLIB for ESTAE... TCB+A0 is TCBSTAB Now I'm singing that old song, Oh where oh where did my ESTAE go, Oh where or where could it be Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ESTAE/ESTAEX are anchored, where?
TCBSTAB points to the SCB stack. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: "Thompson, Steve" To: IBM-MAIN@bama.ua.edu Date: 11/11/2009 02:19 PM Subject: ESTAE/ESTAEX are anchored, where? Sent by: IBM Mainframe Discussion List I have been searching manuals, books (MVS Power Programming, Invitation to MVS), searching the red books site, etc. and I can not find where an ESTAE (or ESTAEX) gets anchored. Does anyone know where these get anchored in a task structure? When looking at a dump under IPCS, I can see the SCB & SCBX for a task with an SDWA/RTM2WA. But I can't find where it is anchored. So for the TCBs that are not in the process of ABENDing, I can't find/see if they have error recovery routines. [That'll teach me to let go of my old MVS/XA manuals!] Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Reading DD card information
There are a number of options in assembler. 1 - On the DCB add an EXLST with option X'07' which contains the address of a 176 byte field. Then use the RDJFCB macro which will cause the contents of the JFCB (Job File Control Block) to be returned into the above field. Note that the EXLST must reside BELOW the 16meg line. This is documented in DFSMS Macro Instructions for datasets (for the DCB parameter) and DFSMS Using Datasets (the EXLST details) and DFSMSdfp Advanced Services (the RDJFCB macro). 2 - Use dynamic allocation (SVC 99) information retrieval to return information about the DD statement. This can be used to either retrieve the information about a single DD statement, or about all DD statements (by using the DIRELNO text unit). Dynamic Allocation is documented in the Authorized Assembler Programming Services Guide, despite the fact that unauthorized programs can use these services. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === From: Frank Swarbrick To: IBM-MAIN@bama.ua.edu Date: 09/16/2009 10:11 AM Subject: Reading DD card information Sent by: IBM Mainframe Discussion List I believe I have seen something like the following: //FJSTEST JOB NOTIFY=&SYSUID //STEP01 EXEC PGM=MYPGM //DUMMME DD DUMMY,DSN='THIS.IS.A.TEST' What does MYPGM need to do in order to retrieve the DSN value of the DD named DUMMME? A general pointer in the right direction would be nice. Specific examples would be great! :-) Thanks, Frank >>> The information contained in this electronic communication and any document attached hereto or transmitted herewith is confidential and intended for the exclusive use of the individual or entity named above. If the reader of this message is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any examination, use, dissemination, distribution or copying of this communication or any part thereof is strictly prohibited. If you have received this communication in error, please immediately notify the sender by reply e-mail and destroy this communication. Thank you. -- Frank Swarbrick Applications Architect - Mainframe Applications Development FirstBank Data Corporation - Lakewood, CO USA P: 303-235-1403 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 2 Identical STC Running at the Same Time
If you specify DSN=DOES.NOT.EXIST the catalog will be queried to find the volser. If no catalog entry is found, JCL error. However, you specify DSN=DOES.NOT.EXIST,VOL=SER=VOLXXX and VOLXXX is online, it will work. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Ted MacNEIL Sent by: IBM Mainframe Discussion List 08/05/2009 12:01 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: 2 Identical STC Running at the Same Time >As long as the DD is never opened, the VTOC is never searched for the DSN. What is special about this? I've always received JCL errors when specifying DISP=OLD with a non-existant DSN. And, I started in this business as a JCL jockey (Production Support) in February 1981. Is it the VOL=REF? - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Information Center Query - CLARIFICATION
I was at a company many many moons ago that had it as part of the TSO logon procs, but I am not sure if anyone actually used it. I know that the systems programming group did not. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Edward Jaffe Sent by: IBM Mainframe Discussion List 07/31/2009 02:33 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Information Center Query - CLARIFICATION I did not mean to overload the ICF acronym. I was not referring to anything to do with coupling facility, catalogs, or Library Server replacements. I'm asking about the TSO/E Information Center on z/OS. The libraries start with ICQ. I have never used it. I have never seen anyone use it. I was wondering if anyone uses it. -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/VM support for FBA devices was Re: z/OS support of HMC's 3270 emulation?
That's right, I forgot about the hard drive but it had an 8" floppy for LIC updates, and I believe that the IML process used the floppy for part of it, because ISTR a POR failure due to a bad floppy. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Ivan Warren Sent by: IBM Mainframe Discussion List 07/30/2009 09:24 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: Z/VM support for FBA devices was Re: z/OS support of HMC's 3270 emulation? Wayne Driscoll wrote: > I think a lot of people might be asumming that MVS had FBA support in the > early to mid 80's because the 3090's used a 3375 device for storing the > LIC and other microcode updates, unlike the 308x's and 438x's that used 8 > inch floppies. > Oh.. and the 308x didn't use a 8" floppy ! it had a 40 or 80Mb hard file to store the LIC ! (at least the 3084 I used to work with had).. (and the darn thing took 45 minutes just to IML because it would re-apply all the fixes at run time !) --Ivan -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/VM support for FBA devices was Re: z/OS support of HMC's 3270 emulation?
I think a lot of people might be asumming that MVS had FBA support in the early to mid 80's because the 3090's used a 3375 device for storing the LIC and other microcode updates, unlike the 308x's and 438x's that used 8 inch floppies. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "W. Kevin Kelley" Sent by: IBM Mainframe Discussion List 07/30/2009 09:07 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: Z/VM support for FBA devices was Re: z/OS support of HMC's 3270 emulation? On Thu, 30 Jul 2009 20:02:03 -0500, Rick Fochtman wrote: >I seem to recall support for both 3370 and 3375 on MVS. I can't remember >exactly when. IIRC, one was a CKD device and the other was a FBA device. >Don't ask me which was which. > >Rick > Rick, I think we supported 3370 but not 3375 (which I think was the FBA device). Back in those days, every time a new DASD device came around we had to do device support in lots of different places because each device had different geometry. W. Kevin Kelley -- IBM POK Lab -- z/OS Core Technical development -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Of link lists and application programs
No, as stated earlier, the AC is ONLY checked when the JSTCB is initiated. If the program initiated via the job step task (ie the PGM= on the EXEC card of the JCL) is linked AC=1 AND all the libraries in the STEPLIB are APF authorized, then that job step task will be considered authorized. If any program running under this job step task then attaches, links or XCTL's to another program, the target program MUST be from an APF authorized library (actually the DCB used for the LOAD of the program must contain ALL APF authorized modules) or the task will abend with an S306. There are ways for authorized programs to reset from authorized to non-authorized (various programs, including the TSO TMP, IKJEFT01 and the CICS region control program DFHSIP?? do this) but once this is done, it is difficult to get back into an authorized state. There are some IBM services that can do this (the TSO parallel TMP supports this) but they are designed for a specific, limited scope, and do NOT set the JSCBAUTH back on. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Rick Fochtman Sent by: IBM Mainframe Discussion List 07/30/2009 07:12 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: Of link lists and application programs >From what I have read in documentation, it seems to me that even a >module linked AC=0 is still authorized if LINK/XCTLed from an authorized >library by a program that is AC=1 (or greater). So any program in a >Library that is APF authorized can potentially be running authorized, >not just the modules with AC=1 (or greater) > >Did I read or understand that documentation wrong? > > - I believe that you have mis-interpreted the doc. As I recall, if an AC=1 program calls a AC=0 program, then AC=0 is set for the entire task for its duration. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Linklist Scan (was: Re: Of link lists and application programs)
(With a modified subject) This can be done with the ISRDDN command that comes with ISPF. Simply enter ISRDDN, followed by LNKLIST, followed by MEM modname LINKLIST. This will bring up a warnaing panel that you may get security violations if you don't have READ access to All the LINKLIST datasets. Enter YES (or SKIP to avod warning in future) and press enter. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "Klein, Kenneth" Sent by: IBM Mainframe Discussion List 07/30/2009 11:31 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: Of link lists and application programs I'm looking for a way to scan the entire lnklst and find a particular load module. Ken Klein Sr. Systems Programmer Kentucky Farm Bureau Insurance - Louisville kenneth.kl...@kyfb.com 502-495-5000 x7011 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Of link lists and application programs
That is correct. A job step task is authorized (via the JSCBAUTH bit being set in the JSCB) during initiation by the operating system if (and only if) the following occur: 1 - All libraries in the TASKLIB or STEPLIB/JOBLIB concatenation are APF authorized. 2 - The program that is being initiated was link edited with AC=1. Once the job step task is authorized, it will remain authorized unless if it makes itself unauthorized. Because of this, ALL programs loaded by this job step task MUST come from an APF authorized library, regardless of the AC value when they are linked. However, any attempt to load a program from an unauthorized library will fail with system abend 306. The only time that I am certain that the system looks at the AC value from the linkage editor (bindor) is when initiating a Job Step TCB. All other usages of ATTACH and all usages of LINK, LOAD and XCTL don't look, don't care. However, I will STRONGLY advise that ONLY programs designed to be run as job step tasks (ie main programs) should be linked with AC=1 because if a module that is designed to run as a subprogram gets linked with AC=1 it could be possible that running this program as a job step task could compromise system integrity. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Chris Nelson Sent by: IBM Mainframe Discussion List 07/30/2009 09:45 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: Of link lists and application programs >From what I have read in documentation, it seems to me that even a module linked AC=0 is still authorized if LINK/XCTLed from an authorized library by a program that is AC=1 (or greater). So any program in a Library that is APF authorized can potentially be running authorized, not just the modules with AC=1 (or greater) Did I read or understand that documentation wrong? -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Frank Swarbrick Sent: Wednesday, July 29, 2009 6:25 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Of link lists and application programs If necessary, is there a way to inhibit unauthorized individuals from linking with AC=1, even when linking in to an authorized library? -- Frank Swarbrick Applications Architect - Mainframe Applications Development FirstBank Data Corporation Lakewood, CO USA P: 303-235-1403 F: 303-235-2075 On 7/29/2009 at 4:34 PM, in message <166284787-1248906882-cardhu_decombobulator_blackberry.rim.net-198947840 6...@bxe12 7.bisx.prod.on.blackberry>, Ted MacNEIL wrote: >> It sounds like we need to use LNKAUTH=APFTAB instead of the default >> of > LNKAUTH=LNKLST so that our APPL libraries will not be APF authorized > when accessed via the LNKLST concatentation (or via a STEPLIB/JOBLIB > for that matter). We certainly would not want this. > > There are two criteria for a programme to be APF'd. > 1. The library > 2. Link with AC=1 > > - > Too busy driving to stop for gas! > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html >>> The information contained in this electronic communication and any document attached hereto or transmitted herewith is confidential and intended for the exclusive use of the individual or entity named above. If the reader of this message is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any examination, use, dissemination, distribution or copying of this communication or any part thereof is strictly prohibited. If you have received this communication in error, please immediately notify the sender by reply e-mail and destroy this communication. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to end SubTask ???
No, The subtask has no need to know about the ECB. When the attacher specifies ECB=, the system will then POST that ECB as part of the standard task termination processing done by z/OS. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Joe Reichman Sent by: IBM Mainframe Discussion List 07/27/2009 07:22 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: How to end SubTask ??? does the subtask need to have access to the ECB since it is posted by MVS when the subtask does a BR R14 -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu]on Behalf Of Binyamin Dissen Sent: Monday, July 27, 2009 3:25 AM To: IBM-MAIN@bama.ua.edu Subject: Re: How to end SubTask ??? On Mon, 27 Jul 2009 01:57:32 -0500 Barbara Nitz wrote: :>>The child task should BR R14 when it completes its work. That :>>causes the ECB to be POSTed for the parent task to test/WAIT. :>>After that ECB is POSTed, the parent should DETACH the child. :>When a task goes through BR R14 (which actually calls cvtexit and translates :>to 0A03 - exit svc), that tcb is gone. I think that detach would get a little :>upset when instructed from the parent to detach a tcb (the child tcb) that :>has already gone through exit. IIRC, the posting of the parent gets done by :>RTM when the daughter tcb was attached that way. The TCB is only gone if the task was ATTACHed without ECB and ETXR. If either was specified an explicit DETACH is required. -- Binyamin Dissen http://www.dissensoftware.com Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Command program from the cbt
Ken, Because the IDFIND routine is invoked via a CALL macro which generates a V(CON) for IDFIND, that routine must be linkedited into the load module. If the module source isn't in the same program, I would look in the LKED JCL for the list of objects pulled in, and find the source. My guess is that rather than going through the "trouble" of having additional ID's allowed to access the RACF profile, a second check, probably of a table of USERID's was added. This is a dangerous and risky practice, because security rightly belongs in the security group, having application defined security is a way to find you have little to no security. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "Klein, Kenneth" Sent by: IBM Mainframe Discussion List 07/02/2009 09:36 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: Command program from the cbt thanks to all who are offering up the good clues!! The source here may have been modified by a previous systems guy. This part of the code is where I'm getting booted I think. I know I'm getting the cmd107i message and then the message from the NOTAUTH routine. What is this IDFIND routine?? FINDUSER DS0H -RPMAC WTO 'CMD107I SAFRC04: USING SECONDARY CHECK',ROUTCDE=(2,11) CALL IDFIND SEE IF THE CURRENT USER IS -RPMAC LTR R15,R15 ALTERNATIVELY AUTHORIZED. -RPMAC BZEXTRACT ZERO RETURN IS A-OK -RPMAC B NOTAUTH 913 AND OUT-RPMAC * Ken Klein Sr. Systems Programmer Kentucky Farm Bureau Insurance - Louisville kenneth.kl...@kyfb.com 502-495-5000 x7011 -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mark Zelden Sent: Thursday, July 02, 2009 10:30 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Command program from the cbt On Thu, 2 Jul 2009 10:15:28 -0400, Klein, Kenneth wrote: > No, that's why the RACF guy tells me it's not his problem. No RACF >messages. Just the cmd913e error message from the command program. I >can see in the code that he does a rackroute and the BH command sends >control straight to the error message and abends. > Your RACF guy is wrong, it's a RACF issue.I use COMMAND in my sandbox LPARs for startup and shutdown and have the source. It checks the RACF FACILITY class for a profile called COMMAND to see if you have access.I don't have anything defined, so it works without it. But your system must have a COMMAND profile defined in the FACILITY class and you are not authorized. Here is a snippet of source: *** * * * CHECK THE AUTHORITY OF THE USER TO SAF CLASS "FACILITY' FOR* * ENTITY "COMMAND". NOTE THAT FASTAUTH IS USED. TO AVOID THE * * SITUATION WHERE SPECIAL ATTRIBUTES OF THE USER MAY ALLOW THE * * ACCESS WITH LOGGING, A CHECK IS MADE FOR A NON-ZERO REASON * * CODE. THIS CONDITION WILL BE CONSIDERED A FAILURE.* * * *** AUTHTST RACROUTE REQUEST=FASTAUTH,WORKA=RACWORK,WKAREA=FRACWORK, X ENTITY=RESOURCE,CLASS=FACILITY,ATTR=READ, X MF=(E,RACROUTE) CHR15,=H'4' TEST THE RETURN CODE BEEXTRACT NO DECISION POSSIBLE, OK BHNOTAUTH GREATER THAN 4, NOT AUTHORIZED CLC RACROUTE+4(4),=F'0' TEST THE REASON CODE BEEXTRACT ZERO, AUTHORIZED NOTAUTH WTO 'CMD913E UNAUTHORIZED USE OF THE COMMAND PROGRAM - JOB AX BORTED',ROUTCDE=(2,11) ABEND X'913',,,SYSTEM,REASON=0 ABEND THE JOB -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive a
Re: How to convince not to over initiate?
Could you switch to WLM managed initiators and let the system decide how many jobs to run at once? Do it for a week or so and compare SMF data? === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "McKown, John" Sent by: IBM Mainframe Discussion List 07/01/2009 08:36 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject How to convince not to over initiate? We are constantly doing this. Especially during month end. Our Production people simply fire up a large number of production initiators and dump a large number of jobs into the system. Does anybody have any __HARD__ studies which show that running the machine a 100% with a lot of jobs basically "swapped out" due to lack of CPU can actually cause a __INCREASE__ in total MSUs used for those jobs versus running fewer at a time? Management here is very much into "reduce MSUs to reduce cost". So, if I can show that running fewer jobs concurrently would reduce cost, then I might have a prayer of getting this changed. Or am I wrong and it doesn't really matter? John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IBM Software Secure Support via USA Citizens
In the days when paper dumps where still common, I remember getting a dump from a customer that looked liked a box of Swiss cheese. Before sending us the dump, they went through it page by page and would cut out sections that contained data they felt was sensitive. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Edward Jaffe Sent by: IBM Mainframe Discussion List 06/26/2009 10:43 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: IBM Software Secure Support via USA Citizens Ed Gould wrote: > I had a job interview about 20 years ago at a place in California that handled top secret (and above data) all the time. I asked how they contacted IBM for support and how they handled dumps problems etc...The answer I got back was that they didn't contact IBM and you were expected to figure out the issue. I was at that time of the interview pretty sure I was not interested in it so I asked but without source how can you expect to figure out where the problem was and even if you could how could you fix it without telling IBM how to fix it. The answer was surprising even to me. They said you don't. > I shook my head and walked out and drove back to the airport and took the plane back and was so disgusted with myself for wasting my time on an interview that if I had been given an outline of all the restrictions that would be put on the job I would not have wasted my time. > I have received dumps from top secret government organizations (both domestic and foreign) that have been programmatically redacted. The dumps were pre-formatted by the customer (the output of various IPCS commands against the original dump file). All names of things (userid, system, sysplex, NJE node, JES member, etc.) in the dump were replaced with the characters in both hex and EBCDIC portions of each line. Amazingly, I have been able to solve problems using such dumps! -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: OS/390
While it may be able to run under z/VM using a kludge that to my knowledge, has never been tested, search the archives for a posting by Jim Mulder 2 or three years back. The issue has to do with the introduction of the multi-level TLB's in the current machines. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Brian Westerman Sent by: IBM Mainframe Discussion List 06/26/2009 04:21 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: OS/390 I think you might be able to run it under z/VM, you certainly can run it under Hercules. If you get a fast enough PC, you can probably beat the MIPS of what your running it on now;) What is the purpose of the question? Is it just a "gee, I wonder", or is there a real need to give it a go? I have done a lot of (well over 100) conversions from even as far back as MVS/SP and MVS/XA to z/OS in the past few years and it's not impossible to convert quickly, but there are a lot of better ways to handle the conversion to a newer operating system level than to just dump the old version on a new processor type and hope to be able to convert that way.:) I was going to give a Share presentation on just this type of thing, but the revenue to send me this time just wasn't available. :( Brian -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Storage
Linking with AC=1 only means that this program will run APF authorized when run as jobstep program with all libraries in the STEPLIB (or JOBLIB) concatenation are defined in the APF list. However, exits are not run as jobstep programs, so as such inherit APF authorization from the jobstep TCB they are running under. Apparently this particular exit does NOT run APF authorized, so the ABEND047 is perfectly valid. I know nothing about MQ so I don't know if there is a way to get this exit invoked with APF authorization or not, but clearly in your case it does not. I believe that there are lists that specialize in MQ and this query might be better answered on one of them. What you should probably do is issue a TESTAUTH macro to see if you are authorized, and if not (as in this case) don't issue the MODESET and don't attempt to allocate storage from an authorized subpool. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "Ward, Mike S" Sent by: IBM Mainframe Discussion List 06/19/2009 03:52 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Storage Hello all, I tried to issue these command from my MCA security exit, but received this error: DUMP TITLE=SEDQ,ABN= 047-,C=L8200.600.CHIN,M=CSQXDISP,P SW=478D040098F90F76 +CSQX111E SEDQ CSQXDISP User channel exit error, TCB=008C02B0 888 reason=047000- I checked the APF table and my loadlib is in there: +Z7SMS2 SSF1.MQEXIT.LOADLIB And the dataset is on the volume: SSF1.MQEXIT.LOADLIB ,, Z7SMS2 My program is linkedited with the AC=1 attribute 11 //LKED EXEC PGM=IEWL,COND=(0,NE), // PARM='RENT,NCAL,LIST,AMODE=31,RMODE=ANY,AC=1' And the code that got it was: MODESET KEY=ZERO,MODE=SUP STORAGE OBTAIN,LENGTH=WORKLEN,LOC=(RES,ANY),ADDR=(1),SP=132 Why do I get the 047 abend? == This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to which they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: dynamic allocation
One thing to consider is that an INCLUDED JCL member can contain INCLUDE statements, so you if the concern is that the testers want to concatenate libraries ahead of the productions, you could do the following: // SET LVL=PROD // INCLUDE JLSTART // INCLUDE &LVL.JOBL In member JLSTART you would have //JOBLIB DD DISP=SHR,DSN=SYS1.EMPTY.LOADLIB You could then have a PRODJOBL member with the "standard" files. Developers could then create members with their initials, ie WDJOBL that contain their test libraries, and a last line of // INCLUDE PRODJOBL So all that would need to change is the SET statement. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Frank Swarbrick Sent by: IBM Mainframe Discussion List 06/10/2009 07:39 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: dynamic allocation >>> On 6/10/2009 at 6:26 PM, in message , Paul Gilmartin wrote: > On Wed, 10 Jun 2009 18:06:01 -0600, Frank Swarbrick wrote: >>> too!". >>>> >>> No caching ==> poor performance. Frequent refresh ==> poor performance. >> >>This is why I would suggest perhaps something similar to LINKLIST in that it > is searched by default, but also like JOBLIB in that there is no caching. >> > No caching ==> poor performance. But we're already having this "issue" by not having application libraries in the LINKLST, yes? How would this make things any worse? >>> Would the JCL INCLUDE facility help you here? >>Yes and no. >> >>Yes, I could have a member that has a JOBLIB concatention with all of the > production libraries I would need for production applications jobs. >> >>But no, this would not help for testing, because any JOBLIB I specified in my > test JCL in order to add a test library (ahead of production libraries) would > have to be "built from scratch" in order to place it at the beginning. >> > For testing, INCLUDE a different JOBLIB member. This in turn (I believe) > could be selected by a JCL symbolic variable which could also be used as > a qualifier in data set names to differentiate your test data from > production data. Perhaps. But each programmer would have to have their own "JOBLIB" member and they would have to all be updated with any libraries added to the production JOBLIB member. (Granted we probably would not update them often so that would probably not be to onerous). Nonetheless I will take it under consideration. Thanks for the idea. Frank -- Frank Swarbrick Applications Architect - Mainframe Applications Development FirstBank Data Corporation Lakewood, CO USA P: 303-235-1403 F: 303-235-2075 The information contained in this electronic communication and any document attached hereto or transmitted herewith is confidential and intended for the exclusive use of the individual or entity named above. If the reader of this message is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any examination, use, dissemination, distribution or copying of this communication or any part thereof is strictly prohibited. If you have received this communication in error, please immediately notify the sender by reply e-mail and destroy this communication. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What is System Completion Code FD6?
Look in MVS System Codes under Fnn. It usually indicates an invalid SVC instruction (X'D6' = 214 dec). Probably there is no SVC table entry that corresponds to USER SVC 214. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "Johnson Jr., Donald E" Sent by: IBM Mainframe Discussion List 06/08/2009 11:10 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject What is System Completion Code FD6? I have tried Google and Quick-Ref, and come up empty here. How can I track down what this means and how to fix it? Thanks! Don Johnson CA Sr. Support Engineer Emaildonald.john...@ca.com This e-mail and any files transmitted with it are for the sole use of the intended recipient(s) and contain information that may be privileged and confidential. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient of this e-mail, please delete this e-mail and any files transmitted with it and notify the sender immediately. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS STORAGE service
Look up the STORAGE macro in the Assembler Services Reference, It provides services similar to GETMAIN/FREEMAIN, but via a PC routine as opposed to an SVC. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "Ward, Mike S" Sent by: IBM Mainframe Discussion List 05/27/2009 02:09 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject z/OS STORAGE service Hello all, I'm working on a user exit and the MQ intercommunication book has the following: Exits must free any storage obtained, or ensure that it will be freed by a subsequent exit invocation. For storage that is to persist between invocations, use the z/OS STORAGE service; there is no suitable service in C. I would like to use the persistent storage between invocations, but I can't seem to find anything on the "z/OS STORAGE service". Is this the standard GETMAIN/FREEMAIN? Or am I missing something? == This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to which they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: AMODE Switching
Directed load involves using the ADDR= parameter on the LOAD macro, which is limited to Authorized users (APF, running in supervisor state, or in a system key), so this may not be an option for the application involved. === Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Rick Fochtman Sent by: IBM Mainframe Discussion List 05/19/2009 09:37 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: AMODE Switching - Surely, if the table has internal pointers (adcons), these will still point above the line and thus be unusable in AMODE 24? - I've never tried it, but maybe a "Directed LOAD" would do the trick. 1. BLDL and get the module size. 2. STORAGE for an area of sufficient size below the line. 3. LOAD using the A= operand to direct the load into your area. This should relocate all your AD-CONs and leave everything just the way you want it. But, as I said, I've never tried this. Do some reading... :-) -- Rick -- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: common area [E]CSA question / idea / idiocy
John, One problem with this type of dataspace is that there isn't a standard method to "own" pieces of dataspace storage. Dataspaces don't have FQE's, DQE's and FBQE's, or the control blocks that manage 64 bit memory objects, so how do you advertise that this piece of the dataspace contains your data? Another problem is that dataspaces are 31 bit addressable, so this would "only" provide 2GiB of relief. ======= Wayne Driscoll OMEGAMON DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "McKown, John" Sent by: IBM Mainframe Discussion List 05/19/2009 01:43 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject common area [E]CSA question / idea / idiocy I'm reading the paper about IBM's plans for the 64-bit common (HVCOMMON?). And I'm really beginning to wonder about something. What this will do is create another block of storage which is mapped into every address space. I am curious why IBM has not considered using AR mode and a SCOPE=GLOBAL dataspace set up and IPL time, anchored to *MASTER* for some of these data areas. At present, from my reading, there are three ALETs with special values. ALET==0 is for the Primary address space. ALET==1 is for the Secondary address space. And ALET==2 is for the Home address space. How about ALET==3 being for a "common GLOBAL data space"? Is there some reason for products such as DB2, IMS, CICS, MQ, ..., requiring that the "common" area be addressable in "primary" mode at all times? Mainly curious. Is AR mode that much more difficult / restrictive than AMODE(64)? John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CP commands from z/os
Look at CPCMD in file 66 of the CBT Tape, http://www.cbttape.org. === Wayne Driscoll Omegamon DB2 L3 Support/Development wdrisco(AT)us.ibm.com === Paul Schuster Sent by: IBM Mainframe Discussion List 04/24/2009 02:33 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject CP commands from z/os From, for example, a batch job running on a z/os system which in turn is a VM guest, can this batch job issue CP commands? I was looking at DIAG 8 but it sort of implies that this works for the VM id which is the VM guest itself, not a third level address space. Is what I am asking possible to do? Thank you. Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IBM Share Austin March 2 2009 conference feedback
Well in regards to: h) Ed Jaffe You looked too young for your postings on IBM-MAIN. I was looking for an older person , that are about to retire. I have very good information that tells me that Ed Jaffe is really 65 years old, he just has been blessed by the healthy Southern California lifestyle to look like he is in his 40's. (Hey it's over halfway to Friday) ======= Wayne Driscoll Omegamon DB2 L3 Support/Development wdrisco(AT)us.ibm.com === -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMF70PMU question
If it said "Number of blocked units being promoted during the interval." You would have a point, but since it states "dispatchable units" it removes the ambiguity. === Wayne Driscoll Omegamon DB2 L3 Support/Development wdrisco(AT)us.ibm.com === "Horne, Jim - James S" Sent by: IBM Mainframe Discussion List 03/31/2009 02:18 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@bama.ua.edu cc Subject Re: SMF70PMU question "unit" is very ambiguous, especially considering how many different ways RMF uses it. Jim Horne Systems Programmer Large Systems Engineering & Messaging IS7-5 Lowe's Companies, Inc. 401 Elkin Highway North Wilkesboro, NC 28659 336-658-4959 jim.ho...@lowes.com -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Horst Sinram Sent: Tuesday, March 31, 2009 3:10 PM To: IBM-MAIN@bama.ua.edu Subject: Re: SMF70PMU question On Tue, 31 Mar 2009 14:48:52 -0400, Horne, Jim - James S wrote: >To make sure I understand what you are saying, it would be fair to say that the number is the number of elements promoted during the interval, right? Why does the SMF manual have to go out of its way to be confusing? (Don't bother answering that; it's a rhetorical questions.) The SMF books says "Number of blocked dispatchable units being promoted during the interval." What is confusing in that description? -- Horst Sinram IBM System z Capacity Management & Workload Management -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE: All information in and attached to the e-mail(s) below may be proprietary, confidential, privileged and otherwise protected from improper or erroneous disclosure. If you are not the sender's intended recipient, you are not authorized to intercept, read, print, retain, copy, forward, or disseminate this message. If you have erroneously received this communication, please notify the sender immediately by phone (704-758-1000) or by e-mail and destroy all copies of this message (electronic, paper, or otherwise). Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html