You did not get an error message so far. Everything seems fine from z/OS
point of view. You need to wait until the remote task will
finish...everything else is up to the remote system admin responsible for
the shell script.
Cheers
Michael
Von:Ron Thomas ron5...@gmail.com
An:
In my environment, your program compiles fine. Well, I changed the square
brackets in main definition and added the catches for IOException and
FilenotfoundExceptionAh, and I change the negation sign to !. Are you
sure about CCSID (including tagging) of files, locale and emulation?
Cheers
I do not agree to Paul's answer. flockfile() only relates to file
descriptors. Opening another file descriptor for the same file will not be
in scope of that particular lock. Instead you might consider BPX1FCT with
the BPXYBRLK mapping structure. However, as found in the important note
of
Stephen,
you wrote syslog, -- I write SYSLOG in majuscel as seen in IBM manuals
as abbrevation for system log. You did not ask for OPERLOG, hardcopy
log, operator console, master console etc (I am not sure about
permutation of minuscel and majuscel). Then, SYSLOG as described in MVS
Planning:
sysbinlog was an SQL table created by StuxNET worm/virus/malicious code.
Part of the virus code was stored in that table. There is an IBM document
from 2010 available: An inside look at Stuxnet.
Cheers
Michael
Von:Miklos Szigetvari miklos.szigetv...@isis-papyrus.com
An:
for me, options PPONLY and SHOWM worked:
//COMPILE EXEC PGM=CCNDRVR,
//PARM=('/CXX OPTFILE(DD:CCOPT) PPONLY SHOWM')
output is written to DD SYSUT10
see 4.107 of XL C/C++ Users Guide.
Cheers
Michael
Von:Charles Mills charl...@mcn.org
An: IBM-MAIN@bama.ua.edu
Datum:
So far, I did not see answers. So I try to add my 2 cents.
what are the systems that use XML? ... Well, I don't know for sure. But I
would say the common suspects: Windows, Linux, AIX as well as smart phones
and other manager tamagoccies. The one I know is z/OS. But not only since
V1R11: I was
I think yes, the answer is simple by changing some parameters in the TCPIP
options file. To be precise: your objective of limiting access to IP
addresses or ports can be achieved with NETACCESS statements. Just name
the inbound and outbound networks, ports etc. and then set up proper
SERVAUTH
Of course you can filter with DFSORT regarding that particular string.
But I think it is better to first make up mind which SMF records are
expected. Some examples: 14/15 sounds good, may be 17 and the range around
60? Would you expect the data set name to appear in records of type 100
and
A good starting point should be ALLOCxx member of SYS1.PARMLIB. There you
might find a parameter like VOLUME_MNT POLICY(WTOR). Then ask your
operating staff about how they deal with message IEF455D -- each and every
tape mount is requested by this message and has to be approved by
operator. I
I need these prerequisites to use eMCS console from REXX
- RACF defined user has (meaningfull) OPERPARM and TSO segments. UADS
instead of TSO segment does not work for me.
- READ to CONSOLE profile in class TSOAUTH
- READ to MVS.MCSOPER.CONSOLE-NAME profile in class OPERCMDS
- and of course
As far as I can judge: yes, you are getting older all day long -- and I
hope you will continue for a very long time. Come along for a stay, then
we can get older together for a couple of days.
One day I had a really big problem. Of course, it was my fault, I had
forget some details and been
path information to be
updated neither My ID has any .profile with the java path updated.
Can anyone suggest from where these paths are getting reflected when I do
:
echo $PATH.
Regards,
Jags
On Wed, Sep 28, 2011 at 10:46 AM, Michael Klaeschen
michael.klaesc...@deutscherring.de wrote:
From my
...in my personal opinion all and every system programmer should ponder
one cold night on the subtle differences between NL, CR and LF. There are
countless ways of combining these, mixing up with unwarily choosen CCSID
translation tables (especially regarding DBCS / SBCS issues) and mangling
From my experience, you can install more than one Java at a time. I always
did with SMP/E - no hassle. Differentiation is through mount points in HFS
beneath '/usr/lpp/java'. For example, you can have J1.4 , J5.0 , J5.0_64 ,
J6.0 and J6.0_64 in '/usr/lpp/java'. Starting with Java 5, there was
You write about ESS battery and power drip. Therefore I would not expect
problems with IOCDS or CPC setup. Instead there seems to be a problem with
the RACF data base volumes. Description for IRR418I reads two more
possible causes next to RACF product not enabled. You might want to
review ESS
Hi,
with code signing, you can apply a signature to your programs. Compare
chapter 10 of RACF Security Admin Guide. The signature is invalidated by
any kind of modification to the program (e.g. by a virus). A program is
rejected from being loaded in case an invalid signature is found.
David,
- Compressed text is clear text compared to encrypted text. And encryption
software should be ubiquitary; z/OS comes with ftp encryption more or less
out of the box, AT-TLS.
- Success of compression depends on structure of source. Plain text files
like PARMLIB members should give very
are you able to connect to your TN3270 service (I do not see in D A,L
output, but may be you have different STC name? Or are you doing VTAM
routing to other MVS -- how is your infrastructure set up?) and just
cannot log on to TSO? Then, I would assume, your TCPIP is set up correct
and I
You did not tell about RECFM. One example with two input files of PO/FB/80
and PS/VB/210, result is written to PS/FB/210.
Cheers
Michael
//STEP0EXEC PGM=IEFBR14
//SORTOUT DD DSN=HLQ.TEST.OUTPUT.FB210,
//DISP=(NEW,CATLG,DELETE),
//
According to chapter 7.5.2 of Unix Planning Guide, you have to IPL with
new sysplex root -- take care of your mount statements in BPXPRM member.
You can try to manually re-create the symlink links and unmount/mount the
file systems accordingly, of course. But even if this works (which I do
not
Hi,
did you try WHEN(SYSID(Your MVS)) in RACF PERMIT on program control?
Cheers
Michael
Von:Azim Syed azimsi...@gmail.com
An: IBM-MAIN@bama.ua.edu
Datum: 2011-06-27 08:16
Betreff:Run Time and Compiler Libs.
Gesendet von: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
Jan,
the interesting part is, what protocol the jboss application is
offering. As a starting point I recommend some books on distributed
computing, for instance Andrew Tanenbaum is sort of well known. Also a
good source of information should be z/OS V1R12.0 Comm Svr: IP Sockets
Application
One point is, that all access to the physical file system has to be
coordinated by the owning system. So when the task is executing on the
owning system then no problem. But when it execs on another system, then
there will be some overhead in communicating (literature reads about
function
Fuddin,
I would say, the data set was allocated before TEMPDSN was activated.
Recommendation is to IPL after activation, did you? I can imagine problems
together with rolling IPL along the Sysplex in a HA environment. So check
whether you need to restart certain applications independent from
See chapter 16.13.2 of MVS JCL Reference. IBM's explanation there does not
differ between 0K and 0M. However, I think you can intercept with a JES
exit and may be even IEALIMIT/IEFUSI.
Cheers
Michael
Von:Alvaro Guirao Lopez alvarogui...@gmail.com
An: IBM-MAIN@bama.ua.edu
Datum:
Stephen,
see chapter 5 of the Unix Planning Guide. HFS and zFS still need to be
stated within MOUNT parameter. But basically they are ignored. I assume,
for the newer functions like ALTROOT, IBM just omitted this TYPE-option.
Cheers
Michael
Von:Dr. Stephen Fedtke
...should work if you have not too old 3592 units. They can use an
encryption key manager EKM for the cipher phrase. This is an STC in z/OS.
Try GA76-0418 as a starting point.
Cheers
Michael
Stephen Y Odo stephenyodo.li...@gmail.com
Gesendet von: IBM Mainframe Discussion List
my two cents:
(a) is the SDSF API available in Java or is it just JNI around some C or
even REXX functions?
- no words, eh -
(b) what has to be done?
# computing like numerical maths (in addition one could differ, e.g.
between integer and floating point)
-- Java has neat facilities dealing
Hello,
today I tried linking a successfully compiled C++ program but got message
EDC4052 from cataloged procedure SYS1.PROCLIB(CBCL) in PLKED.SYSPRINT
DD. Searching IBM Bookmanager for this message did not show even one
result. Searching google gave a hint to PQ68700. But when following this
Monika,
To me your assembler program looks very similar like REXX code. Whatever,
there are two things to consider, but both deal with the vast overhead of
creating the ASID as you mentioned and are independent of actual
implementation:
(a) Daemon vs. server: A daemon uses fork() callable
...expect the unexpected, may be the user jobs are just needing that
duration (WAD=works as designed). For instance, are they doing
sophisticated maths, like crash test simulation, climate forecasts or live
insurance modelling? I think, also waiting for tape mounts is shown as
EXECUTION in
IEC143I with system completion code 213, return code FC is clearly
explained in MVS System Messages, Vol7: Open for HFS file which is not
existing. Further reading: For return code FC, change the file name or
create the file.
But how comes, your file gets lost on the way? You allocated the
It's about dynamic allocation. DAIR return code 12 is explained in TSO/E
Programming Services:
An error occurred in dynamic allocation; the dynamic allocation error code
is stored in the DARC field of the DAIR parameter block.
DARC 970C indicates an SMS reason code (97xx) and is described in
Hi,
we have a VSAM linear data set which is allocated read/write to an ASID.
Now, the extents have to be moved to another VolSer without affecting the
ASID. How to do? IDCAMS ALTER ADD/REMOVEVOLUMES or REPRO do not
seem to work for VolSers with allocated extents that are opened.
Thank you,
Ravi, thanks for your reply. I was told a Softek product may provide
this function as part of data migration support. But no, we just have z/OS
and a couple of Redbooks, Whitepapers and the ringing sound of IBM sales
representatives that z means zero downtime. Now we have to move the
You are calling XL C compiler. This one has a configuration file,
typically '/bin/../usr/lpp/cbclib/xlc/etc/xlc.cfg'. Have a look. There,
you'll find the steplib XL C compiler option which is set to NONE by
default. It's your choice: put CCNDRVR into LPA or LNKLST or overwrite XL
C compiler
Hello,
how to set up ITDS (GLDSRV, aka LDAP-Server) to *not* register with
Automatic Restart Manager ARM?
There is an ITDS configuration entry armName which may be used to change
the default ARM element name. Removing armName from PARMLIB results in
registering with ARM under default setting
/* REXX */
VAR.0=2
VAR.1='SOME VALID CHARACTERS'
VAR.2='CONTAINS !ยง$%/ WHICH ARE NOT VALID.'
/* VALID CHARACTERS: A-Z AND 0-9 AND BLANK */
REFERENCE=XRANGE('A','I')!!XRANGE('J','R')!!XRANGE('S','Z')
REFERENCE=REFERENCE!!XRANGE('0','9')
REFERENCE=REFERENCE!!' '
SAY 'REFERENCE IS
Hi,
may be Exit 33 (SSI Data Set Close, Taken for SYSIN, SYSOUT, or internal
reader Close processing) will suit your needs.
Cheers
Michael
Miklos Szigetvari miklos.szigetv...@isis-papyrus.com
Gesendet von: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
14.01.2011 12:08
Bitte
Yes correct, z/OS Unix implements extended USTAR format without limitation
of links whose targets exceed 100 characters or files with names longer
than 255 characters (along with other goodies not widely found in hobby
computing). However, this is z/OS specific to /bin/pax and might not
work
Edward,
where do you store the SMP/E client certificate, RACF key ring or ICSF
token? In the latter case, how do you use it?
Thanks, cheers
Michael
Edward Jaffe edja...@phoenixsoftware.com
Gesendet von: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
10.11.2010 07:32
Bitte antworten an
Hello,
SMP/E receive via ftp works fine with the shop zseries certificate when using
a RACF keyring. Now I would like to use an ICSF tokens instead of the keyring.
For example:
keyring=*TOKEN*/tokenname
certificate=SMPE Client Certificate
in the ORDERSERVER - tag results in message
Bill,
It is client or user decision which protocol type to use, e.g. http,
https, ftp, telnet or whatever. So from my knowledge only way to force
https protocol type is to disable all other services, especially http on
server side. We achieved this by statements (amongst other) 'NormalMode
Erik,
The z/OS V1R10.0 TSO/E Customization reads in chapter 3.2.2 about
limiting TSO user's region size: 1) Logon pre-prompt exit 2) SIZE operand
of LOGON command 3) default region size defined to user (RACF TSO segment
as I assume) and two other. Point 3) seems to be relevant here. The z/OS
Hello,
at startup of ICSF message CSFM122I informs that PKA services were not
enabled. From my understanding PKA settings cannot be changed when no
cryptographic coprocessor is available, e.g. when solely CPACF is active.
So, the message is expected. However, I did not expect it to be
Jim,
have you checked REGION size in RACF TSO segment for IBMUSER? The HFS file
to be edited must fit completely into IBMUSER's TSO ASID.
Cheers
Michael
Jim McAlpine jim.mcalp...@gmail.com
Gesendet von: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
21.05.2010 10:30
Bitte antworten
Jim,
you do not see any messages on the screen, ok. And I agree, you should see
some messages indicating what's missing. Did you look in the JES-spool for
the TSO procedure? I mean check SDSF, e.g. JESMSGLG DD.
Cheers
Michael
Jim McAlpine jim.mcalp...@gmail.com
Gesendet von: IBM Mainframe
Hi Martin,
EIM works fine in our installation. We have DB2 as backend. No problems at
all; smooth setup as described in the manuals.
Cheers
Michael
Martin Underwood mar...@sysprog.co.uk
Gesendet von: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
25.03.2010 13:07
Bitte antworten an
IBM
Mark,
my example below provides the Unix process within the job's address space.
Please note that there are a couple of limitations to BPXBATSL to spawn
successfully into the same ASID, e.g. you'll need eUID=0 for SH parameter
instead of PGM. The Unix Command Reference reads a lot about this
Federica,
for text files, i.e. more or less human readable, /bin/diff can be used.
This program results in a description on what to change in the one file in
order to get same content as in the other file and vice versa. For
arbitrary files, especially with binary contents like load libraries
John,
may be you'll get happy with pattern matching. Have you checked the
java.util.regex package already? Try URL
http://java.sun.com/javase/6/docs/api/; for example. The classes for
pattern matching, also known as regular expressions, are ready to use.
Well, from my experiences regular
Steve,
assuming this is a codepage dilemma...
I found that certain objects like the InputStreamReader may be created
with explicit character set parameters. If these are not set, the value of
the JVM symbol file.encoding is used as a default. I have good
experiences always setting the desired
. And that was my first thought,
too, since I had been experimenting with
various code pages in my emulator.
However, with codepages matching in both the
old and the new system, I cut and pasted from
the old to the new and reran the compile. Same
result.
Michael Klaeschen suggested I check
Sven,
have you tried to open the file with another syntax, like
fopen(DD:TESTLIB,r)?
Cheers
Michael
Sven Siebert extern.sven.sieb...@volkswagen.de
Gesendet von: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
17.09.2009 09:20
Bitte antworten an
IBM Mainframe Discussion List
Daniel,
from my reading of the MVS JCL Reference, there is no abend-disposition
available, neither for the DISP nor for the PATHDISP parameter. Instead,
one may code an abnormal termination disposition. But as the introduction
to the DISP parameter reads, the behaviour in case of an abend
Hi,
the field in the RACF OMVS segment is ASSIZEMAX. It has to be seen
together with the BPXPRMxx symbol MAXASSIZE. Check the Unix System
Services Planning Guide, chapter 3.6.3.3 for details. These max-values are
among others which I call hard limits. In addition, Unix processes may
obtain
Hi Ken,
I remember a lecture about TCPIP issues in a parallel sysplex which was
held at zSeries Technical Conference in Salzburg some years ago. It was
about distributed source VIPA and WLM. In very short words: one can set up
WLM and Communication Server so that the TCPIP related address
Hi Kenneth,
abend 913 is from OPEN macro, not from RACF. Its explanation reads to
check message IEC150I. Insufficient authorization is one of several
possible reasons. The reason code will give detailed explanation. Let's
assume, it is a SAF authorization problem and not I/O, JCL, APF etc.
Hi Michael,
the IF THEN ELSE construct is useful to check step condition codes. You
can for example decide weather a step should run after a previous one
depending on its result. This is similar to the COND parameter in the EXEC
cards. From my experiences you cannot evaluate JCL symbols. To
Dave,
when you are sure to back up _all_ files (including directories, mount
points, device nodes, symlink links etc.) from the Linux HFS then you have
most parts for a successful restore at hand. From my experiences a good
practice is to carefully review the TSM client's include/exclude
Hi Paul,
did you try the INTERPRET instruction already?
DO I=1 TO 3 BY 1
INTERPRET DROP STEM||I||.
END
Cheers
Michael
Paul Ip paul...@boci.com.hk
Gesendet von: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
14.03.2009 10:21
Bitte antworten an
IBM Mainframe Discussion List
Hi Lizette,
of course there is a kind of macro to obtain the time stamp with java. But
I am not sure, if this is what you are looking for. Speaking about the TZ
shell symbol, you do not need to update this parameter manually. For
example Appendix I of z/OS V1R8.0 UNIX System Services Command
Hi Parin,
the data set has 5 records in each block of 7.630 bytes. A track of 56.664
bytes (assuming 3390 DASD) can contain 7 of your blocks. That are 53.410
bytes per track. The data set has allocated 297.141 tracks, each 53.410
bytes of data. That are 15.870.300.810 bytes (which fit in an
Hi Bruce,
one approach is to set up a started task running the TSM client. This one
will connect to communication server TCPIP stack, establishes a connection
to the TSM server and waits for incoming requests. The authority for
submitting requests must be granted within the Server, no RACF
Hi Fred,
have you already tried with COND cards for your step EXECs? Another way I
would prefer for long and therefor confusing jobs might be to define each
step as a job in OPC and form an application of those jobs that will keep
track of the return codes.
Cheers
Michael
Fred Schmidt
66 matches
Mail list logo