OPTCD=Q (was Conversion from Unisys Cobol file definitions to zOS)
Hi In a recent post it was stated "Bottom line, I think it's pretty clearly documented that BSAM/QSAM supports character set conversion, but only when tape is involved. I agree that that's a pretty ridiculous restriction" and this was for both OPRCD=Q and CCSID. This may seem like a ridiculous restriction but I see no incentive or requirement to change it. OPTCD=Q in particular harks back to when most installations transferred data via tape, not even cartridge in those days. Here in the UK all the main banks used IBM equipment but the central clearing centre for Standing Orders and Direct Debits used an indigenous system and hence OPTCD=Q was used a lot. These days most organisations rely on network transfers and have bespoke products such as Connect Direct to handle the traffic. These products are more than capable of handling character conversion as a minimum. Looking back at the original post it seem that the issue was more sophisticated than simple character conversion and related to field alignment and sizes, i.e. converting a 3-digit field with a length of one and half bytes into a two byte field. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using MGCRE with JES2 Commands
Hi I have resolved the issue I was having with MGCRE and it was nothing to do with security. I did try the WARN setting within RACF and I also experimented with RACROUTE (which is another story) but ultimately the problem lay with command length. Because the TEXT length on MGCRE can be up to 126 characters I defined an area of that size and left the length fixed. This worked OK for z/OS Commands, but it would seem that JES2 is more picky. By calculating the command length and storing it in the TEXT prefix area, the program is now working fine. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using MGCRE with JES2 Commands
Hi Elardus In respect of "Please post the full IEE707I message and the command attempted." The reality is that ANY z/OS command is accepted but ANY JES2 command is rejected so if I use $DSPOOL as an example the message received is: IEE707I $DSPOOL NOT EXECUTED If the program were not linked AC(1) it would SD22 which it does not. I am the security guy and as such own JES%.** which ought to give me access to commands which do not have an explicit profile, or so I thought. I am confused about the UTOKEN. If the manual says it is optional and that the Address Space Userid will be used if it is not coded, and the Address Space Userid is that of the security administrator and hence has SPECIAL authority, are we saying that the manual is incorrect and that UTOKEN is mandatory. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using MGCRE with JES2 Commands
Hi Elardus In respect of "At what z/OS version are you? Do you have any exits which validate commands issued to JES2?" This is a standard ADCD system which is at z/OS 1.13 and there are no command validation exits that I am aware of". I would not want you to go to too much trouble on my behalf as my license expires at the end of October and I will not be renewing it. I was only trying to tidy some loose end before I switch the system off, and had thought that somebody must have done this already and might be able to provide a swift answer. Thank you for you efforts. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Using MGCRE with JES2 Commands
Hi I have a very old program which uses SVC 34 directly to execute z/OS and JES2 Commands. I thought it would be good to update the program to use MGCRE. The update works fine for z/OS Commands but any attempt to issue a JES2 command results in that command being displayed on the hardcopy log together with IEE707I NOT EXECUTED. The program does not do any RACROUTE processing as the MGCRE notes indicate that if UTOKEN is not specified command processing will be linked to the Address Space Userid. I found a query relating to this issue in the Oct 2000 archive but it did not appear to have any response. I am hoping that I am missing something simple and any advice would be appreciated. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Volume is offline after IPL (ADCD beginner question)
Hi Michael, Having added several volumes to various pre-z/OS 2.1 release of the ADCD without hitting the problem you have mentioned it might be worth posting you devmap entry from what would logically be zos21.prof (z/OS 1.13 has zos113s.prof which is how I derived the name.) It may be something in here which is inhibiting initial online status, although I defer to the IODF comments made by more knowledge folk than I in that area. As others have said if you wish to automate the change to online then including a VARY command in COMMNDnn would be prefereable to IEACMDnn which conventionally is reserved for IBM issued commands. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: EMCS Console identities
Hi Rob, Thanks for your pointer about the SDSF options panel, I blanked out the invalid userid stored there and everything is now as it should be. My only remaining issue is whether I spend time investigation why the value was incorrect or not, I probably will not as it is likely that I changed it somehow in the past and simply forgot. Thanks again. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
EMCS Console identities
Hi I ned advice on where to look for information on how the names of an EMCS Console is assigned, as the manuals and Google searches have not helped much. The situation I have is that the name of the EMCS console which gets assigned when I start an SDSF session under TSO is different to the TSO Userid. This has probably been happening for some time but I have only just noticed it. It doesn't cause a problem but is confusing when I issue an MVS Command from SDSF, and the IEA630I message which indicates the EMCS session is open contains a different userid. (I am wondering if could relate in some way to the use of RACF variable for command authorisation.) Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re IEB841I IEBUPDTE puzzle
Hi Paul I am late with this response because I have been away but as far as I can see there are two issues with the sample JCL which contains the //HAMDLE DD statement. That particular DD statement does not contain any DCB information and hence unless a DATACLAS is being automatically allocated via SMS the system will only know what SPACE to allocate, not what the attributes are. This is turn means that even though the SYSUT2 allocation assimilates to the same data set the SYSUT2 OPEN within IEBUPDTE will not know what attributes apply. (Remember that HANDLE is an arbitrary name and that there is no OPEN for it in either IEFBR14 or IEBUPDTE so the system cannot scan control blocks.) As regards the ADD statements. These have no bearing on DISPosition. It does not matter whether the data set is new or already exists, to create a new member the ./ ADD statement is used and to replace an existing member the ./ REPLACE statement is used. There is a functional split here between system responsibility (OPEN/CLOSE) and program logic (ADD/REPLACE). Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Primary allocation of a dataset
Hi As several people have already alluded IT IS NOT POSSIBLE to retrieve the Primary Request for SPACE as it IS NOT recorded in the DSCB. There is no need to store this information as it is either available and used or it is not in which case the data set is not created. The Secondary Request has to be stored in the DSCB for subsequent use if the need arises. The FIRST EXTENT will only equate to the Primary Request if CONTIG were specified at allocation time. If CONTIG is not specified then the system will attempt to allocate the Primary in up to 5 extents. When LISTDSI and ISPF 3.2 are used they only report the first extent, which may only be a subset of the Primary Request. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Ibvoking ISPF Services from REXX
Hi Not withstanding anything which has been posted earlier, If we assume that the original requirement was to exploit ISPF Services within a REXX executing inside IKJEFT01 rather than IXXJCL, the simplest first step is to ensure that the required ISPF data sets are included in the JCL. If that is the case then either of these methods can be used to: ISPSTART CMD(dialog any_parm_data ) TSO Batch is different to TSO Foreground as ISPF is not automatically there so providing the files are accessibly, the above will start the Batch ISPF environment within Batch TSO, and run the nominated script. Within the nominated script there are two methods of accessing ISPF Services: Method 1: Address ISPEXEC /* Set ISPF as the default Host Environment rather than TSO */ VPUT (odsn) /* Save for ISPF use. */ LMDINIT LISTID(V1) LEVEL(HLQ) Method2: /* Keep TSO as the default Host Environment */ Address ISPEXEC VPUT (odsn) /* Save for ISPF use. */ Address ISPEXEC LMDINIT LISTID(V1) LEVEL(HLQ) The above are adapted extracts from some routines written to capture and offload some data sets with a particular HLQ. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Never Ending Batch versus Started Task ??
Hi I might be wrong but the idle-time limit (Job Wait Time(JWT)) is surely a system wide limit set within SMFPRMnn and as such applies to both Batch and STCs, hence many installations code TIME=1440 on the EXEC within the STC procedure. Similarly the doesn't the PPT entry applu equally to a program whether it is started via an STC or Batch. CICS (DFHSIP) has PPT entries but can be started either as an STC or a Batch job are we saying that if CICS is started via Batch, as some installations do, that the PPT entry is not relevant. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
PLI and CICS Symblic Map addressability
Hi I am not sure whether this is a CICS issues, a PLI Issue or just general ignorance on my part. I have written a suite of programs in COBOL for use with a CICS Command Level class and am now attempting to convert them so that I have a PLI version of the programs. Focusing on one of the programs I find that it compiles with COND CODE 0004 and the W-level message states: IBM1085I W 46.0BMSMAPBR may be uninitialized when used. Initially I ignored this and ran the transaction which promptly abended AEYD indicating that an attempted was being made to use inaccessible storage. I have attempted to Google for a resolution, and looked in both the PLI and CICS manuals but am not making much headway. The symbolic map shows that M100MNUI is BASED on BMSMAPBR. I had assumed that BMSMAPBR would be populated at the point of use, but this looks like an incorrect assumption. I would appreciate guidance on what may need to be done to ensure that BMSMAPBR pointed to the correct storage location. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: PLI and CICS Symblic Map addressability
Hi Sorry to have raised this and thanks in anticipation but my issue is resolve via a combination of ALLOCATE with SET. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Realtional Development and Test (RDT) aka z/OS on a PC
HI snippet You are not entitled to download ptfs or any other type of maintenance. Never mind that it would be hard to install that maintenance on that ADCD system, since ADCD comes on crammed-to-the-gills mod3 DASD. While all libraries are set up to allow extents, there isn't any room left to extent the library to. And they're all 99-100% used as far as tracks go. /snippet I an not in a position to comment of the availability of maintenance for ADCD as I took a policy decision to run as is and only do either fill system or product upgrades as and when they were available. However the above snippet is somewhat jaundiced in respect of disk size. Our z/OS 1.13 ADCD system has a mix of disks with either 50085 tracks or 150,255 tracks. The system disks are mostly of the former size, although some have odd sizes, i.e. slightly less than or more than 50085 tracks. The larger size disks are our own data disks. Not all system disks are full some have a third to a half spare capacity. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: To use wildcard characters in JCL
Hi Rajesh Scheduling products are not my area of expertise but I do recall that they have symbol substitution capabilities ahead of job submission, and I think date and time options fall within their realm. If this is the case and this is a production job it may be worth talking to the Scheduling Team about what any product you have may do for you, it should negate any need for code in any language if my memories are accurate. Note that others have pointed out that wildcards are not pertinent to JCL, and in fact is an incorrect term as wildcard is generally associated with some form of filter process, whereas your require appears to be variable substitution within a DD Statement for which the correct term would be symbols (or in the IBM JCL manual Symbol Parameters) Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: OPEN not filling in DCBBLKSI for RECFM=U data set
Hi I am afraid that reading the JFCB to determine the BLKSIZE is unlikely to work if the DD Statement doesn't have a BLKSIZE parameter coded. Remember the merge order for OPEN is program, DD Statement, and DSCB. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: OPEN not filling in DCBBLKSI for RECFM=U data set
Hi It would appear that open does complete the DCBBLKSI field, or it does on z/OS 1.13 when the following code is executed. LAR10,TESTFILEMAKE DCB USING IHADCB,R10 ADDRESSABLE OPEN (CAPLIST,OUTPUT,TESTFILE,INPUT) LHR15,DCBBLKSI CVD R15,DWORD UNPK PBLKSI,DWORD+5(3) PRINT OIPBLKSI+4,X'F0'BLKSIZE PUT CAPLIST,CAPLINE CLOSE (CAPLIST,,TESTFILE) CLOSE BOTH FILES. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: 0C4 from TSOEXEC IEBCOMPR
Hi Dave, Acknowledging that an example for comparing two PDSEs may existing in the z/OS V1R12.0 DFSMSdfp Utilities (SC26-7414-07) manual. When I last looked at IEBCOMPR in the utilities manual, I notice the very first paragraph is Recommendation: Use the SuperC utility instead of IEBCOMPR. SuperC is part of ISPF/PDF and the High Level Assembler Toolkit Feature. SuperC can be processed in the foreground as well as in batch and its report is more useful. IEBCOMPR was never brilliant as it would stop after 10 consecutive errors, which is easily induced if a record is deleted from a file. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: OC4 from TSOEXEC IEBCOMPR
Hi Dave, Following on from the earlier comments the attached is a REXX snippet I used for the ISPF Search facility but a similar approach should work with compare I would have thought. /* REXX */ /* Allocate the library to be searched - NEWDD */ ALLOC DA('VERE301.LOADLIB') SHR F(NEWDD) /* Allocate the search listing - OUTDD */ ALLOC NEW DELETE F(OUTDD) LRECL(133) BLKSIZE(1330) RECFM(F B), SPACE(1 1) TRACKS DA(SEARCH.LIST) /* Build the search arguments on - SYSIN */ srcha.0 = 2 srcha.1 = SRCHFOR '2004' srcha.2 = SELECT COB00 ALLOC NEW DELETE F(SYSIN) LRECL(80) BLKSIZE(800) RECFM(F B), SPACE(1 1) TRACKS EXECIO * DISKW SYSIN (STEM srcha. FINIS /* Execute Search-For ISPF 3.14 */ CALL *(ISRSUPC) 'SRCHCMP,''ANYC''' /* View search results */ Address ISPEXEC VIEW DATASET(SEARCH.LIST) Exit Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: z/OS and Metasploit
Hi Peter/Wayne Irrespective of what Userid was used or not perhaps we could agree that the system 'hacked' was not a typical z/OS System but one provided by IBM for bone fide developers. The Userid ADCDMST may not have been used to gain access but if it is the owner of the file, which seems likely, then the implication is that the system itself is one provide for IBM PartnerWorld for Developers, and usually runs in a zPDT environment. If it is running in a zPDT environment is implies that the ISV has not nailed down their security. Alternatively it could be an unauthorised copy running on Hercules so is open to any speculation. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
z/OS, z/VM , z/VSE Training and number of delegates
Hi The recent comments in the Trainer's Friend closure posting about courses not being run because of too few delegates is interesting. I know of one training provider who does runs courses for as few as 1 delegate. (It is always hoped that more delegates would sign up before the actual course runs, but the provide advertises that a public course is not cancelled if it has only one delegate.) I continue to support this provider in my capacity as an itinerant instructor. That said I acknowledge that there are issues. The above is not viable if there is an insistence on classroom delivery and either party has to travel a great distance. Applications such as GoToMyMeeting and WebEx do help eliminate the physical travel but do not completely negate the cost. Obviously use of electronic delivery in any form also requires discipline on the part of all the attendees and a commitment to the process and this may sometimes be lacking. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: CICS Transaction 'QKVA' is not recognized
HI Graham, Both Lizette and Wayne have correctly indicated that doing a CEDA INSTALL as prior to issuing that command the transaction definition is defined within the CSD but not available to CICS for use. Additionally it may be worth knowing that INSTALL is not possible via DFHCSDUP. If CICS is started with a WARM or EMERGENCY start the CSD is not used to refresh the resource definitions within CICS, it uses the CICS Global Catalogue instead. If an INITIAL or COLD start is performed it will use the CSD. Doing the INSTALL via CEDA is fine for WARM/EMERGENCY situations but to cater for INITIAL/COLD if a new LIST has been created it is worth checking the GRPLIST parameter in the SIT to ensure that the list is defined to CICS start-up. The SIT can be located by checking the member name in the data set defined via the SYSIN DD statement in the CICS step of the start-up JCL . Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Compile COBOL/CICS pgms on z/OS problem
Hi Graham, I believe in attempting to address the SIZE problem within the compile listing a confusion between valid EXEC statement keywords and symbolic parameters has arisen. Try the following which separates the two, by not using the keyword PARM but taking advantage of the embedded symbol CNLPARM. Note that in using CBLPARM it is necessary to include all the options already specified within the procedure. //ACICSP01 JOB (CONRAD-C),'IBMUSE2',CLASS=A,MSGCLASS=0,MSGLEVEL=(1,1) //MYLIBS JCLLIB ORDER=(DFH420.CICS.SDFHPROC) //QKVSP01 EXEC PROC=DFHZITCL, //CBLPARM=('NODYNAM,LIB,RENT,SIZE(4000K),CICS(''COBOL2'')') //INDEX=DFH420.CICS, //LNGPRFX=IGY420, //DSCTLIB=IBMUSE2.QKVS, //PROGLIB=VENDOR.LINKLIB.SECOND //COBOL.SYSIN DD DSN=IBMUSE2.QKVS(QKVSP01),DISP=SHR //LKED.SYSLMOD DD DSN=VENDOR.LINKLIB.SECOND(QKVSP01),DISP=SHR An even easier alternative would be to include a CBL SIZE(4000K) statement as the first source code line which will achieve the same effect without modification to the JCL. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Run a REXX from JCL stream
Hi Graham, Despite being Sunday and knowing that you already have a solution I thought I would add the following to demonstrate that if there is a need to run REXX inline, it can be done within a single step and using a sequential data set to hold the rexx code if it is remembered that IDCAMS commands can be driven directly from TSO, as in: //ADCDMSTB JOB CLASS=A,MSGCLASS=X,NOTIFY=SYSUID //S0010EXEC PGM=IKJEFT01 //SYSTSPRT DD SYSOUT=* //SYSEXEC DD UNIT=SYSDA,SPACE=(80,(100,50)),AVGREC=U,LRECL=80, // BLKSIZE=27920,RECFM=FB,DSN=ADCDMST.SEQ.REXX, // DISP=(,DELETE) //SYSTSIN DD * REPRO INFILE(REXXCODE),OUTFILE(SYSEXEC) EXEC 'ADCDMST.SEQ.REXX' EXEC //REXXCODE DD *,DLM='?@' /* REXX batch inline demo */ Say 'Welcome to REXX' Exit 0 ?@ Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: DB2 Connect issue
Hi William, I cannot help with the exact nature of the issue your people face but I can confirm that DALLAS9 is in SYSIBM.LOCATIONs as proved by SELECT * FROM SYSIBM.LOCATIONS WHERE SUBSTR(LOCATION,1,6) = 'DALLAS' A similar query against SYSIBM.SYSTABLES, SYSIBM.SYSTABLESPACE and SYSIBM.SYSDATABASE gave a 0 hit count. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
PDS Processing in REXX
Hi Graham, Taking your questions in order: 1 - Deleting a data set PARA1: F1 = 'ENCORE.CBL.SOURCE' DELETE 'F1' /* TRYING TO GET MY HEAD AROUND THESE QUOTE'Y THINGS */ RC_REASON = 'DELETE 'F1; CALL RETCODE RETURN This code, using the TSO DELETE command will do the job without the need to. pre-allocate. The double quotes are there to ensure that the REXX interpreter does not attempt to execute the DELETE command. The single quotes are there to inhibit TSO prefix, which if turned on would prefix the data set name in variable F1 with the prefix held in the TSO PROFILE. I notice that in RETCODE it is RC that is tested no RC_REASON. To be safe it would be better to test RC_REASON in RETCODE in case RC has been changed before arrival. 2 - Allocating the data set As Elardus mentioned I would use the built-in Function SYSDSN to check data set status before attempting the allocate. As far as the allocate goes the ultimate disposition of the data set is missing. With only NEW coded the data set will be created, then deleted. To be kept it would be better to add CATALOG. SYSDSN will provide a textual response which will help understand the state of the data set, i.e. it may be allocated but ENQ'd by another task. 3 - Reading the member The issue with file processing is how much data is being processed. One thing for certain is that EXECIO 1 is the most inefficient method as the EXECIO code will be entered for each and every record. If the member is small then think about EXECIO * which will read all the members in one go, which will avoid the need for the loop, and allow the file to be closed at the same time by the addition of FINIS to the EXECIO options; i.e. EXECIO * DISKR INFILE1 (FINIS Note that EXECIO returns RC = 2 at end-of-file. 4 - I/O Processing differences. It could be argued that I/O processing differences between TSO and ooREXX are a strength rather than a weakness. It is this difference which allows REXX to be so portable. That said z/VM REXX provides two I/O processing methods one using EXECIO and the other using stream commands like ooREXX. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Colossus
Hi, In the posting about Fortran, John Gilmore rightly paid tribute to Alan Turing and John von Neumann. When discussing Colossus however the name of Tommy Flowers is often forgotten which is a shame as it was he who turned the theory into practical reality by actually building the beast. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Creating a GDG Base with NOSCRATCH in an SMS pool
Hi Lizette, In respect of your questions: Is it possible to use DEF GDG (name(xyaz) NOSCRATCH NOPURGE) in an SMS pool. Is it possible that SMS will honor the NOSCRACH and allow uncataloged GDG datasets in the POOL? In the JCL course I deliver I specifically get the students to create a GDG Base with a LIMIT of together with the SCRATCH option, and then generate 4 entries. I then get them to amend the base to NOSCRATCH, and then separately get the to change the LIMIT from 4 to 2. If they list the GDG using LISTC ENT for the base they will only see 2 associations under the base, however if the use LISTC LVL against the base they see both the associated entries and two data sets with GDG like names but which are marked ROLLED-OFF rather than ACTIVE in the STATUS field. I do mot believe the above would be evident from an ISPF 3.4 display as it would logically show all catalogued entries. If ISPF 3.4 is showing a base entry with a volume of all ?? and no similarly named entries then I would conclude that the base was empty, but the ROLL-OFF status would not show. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN