IMHO, that's a bass-ackwards solution. If they only handle 5 CCWs, then they should issue, at worst, a Command Reject for anything else. Good Grief!
If they refuse, find out what they accept, and then give them a list of the other 251 hex codes to ignore. You'd think they could count that high? Mike Walter Hewitt Associates Any opinions expressed herein are mine alone and do not necessarily represent the opinions or policies of Hewitt Associates. "Schuh, Richard" <[EMAIL PROTECTED]> Sent by: "The IBM z/VM Operating System" <[email protected]> 06/26/2008 12:35 PM Please respond to "The IBM z/VM Operating System" <[email protected]> To [email protected] cc Subject Tape Unit Documentation We have a vendor that produces a device that responds to the IPL roll call saying it is a 3480-04; however, it only uses a subset of the tape unit's CCWs. If these devices receive a CCW that is not in their list of 5 that they use, bad things, such as streamed unsolicited interrupts or Command Rejects, happen. A detach of one of the devices results in the streamed unsolicited interrupts which in turn causes the device to be Boxed. Other commands like the forward or backward space commands or Read Backward cause a Unit Check/Command Reject to be reflected to the guest. I would like to be able to provide them with a complete list of commands for which they should not cause irreparable harm to the guest. Where can I find documentation showing the complete list of CCWs used by real 3480 and 3490 devices? Regards, Richard Schuh The information contained in this e-mail and any accompanying documents may contain information that is confidential or otherwise protected from disclosure. If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately alert the sender by reply e-mail and then delete this message, including any attachments. Any dissemination, distribution or other use of the contents of this message by anyone other than the intended recipient is strictly prohibited. All messages sent to and from this e-mail address may be monitored as permitted by applicable law and regulations to ensure compliance with our internal policies and to protect our business. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by e-mail.
