was prepared before performing the
stores.
I think the window is so small that even under heavy usage, you would only see
an error every couple of months but it does exist. I think TCB2 must also use
the PLO compare and load to avoid this situation.
Thanks for the great information, Jon Perry
inframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
>Behalf Of Jon Perryman
>Sent: Monday, November 04, 2013 2:42 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: Serialization without Enque
>
>Thanks for pointing out that it's required to do the PLO COMPARE against the
and FETCH. In Kenneth's example where he uses PLO to save
64 bit addresses (which is 2 words), he can't use LG to reference the 64 bit
address otherwise he risks using high and low register values that do not
match. Is that correct?
Jon Perryman.
>__
their end user programming
languages.
Jon Perryman.
>
> From: John Gilmore
>
>
>
>His riposte---It is not responsive---to my last post employs a
>rhetorical device that wa
Thanks Binyamin. Also a great example but it brings me to another question.
What is the advantage of using PLO compare and fetch? Is it just saving CPU
time in the case where the counter has changed? Is there another advantage that
I'm not thinking about?
Jon Per
Thanks Kenneth. Excellent example. I didn't consider that the load for the
counter must be first to cause the serialization.
Jon Perryman.
>
> From: Kenneth Wilkerson
>
>
>
>I have used PLO almost exclusively for serialization in multi-a
one would probably steal it.
Jon Perryman.
>
> From: Robert A. Rosenberg
>
>
>At 21:16 + on 10/30/2013, DASDBILL2 wrote about Re: Interesting? How
>_compilers_ are compromising applicati:
>
>> At first, aggressive drivers drove faste
contiguous storage, there is not any method that will guarantee the 3 values
are consistent with the others. A counter as suggested by Peter Relson won't
help either for this same reason.
I can't think of a situation where PLO CSDST is useful. Can anyone describe a
situation where it is u
I think Itschak is saying that SRB's can't do I/O, therefore they can't write
files to embed a virus or read confidential data. I think he's under the
impression that SRB's can't get access to everything they desire.
Jon Perryman.
>
n of our code is now being
consider SRB eligible. Some of that code run's under TCB's that never had
authorization where end users could never abuse it will now be a potential
exposure.
Proverbial saying: can't see the forest for the tree's.
Jon Perryman
>___
sider that you can easily get
access through a coffee shop.
If this is true, then just stop ironing your clothes to avoid the risk. ;) I
couldn't resist.
Jon Perryman.
>
> From: efinnell15
>
>
>BBC News - Russia: Hidden chips '
key 0. This is exactly where a hacker would want to
be in order to hide their tracks and do devious things without getting caught.
Jon Perryman.
>
> From: Itschak Mugzach
>
>
>SRB mode is only needed if you use IBM's supplied API to zIIP. WLM
e to take
advantage of the authorized state. Something as simple as overlaying storage
could create a security exposure and give them access to the authorized state.
Jon Perryman.
- Original Message -
> From: Peter Relson
>
>> SRB's are a big security exposure s
As a last resort, a GRS latch could be used.
Jon Perryman.
>
> From: Tony Harminc
>
>
>
>On 1 November 2013 16:22, Donald Likens wrote:
>> I have a situation where I need to serialize processing and cannot use CDS
>> because t
less experienced
avoid posting for fear of making a mistake.
Thanks Shmuel doubt that I would make such a mistake.
Jon Perryman..
>
> From: Shmuel Metz (Seymour J.)
>
>
>
>In <5161261496916553.wa.paulgboulderaim@listserv.ua.edu>, o
this, they are discouraged from allowing it because their employee's could
easily write programs to access anything they wanted.
Jon Perryman.
>
> From: Clark Morris
>
>
>
>>6. zIIP is first restricted by requiring programs run under
Since zVM supports zLinux, it makes sense that it allows IFL. Is there a userid
option that allows the usage of IFL processors? Or do they use some other
method?
Does CMS also use that instruction to ensure it runs on a CP?
Jon Perryman.
>
> From: Mar
I think it will work in a similar manner as IEBGENER RECFM=U
support.
Jon Perryman.
>
> From: Thomas Berg
>
>
>> -Original Message-
>> Behalf Of nitz-...@gmx.net
>>
>> > It's certainly possible to have DSORG=
he product more
expensive to run. If this overhead makes the software significantly more
expensive, then vendors will allow both methods. For other vendors, this may be
insignificant (e.g. using a single SRB for the life of the product may be
possible which would eliminate a lot of the overh
clave. Vendors
must sign a non-disclosure agreement about this special enclave. I suspect that
IBM includes some sort of usage clause in that agreement.
Jon Perryman
>
> From: Scott Ford
>
>
>After reading this thread, I understand the need
more. I thought that LPAR management doesn't
allow you to specify specific CPU's. I thought you simply specified xx% of x
IFL CPU's and xx% of 2 CP CPU's.
As for adding / reconfiguring CPU's, I think IBM can do this remotely with a
dialup to your machine.
Jon Perry
at you want.
As for other commands, you can run your own tests to find out how you can use
them.
Jon Perryman.
- Original Message -
> From: Paul Gilmartin
> To: IBM-MAIN@LISTSERV.UA.EDU
> Cc:
> Sent: Saturday, October 26, 2013 2:13 PM
> Subject: Re: GDG question
>
>
G,DELETE) deletes when there is an abend otherwise it catalogs
the new version instantaneously without interrupting current users. There's no
need to rename the dataset. IBM could easily implement IDCAM's ALTER ALIAS to
serve this purpose but GDG's have served us so well fo
P=MOD is not helping. DISP=MOD only appends data
to the end of a dataset for GDG's (does not create a new dataset as with
standard datasets)., it's only benefit for GDG's would be if multiple OPEN /
CLOSE occur.
Jon Perryman
- Original Message -
> From: Phil Smith
>
nn DD.
Jon Perryman.
>
> From: Paul Gilmartin
>
>
>
>On 2013-10-23 10:55, Thomas Berg wrote:
>>> -Original Message-
>>> From: Paul Gilmartin
>>> Sent: Wednesday, October 23, 2013 6:45 PM
>>>
>>>
d theoretically use the DDNAMES in the variables for TSO commands
but I always use TSO ALLOC for TSO functionality. The advantage of LMINIT is
the dynamic DD name generated avoids possible collisions.
Jon Perryman.
>
> From: "Hansen, Dave L - Eagan,
correctly).
I don't think that compiling your programs was a true recommendation. I think
the attitude was that since you had the compiler, then you might as well
compile your exec's too.
Jon Perryman.
>
> From: Scott Ford
>
>
>Ron:
>The
f the command.
You will see the issuer of the command in SYSLOG which in this case is some
internal process.
Jon Perryman.
>
> From: גדי בן אבי
>To: IBM-MAIN@LISTSERV.UA.EDU
>Sent: Tuesday, October 22, 2013 1:21 AM
>Subject: Command output not
provide full
functionality. Wait state codes without messages are typically a last resort
situation.
SYS1.LPALIB was probably after the coding error which would have made critical
LPA programs unavailable.
Jon Perryman.
>
> From: saurabh khandelwal
>
&g
gut feeling is that it's not referencing the correct
area and that it is actually invalid. Or maybe the area is not aligned with the
passed area. I don't think it's using the STOKEN you think it's using.
Jon Perryman.
>
> From: Ken
are messages that someone felt
important to display but will not be seen. Why did they go to the effort of
creating these messages?
Jon Perryman..
>
> From: John Gilmore
>
>
>The ascending severity hierarchy is
>
>INFO < WARNING < ERR
You are correct but it's very unlikely to be fixed.
The default is FLAG(WARNING) so why does IBM even bother producing
informational messages that are conditionally displayed. Does anyone run
FLAG(INFO)? Is there anything useful produced?
Jon Per
FLAG does not suppress informational messages (BLS18064I No symbols found). You
may feel it should have been a warning but IBM classified it as informational.
Jon Perryman.
>
> From: Don Poitras
>
>
>From the book:
>
>The FLAG severi
*/
"DROPSYM X:Y NOSUMMARY" /* drop anything from X to Y */
Jon Perryman.
From: "Hardee, Chuck"
>To: IBM-MAIN@LISTSERV.UA.EDU
>Sent: Friday, October 18, 2013 7:57 AM
>Subject: Re: An IPCS question
>
>
>Thanks Jon, this is the best explanation I've heard so
at doesn't support FLAG( ),
PRINT/NOPRINT and TERMINAL/NOTERMINAL.
Jon Perryman.
>
> From: "Hardee, Chuck"
>
>
>
>I see no reason why one should have to make a DROPSYM conditional as you
>suggest.
>
>You issue the comm
You need to eliminate the dropsym if it does not exist:
address IPCS
"EVALSYM "
if rc = 0 then
"DROPSYM "
Jon Perryman
>
> From: "Hardee, Chuck"
>To: IBM-MAIN@LISTSERV.UA.EDU
>Sent: Thursday, October 17
type of error.
Capture a dump from the abend and determine which product is abending. The
hardware seems to be reporting a valid error. The software doesn't abend with
unrecoverable I/O error. Instead, it seems to continue happily using the bad
data.
Jon Per
ht be using.
1. You could rename /etc/resolve.cnf so that it does not exist and falls thru.
2. You could have users omit DD SYSTCPD to fall thru
3. You could rename SYS1.TCPPARMS(TCPDATA) to fall thru.
4. You could use TCPIP.TCPIP.DATA as your single TCPDATA so that users don't
need to know abo
There are situations where LPA module names are not displayed but that is
usually when a module was not referenced thru LINK or LOAD.
Jon Perryman.
>
> From: Binyamin Dissen
>
>
>
>On Wed, 16 Oct 2013 07:02:10 -0700 Jon Perryman wrote:
re implementing
GLOBALTCPIPDATA) has either used TCPIP.TCPIP.DATA and far less frequently
SYS1.TCPPARMS. Has anyone tried renaming both of these to see if it uses TCPIP
SYSTCPD?
Jon Perryman.
>
> From: David G. Schlecht
>
>
>
>I must have
had not accessed page 0, it's
likely that storage would have been overlayed. At this point, you can cause
everyone grief.
Jon Perryman.
>
> From: Micheal Butz
>
>
>
>When the PSW key bits 8 - 11 don't match the 4K storage key
>
Since module name shows UNKNOWN, the program has probably taken a wild branch
into some valid storage (unless he's not using standard program load).
Jon Perryman.
>
> From: Binyamin Dissen
>
>
>Find out which routine is at 0438CBEC
>
>
doesn't fix the problem then you might have a storage overlay causing
the problem. I suggest adding "J PROG_RETURN". If should run fine if inserted
after the STM. Keep moving it until you isolate the instruction that is causing
the problem. From there, you can see what storage is po
tion where the common
TCPDATA can't be used.
If a user reports a problem with TCP, then have them temporarily add a SYSTCPD
to the common TCPDATA as verification they are using the correct TCPDATA (note
that UNIX for z/OS programs have a couple of situations where SYSTCP
Are you saying that DD SYSTCPD pointing to TCPIP.TCPIP.DATA or SYS1.TCPPARM
fixes your problem? These datasets should be picked up without a SYSTCPD DD.
I'm confused why you feel using these requires the resolver.
Jon Perryman.
>
> From: Rob Schram
Is there a reason you can't update TCPIP.TCPIP.DATA or SYS1.TCPPARMS with the
change?
Jon Perryman.
>
> From: David G. Schlecht
>
>
>We have a solution, or at least a workaround. We'll continue to add SYSTCPD to
>every job
dinates to z/OS and z/OS
can't reach them because of your network setup.
You could use NSLOOKUP with the same name servers and see how it responds.
Jon Perryman
>
> From: "esst...@juno.com"
>
>
>
>The issue I experienced, was tha
the system log. Security is difficult to create for it.
My suggest is to use ISPF variables &ZUSER and &ZSCREEN. You don't need an
exec. Just modify the command to PARM(SET CONSOLE &ZUSER.&ZSCREEN)
Jon Perryman.
>
> From: Yashshri
z/UNIX and z/OS have a different search order in locating the TCPIP.DATA that
is used. In your case, you are maintaining 2 different files. Look at the IP
Configuration Guide and search for TCPIP.DATA (I think). You should find a
section that describes the search order.
Jon Perryman
Abend diagnostics and abend recovery are equally important in abend recovery.
Implementing both is certainly recommended. This is simply a question about
obtaining dumps as part of the diagnostics.
Jon Perryman
>
> From: John Gilmore
>
>
>The
Are there situations where
SETRP won't work versus SDUMPX?
Jon Perryman.
>
> From: Peter Relson
>
>
>As with any recovery routine (including an FRR), as Binyamin noted, you
>identify what to dump by requesting the dump (with SDUMPX) wi
The drawback to HSM migrate is that the datasets are migrated until the next
use. If the use of any of these datasets can't tolerate the recall delay, then
you will need to ensure it get's recalled before that time.
Jon Perryman.
>
> F
For official character conversion in assembler, see the IBM manual "z/OS
Unicode Services User's Guide and Reference" which documents use of their
unicode services.
Jon Perryman.
>
> From: Steve Comstock
>
>
>Actually, COBOL ha
I would try using DFDSS to move datasets. You would specify the origin volume
and recatalog. I don't have a system to try this on so I can't say it will
work. I would expect that IBM took these indirect volumes into account.
Jon Perryman.
>
If you have the "ISPF Productivity Toolkit'
http://www.redbooks.ibm.com/abstracts/tips0936.html installed, then you can use
it's batch utility.
Alternatively and free, it would very easy to write a REXX exec using ISPEXEC
LMMOVE and running a batch ISPF job
of these numbers comes close to
reflecting a true comparison.
Jon Perryman
>
> From: Anne & Lynn Wheeler
>
>
>
>previously a 1st generation e5-2600 at 527BIPS is the equivalent of 10.5
>max configured z196 80 processor systems.
&g
on as z/OS. So far, it seems to be doing well.
Jon Perryman.
>
> From: David Crayford
>To: IBM-MAIN@LISTSERV.UA.EDU
>Sent: Saturday, September 14, 2013 6:22 AM
>Subject: Re: Mainframe On Cloud
>
>
>Are there any real world SaaS offeri
I asked out of curiosity. I wanted to read how it worked. I wondered if it is
really fast and how it avoided a deadly embrace.
Jon Perryman.
- Original Message -
> From: Elardus Engelbrecht
>
> Jon Perryman wrote:
>
>> Is there an instruction that waits for all C
help. Since the SSI is called regularly,
this probably is not be a recursive abend.
Jon Perryman.
>
> From: mf db
>
>Apology for the confusion, Recently in one of my test system I added a
>subsystem to SSI and i have started experiencing recursiv
Is there an instruction that waits for all CPU's to be enabled at least once?
Jon Perryman.
- Original Message -
> From: Jim Mulder
>
> CPU Offline processing turns off the CSD alive bit, and zeros the
> PCCAVT and LCCAVT entries for the CPU that is going offline
the 01 section (not by the program that
called his program).
Jon Perryman.
- Original Message -
> From: John McKown
>
> The problem is how do I describe this to a COBOL programmer who just
> doesn't "get it". He expects COBOL to _not_ pad the "non
our program overlays the wrong storage, then it can cause
abends.
Great care must be taken in programs that run from the SSI. The SSI runs all
the time and in all address spaces. If something bad happens, you could be
IPL'ing your system.
Jon Perryman..
>
I heard that the NSA proposed solution for the snowden problem is to require 2
people to access sensitive information. I wonder if the logon screens will
require dual userid's.
Jon Perryman.
>
> From: Clark Morris
>
>>Sysprogs, even di
the line or in a specific subpool. How about unintentional
exposures by storage overlay errors. It's impossible to find every exposure.
Jon Perryman.
>
> From: Ray Overby
>
>
>
>There is a software product called z/Assure Vulnera
;t
exposed you in ways you did not consider (e.g. from home). You trust they will
be suspicious when someone calls saying they are one of your software vendors.
Jon Perryman.
>
> From: Tom Marchant
>
>
>
>On Sun, 8 Sep 2013 20:37:14 -0700, J
Data area's says that serialization is disablement. Does this mean you need to
run disabled or lock the CPU associated with the PCCA in question?
Jon Perryman.
>
> From: Micheal Butz
>To: IBM-MAIN@LISTSERV.UA.EDU
>Sent: Sunday, Septembe
some users but not others. APF libraries are
limited and access restricted but some users must have access. Sysprogs get
more access to system datasets when installing new releases and updates. We
consider these to be secure but there are ways you can get at them with luck,
persistence
WOW. How did it use drum as main memmory? Did it have like 1K of real memory
and have hardware to move from drum upon address resolution? Or is drum a
similar architecture to ram?
Jon Perryman.
>
> From: Shmuel Metz (Seymour J.)
>
>
>
>
If you have an automation product, then you can use it to take the action
needed. You could trigger off of the job submitted rate or the JES number of
lines exceeded message. You could place jobs on hold.
Jon Perryman.
>
> From: Miklos Szigetvari
>
601 - 669 of 669 matches
Mail list logo