Re: SMF Records

2017-05-16 Thread Vernooij, Kees (ITOPT1) - KLM


> -Original Message-
> From: Vernooij, Kees (ITOPT1) - KLM
> Sent: 17 May, 2017 8:41
> To: 'IBM Mainframe Discussion List' 
> Subject: RE: SMF Records
> 
> 
> 
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On
> > Behalf Of Jesse 1 Robinson
> > Sent: 17 May, 2017 0:18
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: SMF Records
> >
> > Keep in mind that SMF records are cut by applications or components
> that
> > choose to do so. It's not automatic. SMF is a record manager, not a
> > creator. In particular, SFTP is an add-on product that is not related
> to
> > FTP(S) or TCP/IP. It may or may not create SMF records. If it does,
> it's
> > almost certainly the same records type for every transmission.
> >
> > .
> > .
> 
> And in addition to that: look at the SMF manual: SMF 15 is written
> whenever a dataset is CLOSED after being opened for OUTPUT, period.
> Every time a dataset is Closed for output, SMF15 is written, whether it
> was the same dataset or not, the same user or not etc, just the CLOSE
> cuts the record. This allows you to monitor via SMF who opened a dataset
> during some perion, e.g. to determine the one that might have corrupted
> it.
> 
> Kees.

Additional to that: in SMFPRMxx you can specify which records SMF will write 
and which it will not write when the application cuts them and gives them to 
SMF tob e written.

Kees.

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Vernooij, Kees (ITOPT1) - KLM


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Jesse 1 Robinson
> Sent: 17 May, 2017 0:18
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: SMF Records
> 
> Keep in mind that SMF records are cut by applications or components that
> choose to do so. It's not automatic. SMF is a record manager, not a
> creator. In particular, SFTP is an add-on product that is not related to
> FTP(S) or TCP/IP. It may or may not create SMF records. If it does, it's
> almost certainly the same records type for every transmission.
> 
> .
> .

And in addition to that: look at the SMF manual: SMF 15 is written whenever a 
dataset is CLOSED after being opened for OUTPUT, period. 
Every time a dataset is Closed for output, SMF15 is written, whether it was the 
same dataset or not, the same user or not etc, just the CLOSE cuts the record. 
This allows you to monitor via SMF who opened a dataset during some perion, 
e.g. to determine the one that might have corrupted it.

Kees.

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: setrog lnklst question

2017-05-16 Thread Lizette Koehler
UPDATE JOB(*) is dangerous.  And was discussed in the IBM MAIN Archives, a 
couple of years ago I think.

However, we use it with no ill effect.



UPDATE
Indicates that the system is to update an address space so that a specified 
job or jobs associated with that space can use the current LNKLST set. If the 
job is using another LNKLST set when the current LNKLST set is activated, it 
will continue to use the original LNKLST set until it completes operations. 
When the job completes and restarts, it then uses the data sets defined in the 
new currently active LNKLST set. See "Removing or Compressing a Data Set in an 
Active LNKLST Set" in z/OS MVS Initialization and Tuning Reference for 
information about LLA management of the LNKLST data set.

Be careful when you use UPDATE. Updating an address space while a program 
in that address space is fetching a module can cause the fetch to fail or to 
locate an incorrect copy of the module. The system does not attempt to verify 
the validity of the data for UPDATE.
Start of changeJOBNAME | JOB=jobnameEnd of change
Specifies the name of the job or jobs to update. You can use wildcard 
characters (? or *) for jobname. UPDATE updates any job whose name matches the 
specified criteria. The system compares jobname to the name of any initiated 
job or jobs that match, or to the name of the address space.



Dangle your foot in the fire.  If it does not burn you are okay, If it does, 
take it out


Lizette


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Gibney, Dave
> Sent: Tuesday, May 16, 2017 4:10 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: setrog lnklst question
> 
> And the LNKLST UPDATE JOB(*) is documented as potentially dangerous.
> 
> On the other hand, so far, I haven't have need to modify my linklst and
> effect all running address spaces. It's usually limited to  a smaller subset.
> 
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> > On Behalf Of Lizette Koehler
> > Sent: Tuesday, May 16, 2017 3:25 PM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: setrog lnklst question
> >
> > So an EXAMPLE would be
> >
> >/**/
> >/* Adding a dataset to the LINKLIST when it   */
> >/* does not already exist */
> >/**/
> >LNKLST DEFINE NAME(NEWLNKA) COPYFROM(CURRENT)
> >LNKLST ADDNAME(NEWLNKA) DSNAME(SYS1.NEWDSN.INLNK.LIST),
> >AFTER(SYS1.LOCTION.INLNK.LIST)
> >LNKLST DELETE   NAME(NEWLNKA) DSNAME(SYS1.DELETE.THIS.LNKLST.DSN)
> >LNKLST ACTIVATE NAME(NEWLNKA)
> >LNKLST UPDATE JOB(*)
> >APF ADD DSNAME(SYS1.NEWDSN.INLNK.LIST) VOLUME(&SYSR3)
> >
> >
> > APF ADD is not needed if the file being added is already APF Authorized.
> > DELETE is not needed if you are not removing anything from the Linklst.
> >
> >
> > Lizette
> >
> > -Original Message-
> > >From: Lizette Koehler 
> > >Sent: May 16, 2017 3:19 PM
> > >To: IBM-MAIN@LISTSERV.UA.EDU
> > >Subject: Re: setrog lnklst question
> > >
> > >You can create a parmlib member to
> > >
> > >COPY the current linklst to a new name Activate the new linklist name
> > >
> > >If you need further assistance let us know.
> > >
> > >Lizette
> > >
> > >-Original Message-
> > >>From: william janulin <008d52e04f2e-dmarc-
> > requ...@listserv.ua.edu>
> > >>Sent: May 16, 2017 1:52 PM
> > >>To: IBM-MAIN@LISTSERV.UA.EDU
> > >>Subject: setrog lnklst question
> > >>
> > >>To list;
> > >> Is it possible to add a dataset to the active lnklst? I tried a
> > >>setprog lnklst
> > add command and got a messagethat the lnklst was active.
> > >>
> > >>Thank you in advance, Bill J.
> > >>
> > >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions, send
> > email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Edward Gould
>> What I am asking is if the SAME file is transmitted with the SAME file name 
>> again, is the SAME SMF Record Type cut or is a different SMF Record Type cut?
> Normally when the same SMF events occur the same SMF record types will be cut.
> 
> However, there can be some differences in exactly which records are cut if 
> the second transfer is not exactly the same.
> 
> For example, if the first transfer creates the dataset and the second just 
> replaces the content, you should see SMF records related to creating catalog 
> entries etc. on the first transfer but not on the second.

Maybe I am not understanding your question. Lets try and clear it up.
Dataset creation yes
Dataset write yes
Dataset read yes
The above is for 99.9 of all datasets. There are some exclusions the exclusion 
are system type datasets DSCB etc…But for all intents reasonable any 
batch/stc/tso are created SMF records are written.
If we take your example, TCP creates a file - Yes SMF record(s) are written.
If TCP reads the files - yes smh record is written.
IF TCP overwrites a file SMF record is written.
If TCP deletes a file SMF record(s) are written.

The only unknown here is if its a unix file, I am sure that they are written 
but what types are is to me unknown but S/B easily findable
The other *IF* is which type of records are cut. Types 14/15 are read write   
for non unix files there are records for unix files but I haven’t tried to go 
after them.
As one responder says try DAF on the CBTTape it is a good program and its free. 
You only have to have a basic knowledge of MVS to read the report(s).

Ed
> 
> -- 
> Andrew Rowley
> Black Hill Software
> +61 413 302 386
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Andrew Rowley

On 17/05/2017 8:11 AM, Sasso, Leonard wrote:

What I am asking is if the SAME file is transmitted with the SAME file name 
again, is the SAME SMF Record Type cut or is a different SMF Record Type cut?
Normally when the same SMF events occur the same SMF record types will 
be cut.


However, there can be some differences in exactly which records are cut 
if the second transfer is not exactly the same.


For example, if the first transfer creates the dataset and the second 
just replaces the content, you should see SMF records related to 
creating catalog entries etc. on the first transfer but not on the second.


--
Andrew Rowley
Black Hill Software
+61 413 302 386

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Paul Gilmartin
On Tue, 16 May 2017 18:36:38 -0500, Mike Schwab wrote:

>Maybe IBM can publish the info or an II apar to document the
>application coding techniques causing the problem.
>
If move-with-truncation is a conventional COBOL operation,
the resolution should not be, "Don't do that!"

I detest quiet truncation.  It's hardly better if it takes an
inordinately long time.

Another possible resolution, with its own performance consequence,
is for the compiler-generated code to test (every time) whether
overflow is about to occur and handle it as a special case.  It
might be better just to abandon the use of DFP.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Mike Schwab
Maybe IBM can publish the info or an II apar to document the
application coding techniques causing the problem.

On Tue, May 16, 2017 at 3:22 PM, Peter Hunkeler  wrote:
>
>>It sounds like it's time to open a PMR.  Do you want to do that and can you 
>>do that?
>
>
> I'm not allowed to open a PMR by myself but asking my colleagues to open one 
> is not a problem. It is only that I don't see what to report as an error in 
> this case. From the long lasting investigation starting November 2016 to find 
> a problem with Smart/Restart that started to pop up more often for exactly 
> the same reason, I understand that the decimal overflow mask bit in the PSW 
> and Language Environment's duty to support the different expectations of 
> COBOL on one side and C and PL/I on the other side work as documented.
>
>
>
> We had a PMR open with LE during the analysis of the Smart/Restart problem, 
> and IBM LE did not seem to see a problem in the current behaviour.
>
>
> What would you recommend we should report in the PMR? Maybe we continue to 
> discuss offline, and report back here when there is interesting news?
>
>
> Regards, Peter
>
>
> --
> Peter Hunkeler
>
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: setrog lnklst question

2017-05-16 Thread Gibney, Dave
And the LNKLST UPDATE JOB(*) is documented as potentially dangerous.

On the other hand, so far, I haven't have need to modify my linklst and effect 
all running address spaces. It's usually limited to  a smaller subset.

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Lizette Koehler
> Sent: Tuesday, May 16, 2017 3:25 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: setrog lnklst question
> 
> So an EXAMPLE would be
> 
>/**/
>/* Adding a dataset to the LINKLIST when it   */
>/* does not already exist */
>/**/
>LNKLST DEFINE NAME(NEWLNKA) COPYFROM(CURRENT)
>LNKLST ADDNAME(NEWLNKA) DSNAME(SYS1.NEWDSN.INLNK.LIST),
>AFTER(SYS1.LOCTION.INLNK.LIST)
>LNKLST DELETE   NAME(NEWLNKA) DSNAME(SYS1.DELETE.THIS.LNKLST.DSN)
>LNKLST ACTIVATE NAME(NEWLNKA)
>LNKLST UPDATE JOB(*)
>APF ADD DSNAME(SYS1.NEWDSN.INLNK.LIST) VOLUME(&SYSR3)
> 
> 
> APF ADD is not needed if the file being added is already APF Authorized.
> DELETE is not needed if you are not removing anything from the Linklst.
> 
> 
> Lizette
> 
> -Original Message-
> >From: Lizette Koehler 
> >Sent: May 16, 2017 3:19 PM
> >To: IBM-MAIN@LISTSERV.UA.EDU
> >Subject: Re: setrog lnklst question
> >
> >You can create a parmlib member to
> >
> >COPY the current linklst to a new name
> >Activate the new linklist name
> >
> >If you need further assistance let us know.
> >
> >Lizette
> >
> >-Original Message-
> >>From: william janulin <008d52e04f2e-dmarc-
> requ...@listserv.ua.edu>
> >>Sent: May 16, 2017 1:52 PM
> >>To: IBM-MAIN@LISTSERV.UA.EDU
> >>Subject: setrog lnklst question
> >>
> >>To list;
> >> Is it possible to add a dataset to the active lnklst? I tried a setprog 
> >>lnklst
> add command and got a messagethat the lnklst was active.
> >>
> >>Thank you in advance, Bill J.
> >>
> >
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Nims,Alva John (Al)
You might want to consider that the OpenSSH SMF records are part of the Type 
119 record and use subtype 94, 95, 96, 97, and 98
Subtype 96 is the "Server" transfer complete record and 97 is the "Client" 
equivalent. These records would give you who, what and where someone accessed a 
file, including the SFTP command executed against the file.

I gathered the above information from: "z/OS IBM Ported Tools for z/OS: OpenSSH 
User's Guide Version 1 Release 3" (SA23-2246-03), the details for the subtypes 
94 through 98 are in this manual and not in the "z/OS Communications Server: IP 
Programmer's Guide and Reference" which will have the other SMF 119 record 
subtype descriptions.

Al Nims
Systems Admin/Programmer 3
UFIT
University of Florida
(352) 273-1298

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Edward Finnell
Sent: Tuesday, May 16, 2017 6:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SMF Records

I think DAF off CBT will answer all the questions.
 
 
In a message dated 5/16/2017 5:16:17 P.M. Central Daylight Time, 
stars...@mindspring.com writes:

Basically SMF always writes a record, it does not check if that  file name was 
done that way or  not.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Edward Finnell
I think DAF off CBT will answer all the questions.
 
 
In a message dated 5/16/2017 5:16:17 P.M. Central Daylight Time,  
stars...@mindspring.com writes:

Basically SMF always writes a record, it does not check if that  file name 
was done that way or  not.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Lizette Koehler
To add to that.  The records are cut each time.  There is no filtering to see 
if that event has already been done.  Everytime the FTP(S) or TCP/IP does 
something that can create an SMF record type, it is created.

Can you provide more detail as to the reason the question is being asked?  Are 
you missing SMF Data?  Or not getting SMF Data?


Lizette


-Original Message-
>From: Jesse 1 Robinson 
>Sent: May 16, 2017 3:18 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: SMF Records
>
>Keep in mind that SMF records are cut by applications or components that 
>choose to do so. It's not automatic. SMF is a record manager, not a creator. 
>In particular, SFTP is an add-on product that is not related to FTP(S) or 
>TCP/IP. It may or may not create SMF records. If it does, it's almost 
>certainly the same records type for every transmission. 
>
>.
>.
>J.O.Skip Robinson
>Southern California Edison Company
>Electric Dragon Team Paddler 
>SHARE MVS Program Co-Manager
>323-715-0595 Mobile
>626-543-6132 Office ⇐=== NEW
>robin...@sce.com
>
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Sasso, Leonard
>Sent: Tuesday, May 16, 2017 3:12 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: (External):Re: SMF Records
>
>What I am asking is if the SAME file is transmitted with the SAME file name 
>again, is the SAME SMF Record Type cut or is a different SMF Record Type cut? 
>
>Thank You,
>
>Len Sasso
>System Administrator
>
>
>RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
>t: +1.518.257.4209 | m: +1.518.894.0879
>len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn 
>CSRA Think Next. Now. 
>
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Steve Beaver
>Sent: Tuesday, May 16, 2017 6:02 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: SMF Records
>
>The SMF process is a sequential process and each records has a time and data 
>stamp.  SMF records DO NOT overwrite previous smf records  
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Sasso, Leonard
>Sent: Tuesday, May 16, 2017 4:47 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: SMF Records
>
>A customer transmits, via SFTP, a sequential file, from an external site to an 
>IBM Mainframe. An hour later, they transmit the same file with the SAME file 
>name, overwriting the original file.
>
>1. What SMF Record Type was cut when the first file was transmitted?
>
>2. Is another SMF Record cut for the overwrite and is it the SAME SMF Record 
>Type as the original? If not, what SMF Record Type is cut?
>
>
>
>Thank You,
>
>Len Sasso
>System Administrator
>RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
>t: +1.518.257.4209 | m: +1.518.894.0879
>len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn 
>CSRA Think Next. Now.
>
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Charles Mills
By file do you mean dataset or UNIX file? For a dataset:

1. Potentially an SMF Type 15. Type 15 would have to be enabled in SMFPRMxx.
Potentially an SMF Type 80 (assuming RACF) if the dataset is audited.

2. Yes. Details would be different but it would still be an SMF Type 15.
Potentially an SMF Type 80.

For a UNIX file:

1. Potentially an SMF 92. Type 92 would have to be enabled in SMFPRMxx. I
don't recall if RACF can audit USS file access.

2. Yes. Details would be different but it would still be an SMF Type 92.

The above answers are for the access to the file or dataset. I am assuming
you are referring to the receiving end. If the sending end is MVS, then same
answers except SMF 15 becomes SMF 14.

Other SMF records might also be cut: Job or TSO session start and end. Some
SFTP implementations cut their own SMF records. Perhaps others.

I know of no distinction in any SMF records for "the first time you do
something" versus "re-doing it a little later." SMF records tend to stand on
their own. SMF record cutting is essentially stateless.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Sasso, Leonard
Sent: Tuesday, May 16, 2017 2:47 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMF Records

A customer transmits, via SFTP, a sequential file, from an external site to
an IBM Mainframe. An hour later, they transmit the same file with the SAME
file name, overwriting the original file.

1. What SMF Record Type was cut when the first file was transmitted?

2. Is another SMF Record cut for the overwrite and is it the SAME SMF Record
Type as the original? If not, what SMF Record Type is cut?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: setrog lnklst question

2017-05-16 Thread Lizette Koehler
So an EXAMPLE would be

   /**/
   /* Adding a dataset to the LINKLIST when it   */
   /* does not already exist */
   /**/
   LNKLST DEFINE NAME(NEWLNKA) COPYFROM(CURRENT)
   LNKLST ADDNAME(NEWLNKA) DSNAME(SYS1.NEWDSN.INLNK.LIST),
   AFTER(SYS1.LOCTION.INLNK.LIST)
   LNKLST DELETE   NAME(NEWLNKA) DSNAME(SYS1.DELETE.THIS.LNKLST.DSN)
   LNKLST ACTIVATE NAME(NEWLNKA)
   LNKLST UPDATE JOB(*)
   APF ADD DSNAME(SYS1.NEWDSN.INLNK.LIST) VOLUME(&SYSR3)


APF ADD is not needed if the file being added is already APF Authorized.  
DELETE is not needed if you are not removing anything from the Linklst.


Lizette

-Original Message-
>From: Lizette Koehler 
>Sent: May 16, 2017 3:19 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: setrog lnklst question
>
>You can create a parmlib member to 
>
>COPY the current linklst to a new name
>Activate the new linklist name
>
>If you need further assistance let us know.
>
>Lizette
>
>-Original Message-
>>From: william janulin <008d52e04f2e-dmarc-requ...@listserv.ua.edu>
>>Sent: May 16, 2017 1:52 PM
>>To: IBM-MAIN@LISTSERV.UA.EDU
>>Subject: setrog lnklst question
>>
>>To list;
>> Is it possible to add a dataset to the active lnklst? I tried a setprog 
>>lnklst add command and got a messagethat the lnklst was active. 
>>
>>Thank you in advance, Bill J.
>>
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Jesse 1 Robinson
Keep in mind that SMF records are cut by applications or components that choose 
to do so. It's not automatic. SMF is a record manager, not a creator. In 
particular, SFTP is an add-on product that is not related to FTP(S) or TCP/IP. 
It may or may not create SMF records. If it does, it's almost certainly the 
same records type for every transmission. 

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Sasso, Leonard
Sent: Tuesday, May 16, 2017 3:12 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: SMF Records

What I am asking is if the SAME file is transmitted with the SAME file name 
again, is the SAME SMF Record Type cut or is a different SMF Record Type cut? 

Thank You,

Len Sasso
System Administrator


RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
t: +1.518.257.4209 | m: +1.518.894.0879
len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn 
CSRA Think Next. Now. 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Steve Beaver
Sent: Tuesday, May 16, 2017 6:02 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SMF Records

The SMF process is a sequential process and each records has a time and data 
stamp.  SMF records DO NOT overwrite previous smf records  

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Sasso, Leonard
Sent: Tuesday, May 16, 2017 4:47 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMF Records

A customer transmits, via SFTP, a sequential file, from an external site to an 
IBM Mainframe. An hour later, they transmit the same file with the SAME file 
name, overwriting the original file.

1. What SMF Record Type was cut when the first file was transmitted?

2. Is another SMF Record cut for the overwrite and is it the SAME SMF Record 
Type as the original? If not, what SMF Record Type is cut?



Thank You,

Len Sasso
System Administrator
RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
t: +1.518.257.4209 | m: +1.518.894.0879
len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn 
CSRA Think Next. Now.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: setrog lnklst question

2017-05-16 Thread Lizette Koehler
You can create a parmlib member to 

COPY the current linklst to a new name
Activate the new linklist name

If you need further assistance let us know.

Lizette

-Original Message-
>From: william janulin <008d52e04f2e-dmarc-requ...@listserv.ua.edu>
>Sent: May 16, 2017 1:52 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: setrog lnklst question
>
>To list;
> Is it possible to add a dataset to the active lnklst? I tried a setprog 
>lnklst add command and got a messagethat the lnklst was active. 
>
>Thank you in advance, Bill J.
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Lizette Koehler
My basic understanding is this:

An SMF record is created for each event.

So, if you create a file/delete it - that would be a create and delete SMF 
Record.

If you do it hours apart, again new SMF records for create and delete are 
created.

SMF does not monitor to see if it is the same file or not.  It just creates 
records.

Now you may have a tool in your shop that does filtering.  Then I am not sure 
what that would do.


Basically SMF always writes a record, it does not check if that file name was 
done that way or not.


Lizette



-Original Message-
>From: "Sasso, Leonard" 
>Sent: May 16, 2017 3:11 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: SMF Records
>
>What I am asking is if the SAME file is transmitted with the SAME file name 
>again, is the SAME SMF Record Type cut or is a different SMF Record Type cut? 
>
>Thank You,
>
>Len Sasso
>System Administrator
>
>
>RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
>t: +1.518.257.4209 | m: +1.518.894.0879
>len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn
>CSRA
>Think Next. Now. 
>
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Steve Beaver
>Sent: Tuesday, May 16, 2017 6:02 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: SMF Records
>
>The SMF process is a sequential process and each records has a time and data 
>stamp.  SMF records DO NOT overwrite previous smf records  
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Sasso, Leonard
>Sent: Tuesday, May 16, 2017 4:47 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: SMF Records
>
>A customer transmits, via SFTP, a sequential file, from an external site to an 
>IBM Mainframe. An hour later, they transmit the same file with the SAME file 
>name, overwriting the original file.
>
>1. What SMF Record Type was cut when the first file was transmitted?
>
>2. Is another SMF Record cut for the overwrite and is it the SAME SMF Record 
>Type as the original? If not, what SMF Record Type is cut?
>
>
>
>Thank You,
>
>Len Sasso
>System Administrator
>RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
>t: +1.518.257.4209 | m: +1.518.894.0879
>len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn 
>CSRA Think Next. Now.
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Sasso, Leonard
What I am asking is if the SAME file is transmitted with the SAME file name 
again, is the SAME SMF Record Type cut or is a different SMF Record Type cut? 

Thank You,

Len Sasso
System Administrator


RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
t: +1.518.257.4209 | m: +1.518.894.0879
len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn
CSRA
Think Next. Now. 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Steve Beaver
Sent: Tuesday, May 16, 2017 6:02 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SMF Records

The SMF process is a sequential process and each records has a time and data 
stamp.  SMF records DO NOT overwrite previous smf records  

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Sasso, Leonard
Sent: Tuesday, May 16, 2017 4:47 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMF Records

A customer transmits, via SFTP, a sequential file, from an external site to an 
IBM Mainframe. An hour later, they transmit the same file with the SAME file 
name, overwriting the original file.

1. What SMF Record Type was cut when the first file was transmitted?

2. Is another SMF Record cut for the overwrite and is it the SAME SMF Record 
Type as the original? If not, what SMF Record Type is cut?



Thank You,

Len Sasso
System Administrator
RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
t: +1.518.257.4209 | m: +1.518.894.0879
len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn 
CSRA Think Next. Now.


This electronic message transmission contains information from CSRA that may be 
attorney-client privileged, proprietary or confidential. The information in 
this message is intended only for use by the individual(s) to whom it is 
addressed. If you believe you have received this message in error, please 
contact me immediately and be aware that any use, disclosure, copying or 
distribution of the contents of this message is strictly prohibited. NOTE:
Regardless of content, this email shall not operate to bind CSRA to any order 
or other contract unless pursuant to explicit written agreement or government 
initiative expressly permitting the use of email for such purpose.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Cyber attack

2017-05-16 Thread Edward Finnell
The CEO of Carbon Black was on Bloomberg yesterday. Sharp guy, guess I came 
 away with three things.
 
1)Too soon to tell who did it. There is already a wannacry 2.0
 
2)NSA data dumpers are threatening to do a dump month.
 
3)Cartels/Syndicates have their own TOR like networks to move info and $$$  
undetected in traditional sense.
 
 
In a message dated 5/16/2017 10:25:49 A.M. Central Daylight Time,  
jesse1.robin...@sce.com writes:

Thanks  for this link. I have reported it to our cybersecurity folks.  



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMF Records

2017-05-16 Thread Steve Beaver
The SMF process is a sequential process and each records has a time and data
stamp.  SMF records DO NOT overwrite previous smf records  

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Sasso, Leonard
Sent: Tuesday, May 16, 2017 4:47 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMF Records

A customer transmits, via SFTP, a sequential file, from an external site to
an IBM Mainframe. An hour later, they transmit the same file with the SAME
file name, overwriting the original file.

1. What SMF Record Type was cut when the first file was transmitted?

2. Is another SMF Record cut for the overwrite and is it the SAME SMF Record
Type as the original? If not, what SMF Record Type is cut?



Thank You,

Len Sasso
System Administrator
RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
t: +1.518.257.4209 | m: +1.518.894.0879
len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn
CSRA Think Next. Now.


This electronic message transmission contains information from CSRA that may
be attorney-client privileged, proprietary or confidential. The information
in this message is intended only for use by the individual(s) to whom it is
addressed. If you believe you have received this message in error, please
contact me immediately and be aware that any use, disclosure, copying or
distribution of the contents of this message is strictly prohibited. NOTE:
Regardless of content, this email shall not operate to bind CSRA to any
order or other contract unless pursuant to explicit written agreement or
government initiative expressly permitting the use of email for such
purpose.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


SMF Records

2017-05-16 Thread Sasso, Leonard
A customer transmits, via SFTP, a sequential file, from an external site to an 
IBM Mainframe. An hour later, they transmit the same file with the SAME file 
name, overwriting the original file.

1. What SMF Record Type was cut when the first file was transmitted?

2. Is another SMF Record cut for the overwrite and is it the SAME SMF Record 
Type as the original? If not, what SMF Record Type is cut?



Thank You,

Len Sasso
System Administrator
RDC - 327 Columbia TPKE, Rensselaer NY 12144-4400
t: +1.518.257.4209 | m: +1.518.894.0879
len.sa...@csra.com | www.csra.com Follow us on Facebook | Twitter | LinkedIn
CSRA
Think Next. Now.


This electronic message transmission contains information from CSRA that may be 
attorney-client privileged, proprietary or confidential. The information in 
this message is intended only for use by the individual(s) to whom it is 
addressed. If you believe you have received this message in error, please 
contact me immediately and be aware that any use, disclosure, copying or 
distribution of the contents of this message is strictly prohibited. NOTE: 
Regardless of content, this email shall not operate to bind CSRA to any order 
or other contract unless pursuant to explicit written agreement or government 
initiative expressly permitting the use of email for such purpose.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: setrog lnklst question

2017-05-16 Thread Gibney, Dave
You have to use SETPROG to make a copy of the active list, add your new library 
and activate the new list.

Read all the special caveats

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of william janulin
> Sent: Tuesday, May 16, 2017 1:52 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: setrog lnklst question
> 
> To list;
>  Is it possible to add a dataset to the active lnklst? I tried a setprog 
> lnklst add
> command and got a messagethat the lnklst was active.
> 
> Thank you in advance, Bill J.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


setrog lnklst question

2017-05-16 Thread william janulin
To list;
 Is it possible to add a dataset to the active lnklst? I tried a setprog lnklst 
add command and got a messagethat the lnklst was active. 

Thank you in advance, Bill J.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Re. Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Edward Gould
> On May 16, 2017, at 10:40 AM, Walt Farrell  wrote:
> 
> On Tue, 16 May 2017 09:57:16 -0400, Sam Golob  wrote:
> 
>>That having been said, the system doctor sometimes has to deal with
>> things that go wrong.  It's nice when the system is working as
>> designed.  But sometimes, the NON-CANCELABLE job or STC goes awry, and
>> it has to be restarted.  In such a case, as in the middle of a day's
>> production, you want to avoid an emergency IPL.  And so you need a tool
>> in the toolbox, to cancel the job or STC.  Sometimes the only solution
>> is to blow it away.
> 
> However, you should be prepared, when you use the tool, to have to IPL 
> anyway. And that should be clearly stated in any documentation for the tool.
> 
> -- 
> Walt
—SNIP———

In the early days of MVS we had constant issues of jobs going non cancelable.
Our IBM SE wrote a super cancel (callrtm)  command.
We *WERE* using it sparingly. It was a last grasp to IPL.
Although most of our issues had to due with allocation (Q4) getting hung.
We were IPLing once or twice in 3 days (sometimes as many as 8).
IBM rewrote allocation and just about eliminated the need for it. We did still 
use it from time to time and it did save IPL’s.
Our other IBMer who worked behind mountains of standalone dumps was used to it 
and didn’t raise it as an issue.
But it was understood by the group that using it was a last gasp attempt and 
then only making sure there were no allocation hangups.

Ed

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


AW: Re: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Peter Hunkeler

>It sounds like it's time to open a PMR.  Do you want to do that and can you do 
>that?


I'm not allowed to open a PMR by myself but asking my colleagues to open one is 
not a problem. It is only that I don't see what to report as an error in this 
case. From the long lasting investigation starting November 2016 to find a 
problem with Smart/Restart that started to pop up more often for exactly the 
same reason, I understand that the decimal overflow mask bit in the PSW and 
Language Environment's duty to support the different expectations of COBOL on 
one side and C and PL/I on the other side work as documented.



We had a PMR open with LE during the analysis of the Smart/Restart problem, and 
IBM LE did not seem to see a problem in the current behaviour.


What would you recommend we should report in the PMR? Maybe we continue to 
discuss offline, and report back here when there is interesting news?


Regards, Peter


--
Peter Hunkeler



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Allan Kielstra
It sounds like it's time to open a PMR.  Do you want to do that and can you do 
that?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Farley, Peter x23353
Very interesting analysis Peter.  We are beginning our conversion to COBOL V5.2 
and this will be a great help to us.

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Peter Hunkeler
Sent: Tuesday, May 16, 2017 7:49 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Long execution & high CPU usage due to decimal overflow (PGM 00A) and 
large system trace tables

Not a question, just some interesting stuff for the curious people :-)
 I have recently been asked to help analyze why a job was running very long and 
was using much CPU. Since all DB2 access paths were very efficient, we started 
an MA-Tune trace to see where the job was spending its time. MA-Tune reported 
that the job was spending almost 100% of its time at the following statement  
in module XYZ:
 MOVE   ARG-CNT TO DISPLAY-ARG-CNT
 This did not make much sense, because that MOVE statement is not part of any 
loop construct. One would have expected that MA-Tune would see the job in other 
places as well. Since MA-Tune could not help, I have taken an SVC-Dump of the 
job the next time I was made aware it was not ending again.
 Analysis of the dump showed that the job was spending almost all time 
recovering from a program check 00A (decimal owerflow exception) . It was not 
obvious whether this was a recovery loop because of some error in the 
environment, i.e. Cobol runtime, Language Environment, or some restart product 
we're using, although neither of this seemed plausible.
 Further investigation finally showed that the problem arises because the 
target field in the above MOVE statement is not large enough to receive the 
source value once it grows above 9'999'999: The source and target fields are 
declared as follows:
 01 ARG-CNTPIC 9(10) BINARY 01 DISPLAY-ARG-CNT  
   PIC 9(07)
 Ignoring any overflow when the source count is greater than  9'999'999 might 
be intended from a programming point of view, but it may cause a dramatic 
performance degradation. The reason for the performance degradation  lies in 
the following facts:
 * Firstly, Cobol wants to silently ignore a decimal overflow when it 
appears as part of a MOVE (and other) statement.
 * Secondly, the processor (hardware) supports two modes of operation 
regarding decimal overflow: It can either indicate an overflow by setting the 
condition code, or it can raise a program check hardware interruption of type 
00A.  While coding techniques such as in the example above did rarely hurt 
performance in Cobol up to version 4, it may more likely cause problems with 
Cobol V5.2 and above. The reason being that the Cobol compiler is making use of 
modern, better performing instructions on one hand, and the high likelihood  
that the processor is running in the mode where an overflow causes a hardware 
interruption to occur on the other hand.  Every hardware interruption has to be 
handled by Language Environment's error recovery routines. This recovery code 
will interpret the interrupt, and in the case above comes to the conclusion  
that the decimal overflow is to be expected, and to be silently ignored. It 
will thus give control back to the interrupted program code.
 Why is this so bad from a performance perspective? The path length of the code 
involved from the time the operating system recognizes the program check 
hardware interruption until Language Environment returns control  to the 
interrupted program is  quite long by itself. In addition it depends on the 
system setup. Especially the size of the system trace table has a great 
influence in the elapsed time. This system has 4 (logical) CPs, 3 (logical) z 
IIPs, and a system trace table size of 15MiB per processor.  It took between 
0.05 and 0.15 seconds (yes, this is in seconds!) elapsed time to handle a 
single overflow. That time is spent mostly to create a snapshot of the 105 MiB 
(7*15MiB) system trace tables in anticipation of a dump request.  At the time 
the dump was taken (I had been involved late), the source counter value was 
10'181'270, i.e. an overflow exception had occurred for the last 181'271 times 
the above statement  was executed. Ignoring any other delay this alone took 
some 181271 * 0.1s, i.e. some 5 hours of elapsed time.
   Regards Peter   

--

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
sen

Re: Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Sam Golob

Hi Folks,

I want to point out that not all versions of CNCLPG on CBT File 826 
have BURN or KILL capability for JOBs or STCs.  The earlier versions of 
the program (included in the file) have less power.


You have the choice of installing one of the earlier versions of 
the program (1.10, 1.11, or 1.20) if you only want to make jobs 
non-cancelable or non-swappable (1.11 and 1.20). So then you can use one 
of the earlier versions.


My point is to let you know that in an emergency, the power is there.

All the best of everything to all of you.

Sincerely,Sam

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Peter Hunkeler
>I have a suspicion that this is a mixed language program.  That is, it 
>consists of COBOL and, say C.  (Or it uses COBOL features with a C run time 
>implementation such as XML or OO COBOL.)  Can you confirm this is the case?




Allan, I cannot confirm this because I did not investigate so far in this case, 
but it may well be that XML is being used. As far as I know, we do not make use 
of OO COBOL.


I can, however, confirm that we're facing a lot of troubles with programs after 
they get recompiled with COBOL V5.2 instead of COBOL V4.2. The reason being 
that the different instruction stream which COBOL V5.2 (and newer) generates 
increase the likelihood that the program may run into decimal overflow 
conditions.


A simple MOVE statements that moves A to B where A is declared as PIC 9(7)V9(4) 
and B is declared as PIC V9(18) had never caused a decimal overflow in COBOL V4 
but may well in COBOL V5 because the later is making use of decimal 
instructions that will recognized decimal overflow.

We also see the decimal overflow mask bit in the PSW is turned on much more 
often, when COBOL V5 is being used. We know that using the XML is one reason, 
and running the prorgam under the IBM Debugger is another one, but we also see 
other cases, but did not find out what causes the mask to be set.


The result of all this is that a decimal overflow happens more often, and 
chances are much higher that the overflow will raise a 00a program check 
interruption that LE error handling has to deal with, just to find out the 
COBOL program can continue.


I just found another job late this afternoon which runs between 1 and 2 hours 
since the program was recompiled, but ran only a few minutes before.


--
Peter Hunkeler

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


AW: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Peter Hunkeler
I'm sorry for the bad formatting of the initial post.




Not a question, just some interesting stuff for the curious people :-)


 I have recently been asked to help analyze why a job was running very long and 
was using much CPU. Since all DB2 access paths were very efficient, we started 
an MA-Tune trace to see where the job was spending its time.


MA-Tune reported that the job was spending almost 100% of its time at the 
following statement  in module XYZ:


 MOVE   ARG-CNT TO DISPLAY-ARG-CNT


 This did not make much sense, because that MOVE statement is not part of any 
loop construct. One would have expected that MA-Tune would see the job in other 
places as well. Since MA-Tune could not help, I have taken an SVC-Dump of the 
job the next time I was made aware it was not ending again.


Analysis of the dump showed that the job was spending almost all time 
recovering from a program check 00A (decimal owerflow exception). It was not 
obvious whether this was a recovery loop because of some error in the 
environment, i.e. Cobol runtime, Language Environment, or some restart product 
we're using, although neither of this seemed plausible.


Further investigation finally showed that the problem arises because the target 
field in the above MOVE statement is not large enough to receive the source 
value once it grows above 9'999'999: The source and target fields are declared 
as follows:


 01 ARG-CNTPIC 9(10) BINARY
01 DISPLAY-ARG-CNT PIC 9(07)


 Ignoring any overflow when the source count is greater than  9'999'999 might 
be intended from a programming point of view, but it may cause a dramatic 
performance degradation. The reason for the performance degradation  lies in 
the following facts:


 · Firstly, Cobol wants to silently ignore a decimal overflow when it 
appears as part of a MOVE (and other) statement.


 · Secondly, the processor (hardware) supports two modes of operation 
regarding decimal overflow: It can either indicate an overflow by setting the 
condition code, or it can raise a program check hardware interruption of type 
00A.


While coding techniques such as in the example above did rarely hurt 
performance in Cobol up to version 4, it may more likely cause problems with 
Cobol V5.2 and above. The reason being that the Cobol compiler is making use of 
modern, better performing instructions on one hand, and the high likelihood  
that the processor is running in the mode where an overflow causes a hardware 
interruption to occur on the other hand.


Every hardware interruption has to be handled by Language Environment's error 
recovery routines. This recovery code will interpret the interrupt, and in the 
case above comes to the conclusion  that the decimal overflow is to be 
expected, and to be silently ignored. It will thus give control back to the 
interrupted program code.




 Why is this so bad from a performance perspective? The path length of the code 
involved from the time the operating system recognizes the program check 
hardware interruption until Language Environment returns control  to the 
interrupted program is  quite long by itself. In addition it depends on the 
system setup. Especially the size of the system trace table has a great 
influence in the elapsed time. This system has 4 (logical) CPs, 3 (logical) z 
IIPs, and a system trace table size of 15MiB per processor.  It took between 
0.05 and 0.15 seconds (yes, this is in seconds!) elapsed time to handle a 
single overflow. That time is spent mostly to create a snapshot of the 105 MiB 
(7*15MiB) system trace tables in anticipation of a dump request.


At the time the dump was taken (I had been involved late), the source counter 
value was 10'181'270, i.e. an overflow exception had occurred for the last 
181'271 times the above statement  was executed. Ignoring any other delay this 
alone took some 181271 * 0.1s, i.e. some 5 hours of elapsed time.




   Regards Peter




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Cyber attack

2017-05-16 Thread Charles Mills
Brian Krebs is a super reliable source. He has one or two issues that he is 
over-obsessed with IMHO but he is often a good read. I've never read anything 
from Brian that I thought based on my knowledge or experience to be wrong.

Not mainframe-oriented at all, of course, but many issues are more or less 
universal.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Jesse 1 Robinson
Sent: Tuesday, May 16, 2017 8:24 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Cyber attack

Thanks for this link. I have reported it to our cybersecurity folks. 

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Tuesday, May 16, 2017 5:59 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: Cyber attack

https://krebsonsecurity.com/2017/05/breach-at-docusign-led-to-targeted-email-malware-campaign/
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Allan Kielstra
Hi Peter

I have a suspicion that this is a mixed language program.  That is, it consists 
of COBOL and, say C.  (Or it uses COBOL features with a C run time 
implementation such as XML or OO COBOL.)  Can you confirm this is the case?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Sam Golob

Hi Folks,

I just want to tell you that I very much appreciate this 
discussion.  Very much depends on POINT OF VIEW, and when all the points 
of view get together, real progress is made, and everybody becomes wiser.


There are at least three separate points of view here on this forum:

1.  The systems programmers who have to set up and run the system 
software in data centers.


2.  The professional "system level" programmers who usually work for 
vendors.


3.  The IBM programmers who design and build the system software.

There may be other people here also, such as application 
programmers and "programmer toolmakers" and more types, as well.


Everybody has a separate point of view.  In summary, here they are:

People who run data centers, have to make sure everything run 
smoothly, and they have to deal with "the problems of the non-ideal 
world".  Something breaks--fix it.  Keep the system up.  Make sure the 
system levels are correctly set for what we are doing, and for what we need.


Professional "system level" programmers dig deep into the system.  
"Authority" is not what is usually on their mind, unless they are 
dealing with a security-related product.  For example, doing 
cross-memory programming is usually "a piece of cake" for them.  But 
changing some fields in another user's control blocks, which might be 
easy for THEM to do, is a nightmare from the system administrator's 
point of view, so you already see a difference in point of view between 
these two groups.


Finally, the IBM designers and programmers have a big 
responsibility of delivering a consistent and reliable system, but they 
may tend (depending on the individual person's actual experience) to be 
a bit separated from the system programmer's "real world" problems, and 
the things that actually come up in a real data center, day by day.


I am glad that my post is bringing these 3 points of view together, 
in a productive and fruitful way.  If I did not write about this topic, 
then some sysprog might be without a necessary tool in his/her toolbox.  
When the emergency came up, they would be as helpless as I was, many 
years ago.  On the other hand, we know that the tool can be used 
improperly, either by the right people or the wrong people.  So I had a 
quandary:  "To say, or NOT to say.  That was the question."


I opted to "say".  I remember the pain in my heart, when JES2 
couldn't be removed, and we had to IPL in the middle of the day.  It was 
easy to fix if we could just cancel JES2, and restart it.  I had already 
proven that to myself, at that time. But I was helpless and adrift.  We 
had to IPL.  NEVER AGAIN!  I won't let that happen to someone!  NEVER!!!


So there.  I trust we've all been helpful...

All the best of everything to everyone.

Sincerely,Sam

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Re. Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Walt Farrell
On Tue, 16 May 2017 09:57:16 -0400, Sam Golob  wrote:

> That having been said, the system doctor sometimes has to deal with
>things that go wrong.  It's nice when the system is working as
>designed.  But sometimes, the NON-CANCELABLE job or STC goes awry, and
>it has to be restarted.  In such a case, as in the middle of a day's
>production, you want to avoid an emergency IPL.  And so you need a tool
>in the toolbox, to cancel the job or STC.  Sometimes the only solution
>is to blow it away.

However, you should be prepared, when you use the tool, to have to IPL anyway. 
And that should be clearly stated in any documentation for the tool.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ATTACH with RSAPF=YES

2017-05-16 Thread Walt Farrell
On Tue, 16 May 2017 20:42:42 +0700, Robin Atwood  wrote:

>>However, as you're running work on behalf of various end-users, I hope you're 
>>authenticating those users and >running the work under the proper end-user 
>>identity in each case. And that would probably require authorization >of the 
>>STC. 
>
>Yes, we run under the ACEE of the user.

However, unless your STC runs single-threaded (handling requests for only 1 
user at a time) it's not possible for you to run REXX execs invokiing ISPF 
services with proper security. 

It would require ensuring that none of the execs, or the services they invoke, 
perform any ATTACH requests., The new subtask created by ATTACH would not 
inherit the ACEE of the user on whose behalf you're running the request. (There 
is one exception to that, but it's used rarely enough that it probably won't 
apply to you. You would have to be using WLM services, and operating as a WLM 
servant to manage the requests that you're processing. Then, and only then as 
far as I know, would the user's ACEE propagate down to a new subtask.)

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Elardus Engelbrecht
Paul Gilmartin wrote:

>I sense a gradual escalation here.

>Long ago, there was the CANCEL command so operators could terminate 
>troublesome jobs.
>But a designer felt that sometimes the programmer knows better, and provided 
>the non-cancellable attribute.
>Then a designer felt that sometimes the operator knows even better and 
>provided the FORCE command.
>Then a designer felt that sometimes the programmer knows even better and 
>provided the non-forcible attribute.
>Now someone feels that operators know better and is providing a WHACK facility.

Not good. All involved must look why you need to WHACK it. 

For example, your job itself is waiting for a mount or is waiting for HSM to 
recall something, but there is a mount problem. Solve that, and you don't need 
all those fancy measures including a 222 abend. 

Ok, that is just one sample reason why 'WHACKING' or all those 'x who knows 
better' are not suitable.

One example we got a few weeks ago was, a session was holding a CICS region. 
CPU% and region consumed climbed. Response times dropped on all CICS regions. 
Instead having WHACK down the troublesome CICS region, the network people 
simply VARY that session offline and all things returned to normal. No STCs 
were stopped at all.

But, so, normally check all normal avenues, then escalate using more and more 
extreme measures as per Paul' suggestion.

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Cyber attack

2017-05-16 Thread Jesse 1 Robinson
Thanks for this link. I have reported it to our cybersecurity folks. 

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Tuesday, May 16, 2017 5:59 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: Cyber attack

https://krebsonsecurity.com/2017/05/breach-at-docusign-led-to-targeted-email-malware-campaign/
 

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Jesse 1 Robinson
Sent: Monday, May 15, 2017 4:38 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Cyber attack

I got one over the weekend with a name I don't recognize. Did not open or 
pursue because I was suspicious. 

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Steve Beaver
Sent: Monday, May 15, 2017 4:24 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Cyber attack

I have been seen a lot of emails for what appears to be DocuSign and I have 
been killing them when I seen them


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Re. Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Rivera, Dan
..and sometimes a Doctor uses a Sonic Screw Driver.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Tom Marchant
Sent: Tuesday, May 16, 2017 10:11 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Re. Whacking a Job, or Getting rid of an Address Space

On Tue, 16 May 2017 09:57:16 -0400, Sam Golob wrote:

> the system doctor sometimes has to deal with things that go wrong.
>
>The
>doctor needs to have a scalpel.  Most doctors don't often need to use
>the scalpel.

Sometimes the "doctor" isn't really a doctor, but a boy scout who may have 
learned some rudimentary first aid.

And sometimes that thing that he thought was a scalpel is really a chain saw.

--
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN


The information contained in this message, and any attachments thereto,
is intended solely for the use of the addressee(s) and may contain
confidential and/or privileged material. Any review, retransmission,
dissemination, copying, or other use of the transmitted information is
prohibited. If you received this in error, please contact the sender
and delete the material from any computer. UNIGROUP.COM



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Re. Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Tom Marchant
On Tue, 16 May 2017 09:57:16 -0400, Sam Golob wrote:

> the system doctor sometimes has to deal with
>things that go wrong. 
>
>The
>doctor needs to have a scalpel.  Most doctors don't often need to use
>the scalpel.

Sometimes the "doctor" isn't really a doctor, but a boy scout who may 
have learned some rudimentary first aid.

And sometimes that thing that he thought was a scalpel is really a 
chain saw.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


AW: Re: How are Program Object sections with Defer attribute loaded?

2017-05-16 Thread Peter Hunkeler
>>Are they loaded into a specific subpool defined by MVS, or the
>>loading piece of software responsible to do an appropriate
>>STORAGE OBTAIN before using that internal interface?
>
>
>Both are possible. The default system processing happens to use subpool 1
>(but the subpool number is not to be considered an interface). But the
>exploiter can provide their own storage.




Thank you, Sir


Cheers, Peter


--
Peter Hunkeler



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Paul Gilmartin
On Tue, 16 May 2017 07:59:56 -0400, Peter Relson wrote:

>Maybe it's me, but I found this post kind of inappropriate since it came 
>without caveats. One might think/hope that whoever defined a space as 
>non-cancelale or non-memtermable had a legitimate reason for doing so. 
>That likely isn't of course always true, but isn't that what you really 
>need to assume?
> 
I sense a gradual escalation here.

Long ago, there was the CANCEL command so operators could
terminate troublesome jobs.

But a designer felt that sometimes the programmer knows better,
and provided the non-cancellable attribute.

Then a designer felt that sometimes the operator knows even better
and provided the FORCE command.

Then a designer felt that sometimes the programmer knows even better
and provided the non-forcible attribute.

Now someone feels that operators know better and is providing
a WHACK facility.
...

Perhaps there should be a numeric attribute and a CANCEL command
argument, such that if the value supplied by the operator exceeds the
program's attribute, the CANCEL just works.

Floating point, of course.  Decimal floating point.

The operator will always have the nuclear option.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ATTACH with RSAPF=YES

2017-05-16 Thread Peter Relson

We have a requirement to attach user modules from an unauthorised library
and execute them from an STC which runs APF authorised.


You need to reject that requirement. It cannot be accomplished while 
maintaining system integrity. Use of something like "fork" can perhaps 
accomplish the goal without meeting the letter of the requirement.


Well, if you want to run unauthorized stuff you would first need to set 
your
job as non-APF by resetting the bit.


And if you do that, you must *never* turn the bit back on. Turning of 
JSCBAUTH is a fairly common approach, once the "authorized stuff" has been 
done. But you must then leave it off in order to maintain system 
integrity.

In all likelihood you should NEVER use RSAPF=YES. It is provided so that 
the initiator can attach the jobstep program task. I have no idea why it 
was documented. Way back when, even internal things were documented. Maybe 
when internal-only things were being removed from the books, no one 
realized how internal this one was.

The only z/OS-supported mechanism for authority-decreasing is SYNCH(X). 
And I do intentionally exclude authority-decreasing PC's (e.g., a PC that 
gets control in problem state when the invoker was supervisor state)  from 
what is supported by z/OS. You can't be stopped from doing so, but things 
likely won't behave the way you need if there was a (E)SPIE present. There 
might be cases other than (E)SPIE that similarly would cause anomalous 
behavior. I have no idea if this is documented explicitly. It's just 
something I remember being told long long ago.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re. Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Sam Golob

Hi Folks,

Of course, you're right, Peter.  Jobs or STCs are marked 
NON-CANCELABLE for a very good reason.  Under normal circumstances, they 
should not be cancelled, because it would endanger the system.  That's 
what the PPT is for.  Almost always, the safeguards that are there, are 
there for a very good reason. And I'm on management's side all the way.  
The idea is to keep the systems running as flawlessly and smoothly as 
possible.


That having been said, the system doctor sometimes has to deal with 
things that go wrong.  It's nice when the system is working as 
designed.  But sometimes, the NON-CANCELABLE job or STC goes awry, and 
it has to be restarted.  In such a case, as in the middle of a day's 
production, you want to avoid an emergency IPL.  And so you need a tool 
in the toolbox, to cancel the job or STC.  Sometimes the only solution 
is to blow it away.  The expensive multi-utility packages all contain 
such tools.  You wouldn't criticize Omegamon (TM) or RESOLVE (TM), would 
you?  But a shop which can't afford to buy them is sometimes stuck, and 
is forced to IPL and lose a lot of production time.  That's why I wrote 
CNCLPG 20 years after I had such an emergency, which I never forgot about.


Systems programmers do not live in an ideal world. Problems come 
up, in running the data center, which can be very unforeseen.  The 
doctor needs to have a scalpel.  Most doctors don't often need to use 
the scalpel.  But when you need it, and nothing else works, it's nice to 
know that it is there, sitting in the toolbox.  This is where I come 
from.  It's all for the purpose of keeping the shop running smoothly.


Thanks for listening.  All the best of everything to all of you.

Sincerely,Sam

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Effect of SET PROG=xx

2017-05-16 Thread Elardus Engelbrecht
Vernooij, Kees (ITOPT1) - KLM wrote:

>Elardus Engelbrecht wrote:
>> >This is the world's dumbest question if you're a sysprog but I'm a 
>> >developer with nearly zero sysprog experience. 
>> This is not a dumb question. Only wise people ask questions! ;-) 
 
>No, wise people are here to answer questions, fools to ask questions. Sometime 
>they ask questions that even 1000 wise men cannot answer. 
;-) 
 
Hahahahahaha! Point taken 

Ok, but the wise persons have all the ANSWERS after they got them. Them fools 
who don't ask just stay SOL.

For those questions where 1000 gurus can't answer at all - I have one simple 
answer. It is called 'middle finger'! ;-D


Ok, time for a really serious joke:

It is today my grand-grand-grandfather's birthday. I am very proud to say he 
manly and alone destroyed the whole german army communication system during 
world war one!

What did he do? He ate the postal pigeon!

To be sure those germans don't have a backup - he also ate snails - thus no 
snail mails for them too...  

;-D

Now returning back to my scheduled z/OS topics.

Groete / Greetings 
Elardus Engelbrecht 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ATTACH with RSAPF=YES

2017-05-16 Thread Robin Atwood
>However, as you're running work on behalf of various end-users, I hope you're 
>authenticating those users and >running the work under the proper end-user 
>identity in each case. And that would probably require authorization >of the 
>STC. 

Yes, we run under the ACEE of the user.

Robin

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Effect of SET PROG=xx

2017-05-16 Thread Vernooij, Kees (ITOPT1) - KLM


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Elardus Engelbrecht
> Sent: 16 May, 2017 15:15
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Effect of SET PROG=xx
> 
> Charles Mills wrote:
> 
> >This is the world's dumbest question if you're a sysprog but I'm a
> developer with nearly zero sysprog experience.
> 
> This is not a dumb question. Only wise people ask questions! ;-)
> 
> 

No, wise people are here to answer questions, fools to ask questions. Sometime 
they ask questions that even 1000 wise men cannot answer.
;-)

Kees.


> Groete / Greetings
> Elardus Engelbrecht
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ATTACH with RSAPF=YES

2017-05-16 Thread Walt Farrell
On Tue, 16 May 2017 14:09:49 +0700, Robin Atwood  wrote:

>Thanks to everyone for replying, I would never realised you had to flip
>JSCBAUTH from the macro documentation.
>The actual business requirement is that we run Rexx execs that call ISPF
>services on behalf of workstation users
>running an IDE. The STC doing this must run authorised because it
>communicates with a comms task via cross-memory services. So we will have
>control over what gets executed. This is still very much an experiment, I am
>not sure it will actually work.

Technically, for the communication you've described, only the comms task would 
have to run authorized. The STC could run unauthorized, using mechanisms setup 
by the authorized comms task.

However, as you're running work on behalf of various end-users, I hope you're 
authenticating those users and running the work under the proper end-user 
identity in each case. And that would probably require authorization of the 
STC. 

It is a very tricky situation to manage properly and without introducing either 
system integrity or security issues.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Effect of SET PROG=xx

2017-05-16 Thread Elardus Engelbrecht
Charles Mills wrote:

>This is the world's dumbest question if you're a sysprog but I'm a developer 
>with nearly zero sysprog experience.

This is not a dumb question. Only wise people ask questions! ;-)


>Whenever in the past that I have taken a quick look at SET PROG=(xx,yy) I 
>assumed that PROGxx + PROGyy in the parmlib concatenation *totally replaced* 
>the contents of whatever PROGaa and PROGbb had been specified in IEASYSxx at 
>IPL.

Sort of 'replace', yes, but see my comments below.


>But as I read the documentation now I get the impression instead that SET 
>PROG=(xx,yy) causes PROGxx and PROGyy to be processed essentially as scripts 
>each line of which incrementally modifies whatever is already in effect.

True.

>Is my latter impression more correct?

Yes. Look at these two I did in the past:

PROGXX:

EXIT DELETE   
 EXITNAME(SYS.IEFUTL) 
 MODNAME(IEFUTL)  
LPA DELETE MODNAME(IEFUTL) FORCE(YES) CURRENT 

Later after assembling a new IEFUTL, I did this:

PROGYY:

LPA ADD MODNAME(IEFUTL)
 DSNAME(SYS??.LPALIB) 
EXIT ADD EXITNAME(SYS.IEFUTL) MODNAME(IEFUTL) STATE(ACTIVE)
 DSNAME(SYS??.LPALIB) 


>I'm more familiar with SET SMF=xx and that's how it works. SMFPRMxx does not 
>add to what came before; it replaces it.

True.

What I usually do is:

I create a brand new SMFPRMxx. Modify the DSNAME or whatever (remove IEFUTL for 
example) and then do my SET SMF=xx. When finished, I issue my SET SMF=xx last 
used in IPL.

All in all, I don't touch the *official* live PROGxx and SMFPRMxx members.

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Cyber attack

2017-05-16 Thread Charles Mills
https://krebsonsecurity.com/2017/05/breach-at-docusign-led-to-targeted-email-malware-campaign/
 

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Jesse 1 Robinson
Sent: Monday, May 15, 2017 4:38 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Cyber attack

I got one over the weekend with a name I don't recognize. Did not open or 
pursue because I was suspicious. 

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Steve Beaver
Sent: Monday, May 15, 2017 4:24 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Cyber attack

I have been seen a lot of emails for what appears to be DocuSign and I have 
been killing them when I seen them

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: How are Program Object sections with Defer attribute loaded?

2017-05-16 Thread Peter Relson

Are they loaded into a specific subpool defined by MVS, or the 
loading piece of software responsible to do an appropriate 
STORAGE OBTAIN before using that internal interface?


Both are possible. The default system processing happens to use subpool 1 
(but the subpool number is not to be considered an interface). But the 
exploiter can provide their own storage.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Effect of SET PROG=xx

2017-05-16 Thread Charles Mills
> only dumb developers

I like you too, Tom. I thought we were friends. 

I did realize where I got this dumb idea from. I'm more familiar with SET 
SMF=xx and that's how it works. SMFPRMxx does not add to what came before; it 
replaces it.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Tom Conley
Sent: Monday, May 15, 2017 5:19 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Effect of SET PROG=xx

On 5/15/2017 7:25 PM, Charles Mills wrote:
> This is the world's dumbest question if you're a sysprog but I'm a 
> developer with nearly zero sysprog experience.
> 
> Whenever in the past that I have taken a quick look at SET 
> PROG=(xx,yy) I assumed that PROGxx + PROGyy in the parmlib 
> concatenation *totally replaced* the contents of whatever PROGaa and 
> PROGbb had been specified in IEASYSxx at IPL.
>   
> But as I read the documentation now I get the impression instead that 
> SET
> PROG=(xx,yy) causes PROGxx and PROGyy to be processed essentially as 
> scripts each line of which incrementally modifies whatever is already 
> in effect. In other words, if I entered SET PROG=ZZ and PROGZZ was 
> devoid of statements other than comments then the system would be left 
> unchanged, regardless of what had been in PROGaa and PROGbb at IPL. If 
> PROGZZ contained one APF ADD statement, then that DSN would get added 
> to the APF list, much as if I had entered SETPROG APF,ADD,DSN=...; and 
> every other system parameter would be left unchanged.
> 
> Is my latter impression more correct?
> 

There are no dumb questions, only dumb developers. ;-)  SET PROG is additive, 
and yes, if you only have one line that is an APF ADD DSN, then it will add 
only that dataset.  If you add and delete lines from your PROG00 member 
(assuming you start your system with that) which contains only APF ADD 
statements, then the ADDs will be added, but the ADD statements you removed 
will still be in APFLIST.  To remove any datasets from APFLIST, you have to 
issue an explicit APF DEL with SET PROG, or SETPROG APF,DEL.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ATTACH with RSAPF=YES

2017-05-16 Thread Charles Mills
> So we will have control over what gets executed

As others have pointed out, you are exposing yourself to risks that you will
have to manage. MVS would be willing to take on some of that management for
you, but you are overriding that facility.

You need to make absolutely sure of who has the ability to write into every
single dataset used as a load or parameter or script library by every single
thing called by your STC.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Robin Atwood
Sent: Tuesday, May 16, 2017 12:10 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ATTACH with RSAPF=YES

Thanks to everyone for replying, I would never realised you had to flip
JSCBAUTH from the macro documentation. 
The actual business requirement is that we run Rexx execs that call ISPF
services on behalf of workstation users running an IDE. The STC doing this
must run authorised because it communicates with a comms task via
cross-memory services. So we will have control over what gets executed. This
is still very much an experiment, I am not sure it will actually work.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Whacking a Job, or Getting rid of an Address Space

2017-05-16 Thread Peter Relson
Maybe it's me, but I found this post kind of inappropriate since it came 
without caveats. One might think/hope that whoever defined a space as 
non-cancelale or non-memtermable had a legitimate reason for doing so. 
That likely isn't of course always true, but isn't that what you really 
need to assume?

Unless you are willing to risk your system and its data by assuming that 
it is OK to cancel something that is non-cancelable or memterm something 
that is non-memtermable then the action taken by this tool is 
inappropriate.

And by including "and its data" I mean to include that you could 
conceivably break some data that you won't be able to fix by re-IPL. Not 
likely, but conceivable.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Long execution & high CPU usage due to decimal overflow (PGM 00A) and large system trace tables

2017-05-16 Thread Peter Hunkeler
Not a question, just some interesting stuff for the curious people :-)
 I have recently been asked to help analyze why a job was running very long and 
was using much CPU. Since all DB2 access paths were very efficient, we started 
an MA-Tune trace to see where the job was spending its time. MA-Tune reported 
that the job was spending almost 100% of its time at the following statement  
in module XYZ:
 MOVE   ARG-CNT TO DISPLAY-ARG-CNT
 This did not make much sense, because that MOVE statement is not part of any 
loop construct. One would have expected that MA-Tune would see the job in other 
places as well. Since MA-Tune could not help, I have taken an SVC-Dump of the 
job the next time I was made aware it was not ending again.
 Analysis of the dump showed that the job was spending almost all time 
recovering from a program check 00A (decimal owerflow exception) . It was not 
obvious whether this was a recovery loop because of some error in the 
environment, i.e. Cobol runtime, Language Environment, or some restart product 
we're using, although neither of this seemed plausible.
 Further investigation finally showed that the problem arises because the 
target field in the above MOVE statement is not large enough to receive the 
source value once it grows above 9'999'999: The source and target fields are 
declared as follows:
 01 ARG-CNTPIC 9(10) BINARY 01 DISPLAY-ARG-CNT  
   PIC 9(07)
 Ignoring any overflow when the source count is greater than  9'999'999 might 
be intended from a programming point of view, but it may cause a dramatic 
performance degradation. The reason for the performance degradation  lies in 
the following facts:
 · Firstly, Cobol wants to silently ignore a decimal overflow when it 
appears as part of a MOVE (and other) statement.
 · Secondly, the processor (hardware) supports two modes of operation 
regarding decimal overflow: It can either indicate an overflow by setting the 
condition code, or it can raise a program check hardware interruption of type 
00A.  While coding techniques such as in the example above did rarely hurt 
performance in Cobol up to version 4, it may more likely cause problems with 
Cobol V5.2 and above. The reason being that the Cobol compiler is making use of 
modern, better performing instructions on one hand, and the high likelihood  
that the processor is running in the mode where an overflow causes a hardware 
interruption to occur on the other hand.  Every hardware interruption has to be 
handled by Language Environment's error recovery routines. This recovery code 
will interpret the interrupt, and in the case above comes to the conclusion  
that the decimal overflow is to be expected, and to be silently ignored. It 
will thus give control back to the interrupted program code.
 Why is this so bad from a performance perspective? The path length of the code 
involved from the time the operating system recognizes the program check 
hardware interruption until Language Environment returns control  to the 
interrupted program is  quite long by itself. In addition it depends on the 
system setup. Especially the size of the system trace table has a great 
influence in the elapsed time. This system has 4 (logical) CPs, 3 (logical) z 
IIPs, and a system trace table size of 15MiB per processor.  It took between 
0.05 and 0.15 seconds (yes, this is in seconds!) elapsed time to handle a 
single overflow. That time is spent mostly to create a snapshot of the 105 MiB 
(7*15MiB) system trace tables in anticipation of a dump request.  At the time 
the dump was taken (I had been involved late), the source counter value was 
10'181'270, i.e. an overflow exception had occurred for the last 181'271 times 
the above statement  was executed. Ignoring any other delay this alone took 
some 181271 * 0.1s, i.e. some 5 hours of elapsed time.
   Regards Peter

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Check out British computer expert who stopped ransomware says he's no hero -

2017-05-16 Thread Edward Finnell
_British  computer expert who stopped ransomware says he's no hero - NY 
Daily News_ 
(http://www.nydailynews.com/news/world/british-computer-expert-stopped-ransomware-no-hero-article-1.3168684)
  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ATTACH with RSAPF=YES

2017-05-16 Thread Robin Atwood
Thanks to everyone for replying, I would never realised you had to flip
JSCBAUTH from the macro documentation. 
The actual business requirement is that we run Rexx execs that call ISPF
services on behalf of workstation users 
running an IDE. The STC doing this must run authorised because it
communicates with a comms task via cross-memory services. So we will have
control over what gets executed. This is still very much an experiment, I am
not 
sure it will actually work.

Thanks
Robin

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Binyamin Dissen
Sent: 15 May 2017 20:56
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ATTACH with RSAPF=YES

Well, if you want to run unauthorized stuff you would first need to set your
job as non-APF by resetting the bit.

Of course, your authorized key8 storage will be subject to change by the
unauthorized task, thus your authorized code must not use Key8 storage.

(1) and (2) are not exclusive, as your authorized task would need to remain
in supervisor state after resetting APF (assuming you still need APF
services).
If you no longer need APF services, simply reset APF do MODESET PROB and the
garden variety ATTACH(X)

Why do you want to run unauthorized code from this STC? What is the business
case?

On Mon, 15 May 2017 15:18:38 +0700 Robin Atwood  wrote:

:>We have a requirement to attach user modules from an unauthorised library
:>and execute them from an STC which :> :>runs APF authorised. Calling
ATTACH with RSAPF=YES seems to do exactly what :>I want but every time I try
it :> :>I get abend S306-0C, "authorised program attaching module from an
:>unauthorized library". The ATTACH macro :> :>description states:
:>
:>
:>
:>RSAPF=YES when these conditions are met: 
:>
:>. The caller is running in supervisor state, system key (0-7),
:>or both
:>
:>. The caller is running non-APF authorized
:>
:>. The subtask is attached in the problem program state and
with
:>a nonsystem key.
:>
:>
:>
:>Conditions 1 and 2 seem mutually exclusive. I tried coding MODESET
MODE=SUP :>and adding SM=PROB,KEY=PROP :> :>to the ATTACH but it made no
difference. I seem to be missing something :>fairly massive here! Can anyone
shed :> :>some light on this?
:>
:>
:>
:>Thanks
:>
:>Robin
:>
:>
:>--
:>For IBM-MAIN subscribe / signoff / archive access instructions, :>send
email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
Binyamin Dissen  http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me, you
should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems, especially
those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN