OS/390 2.10 TCPIP problem

2008-04-27 Thread Victor Zhang
Hi,
First please forgive me to ask question regarding so outdated OS.
I have a problem that we found the resolver in OS/390 2.10 resolve hostname
to two IP address, one of them is never defined.
FQN=: SDMF1
host_alias: 
host_addr: 171.17.0.3
host_addr: 3.211.230.193

Our hostname is SDMF1, first IP is defined by us, second one is unknown.
My question is:
How can I know where is it defined?
How can we turn on RESOLVE trace to see what happen during gethostbyname
socket API? Or is turning on RESOLVE trace enough? Any other suggestions?

Regards
Victor

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread Don Higgins
John, all

Has IBM established a standard in any of the various high-level languages 
for the representation of the various floating-point formats and 
precisions?
I am specifically looking at both fixed-point and scientific notation.
  John P. Baker

Here are some references and summary info I've collected:

Standard Scientific Notation:
  General description and references:
http://en.wikipedia.org/wiki/Scientific_notation
  IBM Hursley generalized description of scientific notation conversion:
http://www2.hursley.ibm.com/decimal/daconvs.html#reftonum
  Arithmetic Model:
http://www2.hursley.ibm.com/decimal/damodel.html

Note this model is based on IEEE 854, ANSI X3-274 standards.  
Unfortunately these standards are only available in published form for a 
fee.  (Commentary:  It would be a tremendous service to the world if a  
non-profit organization could be started to move all standards 
publications to the public domain to help promote understanding and use of 
non-proprietary standards.  Charging for them makes them all proprietary!)

So in summary the standard form would appear to be:

  1.  Sign (+optional)

  2.  Mantissa (decimal digits with optional period up to maximum 
significant digits for binary format)

  3.  Exponent (optional)
 a.  E (E or e optional if sign included)
 b.  Sign (+optional if E or e)
 c.  Power of ten (exponent digits with no decimal up to maximum 
exponent) 

The maximum limits for each IBM fixed and floating point HFP, BFP, and DFP 
format can be found in the latest Principles of Operations Manual here:

http://publibfp.boulder.ibm.com/epubs/pdf/dz9zr006.pdf

In summary the significant decimal digits and base 10 exponents are as 
follows:

Summary of IBM Fixed and Floating Point Scientific Notation Limits
Type of number  32 bit  64 bit  128 bit

Fixed Point Integers
Significant digits  10  19  39

HFP Hexadecimal FP  
Significant digits  7   15  34
   Maximum exponent 75  75  75


BFP Binary IEEE 754 FP  
Significant digits  7   16  34
   Maximum exponent 38  308 4932

DFP Decimal IEEE 754r FP
Significant digits  7   16  34
Maximum exponent96  384 6144

All of these formats are supported by z390 on Windows and Linux with CTD 
and CFD conversion routine macros and supervisor calls for converting 
between EBCDIC/ASCII character scientific notation and any of the above 
binary formats.  All corrections and comments welcome.

Don Higgins
[EMAIL PROTECTED]
www.z390.org

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



IXC102D and REPLY DOWN

2008-04-27 Thread Mike Myers

Hi:

I'm looking to get clarification on whether or not the z/OS console 
IXC102A message requesting that the operator confirms that a member of a 
sysplex bas been reset always appears when a member is removed from the 
sysplex. The message I am referring to is:


IXC102A XCF IS WAITING FOR SYSTEM sysname DEACTIVATION. REPLY DOWN  
WHEN MVS ON sysname HAS BEEN SYSTEM RESET


I have been told that some installations never see it, and I suspect it 
it would not be replied to by automation without somehow managing to 
cause a system reset to occur on the member being removed. Not having 
the luxury of being able to set up an experiment on every known hardware 
and software configuration, I can't prove or disprove this contention. 
Does anyone know for sure? If it sometimes does NOT occur, do you know why?


Mike Myers
Mentor Services Corporation

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread Anne Lynn Wheeler
The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main as well.

[EMAIL PROTECTED] (Don Higgins) writes:
   DFP Decimal IEEE 754r FP
   Significant digits  7   16  34
   Maximum exponent96  384 6144

 All of these formats are supported by z390 on Windows and Linux with CTD 
 and CFD conversion routine macros and supervisor calls for converting 
 between EBCDIC/ASCII character scientific notation and any of the above 
 binary formats.  All corrections and comments welcome.

 Don Higgins
 [EMAIL PROTECTED]
 www.z390.org

Mike gave talk on 754r decimal FP, thursday at HILLGANG meeting
... included some interesting background and performance numbers about
decimal FP justification (as well as how long things can get dragged out
in standards process).

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: zIIPs zAAP exploitation

2008-04-27 Thread Cheryl Walker
Ed,

Thanks for including this.  These were the numbers from the August 2007
SHARE.  Below I've included the results from Feb 2008, and you can see that
it really hasn't changed much.
I'm in the middle of writing now, so I've not been watching IBM-Main.  If
you ever need anything, just send me a post offline.

  You can get Cheryl's presentation from
  http://www.watsonwalker.com/PR080229.pdf. Slide 4 contains the survey
  questions:

Current Server Type (now or within next 12 months)
 z800, z900, z890 (23% at last SHARE)?  - 34% 2/08
 z990 (23%)?  - 18%
 z9-BC (24%)?  - 19%
 z9-EC (38%)?  - 32%
 Z10?  - 8%
 Older Hardware (1%)?  - 1%

 Using zAAP Processors (32)?  - 34
 Using zIIP Processors (40)?  - 41
 Have Used On/Off Capacity on Demand (21)?  - 31
 Using Variable WLC Pricing (31)?  - 31
 Doing Heavy Cryptographic Work (9)?  - 10
 Who is exploiting the full 65,520 cylinders of a 3390-54?  - 7

Best regards,

Cheryl Watson


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: OS/390 2.10 TCPIP problem

2008-04-27 Thread Lizette Koehler
Try posting to the TCPIP  newsgroup 

For IBMTCP-L subscribe / signoff / archive access instructions, send email
to [EMAIL PROTECTED] with the message: INFO IBMTCP-L


Lizette

[] Snip
[] 
First please forgive me to ask question regarding so outdated OS.
I have a problem that we found the resolver in OS/390 2.10 resolve hostname
to two IP address, one of them is never defined.
FQN=: SDMF1
host_alias: 
host_addr: 171.17.0.3
host_addr: 3.211.230.193

Our hostname is SDMF1, first IP is defined by us, second one is unknown.
My question is:
How can I know where is it defined?
How can we turn on RESOLVE trace to see what happen during gethostbyname
socket API? Or is turning on RESOLVE trace enough? Any other suggestions?
[]  unsnip

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread John P. Baker
Don,

I appreciate the information.

However, the clarifications I really need are:

  1.  How are we to distinguish between a binary floating-point literal, a
decimal floating-point literal, and a hexadecimal floating-point literal?
  2.  How are we to distinguish between a four-byte floating-point literal,
an eight-byte floating-point literal, and a sixteen-byte floating-point
literal?

Some examples I have seen use various letter suffixes to indicate length and
format.  But is there a standard?

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Don Higgins
Sent: Sunday, April 27, 2008 8:41 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Fixed-Point and Scientific Notation

John, all

Here are some references and summary info I've collected:

Standard Scientific Notation:
  General description and references:
http://en.wikipedia.org/wiki/Scientific_notation
  IBM Hursley generalized description of scientific notation conversion:
http://www2.hursley.ibm.com/decimal/daconvs.html#reftonum
  Arithmetic Model:
http://www2.hursley.ibm.com/decimal/damodel.html

Note this model is based on IEEE 854, ANSI X3-274 standards.  
Unfortunately these standards are only available in published form for a 
fee.  (Commentary:  It would be a tremendous service to the world if a  
non-profit organization could be started to move all standards 
publications to the public domain to help promote understanding and use of 
non-proprietary standards.  Charging for them makes them all proprietary!)

So in summary the standard form would appear to be:

  1.  Sign (+optional)

  2.  Mantissa (decimal digits with optional period up to maximum 
significant digits for binary format)

  3.  Exponent (optional)
 a.  E (E or e optional if sign included)
 b.  Sign (+optional if E or e)
 c.  Power of ten (exponent digits with no decimal up to maximum 
exponent) 

The maximum limits for each IBM fixed and floating point HFP, BFP, and DFP 
format can be found in the latest Principles of Operations Manual here:

http://publibfp.boulder.ibm.com/epubs/pdf/dz9zr006.pdf

In summary the significant decimal digits and base 10 exponents are as 
follows:

Summary of IBM Fixed and Floating Point Scientific Notation Limits
Type of number  32 bit  64 bit  128 bit

Fixed Point Integers
Significant digits  10  19  39

HFP Hexadecimal FP  
Significant digits  7   15  34
   Maximum exponent 75  75  75


BFP Binary IEEE 754 FP  
Significant digits  7   16  34
   Maximum exponent 38  308 4932

DFP Decimal IEEE 754r FP
Significant digits  7   16  34
Maximum exponent96  384 6144

All of these formats are supported by z390 on Windows and Linux with CTD 
and CFD conversion routine macros and supervisor calls for converting 
between EBCDIC/ASCII character scientific notation and any of the above 
binary formats.  All corrections and comments welcome.

Don Higgins
[EMAIL PROTECTED]
www.z390.org

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread Binyamin Dissen
On Sun, 27 Apr 2008 12:11:49 -0400 John P. Baker [EMAIL PROTECTED]
wrote:

:  1.  How are we to distinguish between a binary floating-point literal, a
:decimal floating-point literal, and a hexadecimal floating-point literal?

What is a binary floating point literal? Or a hexadecimal floating point
literal? They would tend to be simple data not converted by the compiler.

:  2.  How are we to distinguish between a four-byte floating-point literal,
:an eight-byte floating-point literal, and a sixteen-byte floating-point
:literal?

Typically E is used for short, D is used for long and L is now being used for
double long.

:Some examples I have seen use various letter suffixes to indicate length and
:format.  But is there a standard?

Should be.

1.5E+0 - short.
1.5D+0 - long.
1.5L+0 - double long.

What are you trying to do? Determine an interchange format?

:-Original Message-
:From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
:Of Don Higgins
:Sent: Sunday, April 27, 2008 8:41 AM
:To: IBM-MAIN@BAMA.UA.EDU
:Subject: Re: Fixed-Point and Scientific Notation
:
:John, all
:
:Here are some references and summary info I've collected:
:
:Standard Scientific Notation:
:  General description and references:
:http://en.wikipedia.org/wiki/Scientific_notation
:  IBM Hursley generalized description of scientific notation conversion:
:http://www2.hursley.ibm.com/decimal/daconvs.html#reftonum
:  Arithmetic Model:
:http://www2.hursley.ibm.com/decimal/damodel.html
:
:Note this model is based on IEEE 854, ANSI X3-274 standards.  
:Unfortunately these standards are only available in published form for a 
:fee.  (Commentary:  It would be a tremendous service to the world if a  
:non-profit organization could be started to move all standards 
:publications to the public domain to help promote understanding and use of 
:non-proprietary standards.  Charging for them makes them all proprietary!)
:
:So in summary the standard form would appear to be:
:
:  1.  Sign (+optional)
:
:  2.  Mantissa (decimal digits with optional period up to maximum 
:significant digits for binary format)
:
:  3.  Exponent (optional)
: a.  E (E or e optional if sign included)
: b.  Sign (+optional if E or e)
: c.  Power of ten (exponent digits with no decimal up to maximum 
:exponent) 
:
:The maximum limits for each IBM fixed and floating point HFP, BFP, and DFP 
:format can be found in the latest Principles of Operations Manual here:
:
:http://publibfp.boulder.ibm.com/epubs/pdf/dz9zr006.pdf
:
:In summary the significant decimal digits and base 10 exponents are as 
:follows:
:
:  Summary of IBM Fixed and Floating Point Scientific Notation Limits
:  Type of number  32 bit  64 bit  128 bit
:  
:  Fixed Point Integers
:  Significant digits  10  19  39
:
:  HFP Hexadecimal FP  
:  Significant digits  7   15  34
: Maximum exponent 75  75  75
:  
:  
:  BFP Binary IEEE 754 FP  
:  Significant digits  7   16  34
: Maximum exponent 38  308 4932
:  
:  DFP Decimal IEEE 754r FP
:  Significant digits  7   16  34
:  Maximum exponent96  384 6144
:
:All of these formats are supported by z390 on Windows and Linux with CTD 
:and CFD conversion routine macros and supervisor calls for converting 
:between EBCDIC/ASCII character scientific notation and any of the above 
:binary formats.  All corrections and comments welcome.

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread John P. Baker
Actually, I am working on a lexical analyzer and parser for a future
product.

The issue is that we have three formats (binary, decimal, and hexadecimal)
and three lengths (4, 8, and 16).

Clearly, we must have a letter to indicate the start of the exponent.

However, a numeric literal may not have an exponent.

Therefore, it does not seem prudent to use that exponent initiator to
specify either the length or the format.

The best approach would seem to be to permit 0-2 suffix letters to a numeric
literal which will identify the format and length.

If we use E/e to indicate an exponent, then we cannot use E/e as a
suffix character, since we are unable to distinguish the context properly.

So we need to determine what characters should be used for the various
formats and lengths.

Should we care in which order the format and length characters are
specified?

If format and/or length characters are not specified, how should we
determine what format and/or length should apply to the numeric literal?

Obviously, we can look at the number of digits specified and the value of
the exponent, if any.  However, in many cases these will be insufficient.

We can look and the surrounding context, but that adds a level of complexity
which may not be necessary.

Ideas and suggestions, please.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Binyamin Dissen
Sent: Sunday, April 27, 2008 1:06 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Fixed-Point and Scientific Notation

Typically E is used for short, D is used for long and L is now being used
for
double long.

Should be.

1.5E+0 - short.
1.5D+0 - long.
1.5L+0 - double long.

What are you trying to do? Determine an interchange format?

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: zIIPs zAAP exploitation

2008-04-27 Thread Eric Bielefeld
I may be wrong, but I believe the number of older hardware you quote below is 
much higher than 1%.  I suspect that shops with hardware that old don't send 
people to Share very often.  

Eric Bielefeld

On Sun, 27 Apr 2008 10:46:42 -0400, Cheryl Walker 
[EMAIL PROTECTED] wrote:

Ed,

Thanks for including this.  These were the numbers from the August 2007
SHARE.  Below I've included the results from Feb 2008, and you can see that
it really hasn't changed much.
I'm in the middle of writing now, so I've not been watching IBM-Main.  If
you ever need anything, just send me a post offline.

  You can get Cheryl's presentation from
  http://www.watsonwalker.com/PR080229.pdf. Slide 4 contains the survey
  questions:

Current Server Type (now or within next 12 months)
 z800, z900, z890 (23% at last SHARE)?  - 34% 2/08
 z990 (23%)?  - 18%
 z9-BC (24%)?  - 19%
 z9-EC (38%)?  - 32%
 Z10?  - 8%
 Older Hardware (1%)?  - 1%

 Using zAAP Processors (32)?  - 34
 Using zIIP Processors (40)?  - 41
 Have Used On/Off Capacity on Demand (21)?  - 31
 Using Variable WLC Pricing (31)?  - 31
 Doing Heavy Cryptographic Work (9)?  - 10
 Who is exploiting the full 65,520 cylinders of a 3390-54?  - 7

Best regards,

Cheryl Watson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread Binyamin Dissen
On Sun, 27 Apr 2008 13:35:35 -0400 John P. Baker [EMAIL PROTECTED]
wrote:

:Actually, I am working on a lexical analyzer and parser for a future
:product.

:The issue is that we have three formats (binary, decimal, and hexadecimal)
:and three lengths (4, 8, and 16).

:Clearly, we must have a letter to indicate the start of the exponent.

:However, a numeric literal may not have an exponent.

:Therefore, it does not seem prudent to use that exponent initiator to
:specify either the length or the format.

:The best approach would seem to be to permit 0-2 suffix letters to a numeric
:literal which will identify the format and length.

:If we use E/e to indicate an exponent, then we cannot use E/e as a
:suffix character, since we are unable to distinguish the context properly.

:So we need to determine what characters should be used for the various
:formats and lengths.

:Should we care in which order the format and length characters are
:specified?

:If format and/or length characters are not specified, how should we
:determine what format and/or length should apply to the numeric literal?

:Obviously, we can look at the number of digits specified and the value of
:the exponent, if any.  However, in many cases these will be insufficient.

:We can look and the surrounding context, but that adds a level of complexity
:which may not be necessary.

But it would be the most reasonable way.

If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e.,

DOUBLE A,B
.
A = B+1.23

would use a short 1.23 rather than determining that the other operands were
double thus 1.23 should be treated as a double as well.

One had to do

A = B+1.23D0

It would behoove you to determine the context to generate the best values. 

If your parser will support scaled values, 1.23 may not even be a floating
point number - it may be a fixed scaled value.

In general it is best to make things easier for the carbon life forms creating
and using the data rather than the silicon non-life forms processing the data
(even if it does cause more initial work for the carbon life forms programming
the silicon).

:Ideas and suggestions, please.
:
:John P. Baker
:
:-Original Message-
:From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
:Of Binyamin Dissen
:Sent: Sunday, April 27, 2008 1:06 PM
:To: IBM-MAIN@BAMA.UA.EDU
:Subject: Re: Fixed-Point and Scientific Notation
:
:Typically E is used for short, D is used for long and L is now being used
:for
:double long.
:
:Should be.
:
:1.5E+0 - short.
:1.5D+0 - long.
:1.5L+0 - double long.
:
:What are you trying to do? Determine an interchange format?

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: zIIPs zAAP exploitation

2008-04-27 Thread Binyamin Dissen
On Sun, 27 Apr 2008 12:58:30 -0500 Eric Bielefeld [EMAIL PROTECTED]
wrote:

:I may be wrong, but I believe the number of older hardware you quote below is 
:much higher than 1%.  I suspect that shops with hardware that old don't send 
:people to Share very often.  

There is the missing Don't know, which may skew the results or lead people
to guess.

:On Sun, 27 Apr 2008 10:46:42 -0400, Cheryl Walker 
:[EMAIL PROTECTED] wrote:

:Thanks for including this.  These were the numbers from the August 2007
:SHARE.  Below I've included the results from Feb 2008, and you can see that
:it really hasn't changed much.
:I'm in the middle of writing now, so I've not been watching IBM-Main.  If
:you ever need anything, just send me a post offline.

:  You can get Cheryl's presentation from
:  http://www.watsonwalker.com/PR080229.pdf. Slide 4 contains the survey
:  questions:

:Current Server Type (now or within next 12 months)
: z800, z900, z890 (23% at last SHARE)?  - 34% 2/08
: z990 (23%)?  - 18%
: z9-BC (24%)?  - 19%
: z9-EC (38%)?  - 32%
: Z10?  - 8%
: Older Hardware (1%)?  - 1%

: Using zAAP Processors (32)?  - 34
: Using zIIP Processors (40)?  - 41
: Have Used On/Off Capacity on Demand (21)?  - 31
: Using Variable WLC Pricing (31)?  - 31
: Doing Heavy Cryptographic Work (9)?  - 10
: Who is exploiting the full 65,520 cylinders of a 3390-54?  - 7

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



How is SRBPTCB instantiated?

2008-04-27 Thread Binyamin Dissen
How is SRB to TCB percolation instantiated?

Is an automatic FRR added which does the percolation if nothing recovers?

Stored somewhere in memory?

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Floating Point Definitions

2008-04-27 Thread Howard Rifkind
Speaking of Floating Point,

I want to use some of the floating point registers for
general register purposes.  I was told I could do this
but I don't understand how to define them in the
assembler language program.

For instance, I would define a general register with
an equate such as:

R10   EQ  2  Equate Register 2 to R10

However I would I do this for Floating point register
3.

Hope my questions is clear.

And do I have to normalize the floating point register
to use it for normal addresses?

Thanks.


  

Be a better friend, newshound, and 
know-it-all with Yahoo! Mobile.  Try it now.  
http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Floating Point Definitions

2008-04-27 Thread Binyamin Dissen
On Sun, 27 Apr 2008 11:28:00 -0700 Howard Rifkind [EMAIL PROTECTED] wrote:

:I want to use some of the floating point registers for
:general register purposes.  I was told I could do this
:but I don't understand how to define them in the
:assembler language program.

Only for some purposes.

:For instance, I would define a general register with
:an equate such as:

:R10   EQ  2  Equate Register 2 to R10

:However I would I do this for Floating point register
:3.

:Hope my questions is clear.

:And do I have to normalize the floating point register
:to use it for normal addresses?

You can't use them to address data.

You can save a GPR in an FPR with the appropriate hardware, but it would lead
to most confusing code (IMHO).

You can use them for fixed point operations.

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread John P. Baker
In many cases, the user may simply specify 1.75E+6, the context will
determine both the format and the length, and everything will be fine.

However, there are other computational situations where the use of a
particular format and/or length is important, and the choice of an incorrect
format and/or length may result in miniscule computational errors, which
then grow into significant errors through a subsequent series of
computations.

It is therefore necessary that the capability to specify formats and lengths
be present.

I am currently considering suffix characters of B (binary), D (decimal),
and H (hexadecimal).

However, I need to come up with a scheme for the specification of length.
S (single) and Q (quad) would seem to work, but D (double) would
already be in use as D (decimal).

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Binyamin Dissen
Sent: Sunday, April 27, 2008 2:20 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Fixed-Point and Scientific Notation

If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e.,

DOUBLE A,B
.
A = B+1.23

would use a short 1.23 rather than determining that the other operands were
double thus 1.23 should be treated as a double as well.

One had to do

A = B+1.23D0

It would behoove you to determine the context to generate the best values. 

If your parser will support scaled values, 1.23 may not even be a floating
point number - it may be a fixed scaled value.

In general it is best to make things easier for the carbon life forms
creating
and using the data rather than the silicon non-life forms processing the
data
(even if it does cause more initial work for the carbon life forms
programming
the silicon).

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Authorized Rexx Assembler Function

2008-04-27 Thread Lindy Mayfield
Not to overbeat this dead horse, but I thought I'd add another one to
the list here of ways to call authorized commands from TSO or Rexx.

By adding an authorized module name (in authorized library) to the
IKJTSOxx AUTHCMD list and calling it from TSO or Rexx.  CALL
*(authmodule).

It only kinda sorta fits because it really isn't a Rexx or TSO function
per se and other than passing information to it through a file and
retrieving the results from a file (or PUTLINEs) I can't think of any
better way to interact with it.  (Nothing better than the TSO service
routine that is).

Lindy

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Edward Jaffe
Sent: 15. huhtikuuta 2008 20:42
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Authorized Rexx Assembler Function

Lindy Mayfield wrote:
 For completeness, since I started this whole, ah, thing, I'm curious
 what they are.  Here are the techniques I've learned so far, including
 the one that violates system integrity:

 __ The standard acceptable method is to call TSO/E Service Facility,
 IKJEFTSR and pass it the name of an authorized module.

 __ Call an SVC that flips the JSCBAUTH bit back on.  This is
 non-standard.  If it is to be implemented even on a development system
 then added security needs to be built in to make sure it isn't
misused.
   

I don't believe it's possible to add security to ensure this method 
doesn't get misused. (I'm almost sorry you posted it as an option.)

The whole issue of validating the SVC caller is a hairy one. And, the 
requirements -- for example, to not even preserve a single register or 
storage address across the call -- are onerous. But, even more of a 
problem is the idea of setting JSCBAUTH. That flag affects all TCBs in 
the job step tree. It would be a fairly trivial matter for a savvy 
programmer to ATTACH a TCB that loops waiting for this flag to be turned

on by the SVC running your code in another TCB. To protect against this,

you would essentially have to make all TCBs in the address space 
non-dispatchable *before* JSCBAUTH was turned on. And, leave things that

way until after JSCBAUTH is turned off again.

This is not unlike what is done with IKJEFTSR. Your program runs under 
the authorized leg of the TMP. All unauthorized TCBs are made 
non-dispatchable while the authorized code runs.

Keep in mind that similar integrity issues apply to any action that 
offers additional privilege to unauthorized work running asynchronously 
in the address space. For example, AXSET.

 __ Simply put all the authorized stuff into an SVC or PC routine.

 That's all I've collected so far.  Are there more ways?

 Lindy
   

-- 
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Authorized Rexx Assembler Function

2008-04-27 Thread Lindy Mayfield
I can't think of any, but Alex can, thanks.  IKJCT441.  I forgot, it has
such a memorable name.

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Lindy Mayfield
Sent: 27. huhtikuuta 2008 21:52
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Authorized Rexx Assembler Function


other than passing information to it through a file and
retrieving the results from a file (or PUTLINEs) I can't think of any
better way to interact with it.  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Fixed-Point and Scientific Notation

2008-04-27 Thread Binyamin Dissen
On Sun, 27 Apr 2008 14:37:10 -0400 John P. Baker [EMAIL PROTECTED]
wrote:

:In many cases, the user may simply specify 1.75E+6, the context will
:determine both the format and the length, and everything will be fine.

:However, there are other computational situations where the use of a
:particular format and/or length is important, and the choice of an incorrect
:format and/or length may result in miniscule computational errors, which
:then grow into significant errors through a subsequent series of
:computations.

In which cases would it not be resolvable via context?

:It is therefore necessary that the capability to specify formats and lengths
:be present.

:I am currently considering suffix characters of B (binary), D (decimal),
:and H (hexadecimal).

:However, I need to come up with a scheme for the specification of length.
:S (single) and Q (quad) would seem to work, but D (double) would
:already be in use as D (decimal).

I would suggest that if the format cannot be determined by context, that the
raw data as specified be retained with a flag indicating the situation. Then
when finally used it can be properly handled.

Such as

 FIELD1 = 1.23

Without knowing what FIELD1 is, the data cannot be properly stored to be
used as is. But it can be retained as a scaled fixed field (which would be
exact) and then when used in a floating point expression be properly converted
to the correct form.

But, all in all, it ain't my dog.

:-Original Message-
:From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
:Of Binyamin Dissen
:Sent: Sunday, April 27, 2008 2:20 PM
:To: IBM-MAIN@BAMA.UA.EDU
:Subject: Re: Fixed-Point and Scientific Notation
:
:If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e.,
:
:DOUBLE A,B
:.
:A = B+1.23
:
:would use a short 1.23 rather than determining that the other operands were
:double thus 1.23 should be treated as a double as well.
:
:One had to do
:
:A = B+1.23D0
:
:It would behoove you to determine the context to generate the best values. 
:
:If your parser will support scaled values, 1.23 may not even be a floating
:point number - it may be a fixed scaled value.
:
:In general it is best to make things easier for the carbon life forms
:creating
:and using the data rather than the silicon non-life forms processing the
:data
:(even if it does cause more initial work for the carbon life forms
:programming
:the silicon).

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: How is SRBPTCB instantiated?

2008-04-27 Thread Peter

On Apr 27, 2008, at 11:26 AM, Binyamin Dissen wrote:


How is SRB to TCB percolation instantiated?

Is an automatic FRR added which does the percolation if nothing  
recovers?


Stored somewhere in memory?


Its your obligation to initialize it.

In the case of STARTIO, you do it this way:

STARTIO SRB=,TCB= (original way)

or

STARTIO SRB=,TCB=0 (new way)

in the second case, the IECIOSCN grabs the TCB address from PSATOLD.

There are numerous cases where the first (and which was formerly the  
only) way is required: when I/O is started from within a process  
which itself is run under an SRB, or, possibly, is run in a disabled  
interrupt exit (DIE) and for which the TCB and the SRB currently  
dispatched are completely arbitrary (taken to mean indeterminate).


In the basic case of a SCHEDULE, the user initializes the field to  
associate the SRB with its TCB.


No automatic FRR that I am aware of.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: How is SRBPTCB instantiated?

2008-04-27 Thread Binyamin Dissen
On Sun, 27 Apr 2008 12:05:46 -0700 Peter [EMAIL PROTECTED] wrote:

:On Apr 27, 2008, at 11:26 AM, Binyamin Dissen wrote:

: How is SRB to TCB percolation instantiated?

: Is an automatic FRR added which does the percolation if nothing  
: recovers?

: Stored somewhere in memory?

:Its your obligation to initialize it.

:In the case of STARTIO, you do it this way:

:STARTIO SRB=,TCB= (original way)

:or

:STARTIO SRB=,TCB=0 (new way)

:in the second case, the IECIOSCN grabs the TCB address from PSATOLD.

:There are numerous cases where the first (and which was formerly the  
:only) way is required: when I/O is started from within a process  
:which itself is run under an SRB, or, possibly, is run in a disabled  
:interrupt exit (DIE) and for which the TCB and the SRB currently  
:dispatched are completely arbitrary (taken to mean indeterminate).

:In the basic case of a SCHEDULE, the user initializes the field to  
:associate the SRB with its TCB.

:No automatic FRR that I am aware of.

But once the code associated with the SRB gets control the SRB becomes mere
data. Upon abend the SRB contents cannot be used by the system to determine
where/if to percolate.

My query was more as to how something getting control in the context of SRB
mode can determine if there is an associated TCB.

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: IXC102D and REPLY DOWN

2008-04-27 Thread Skip Robinson
I put this question to IBM recently and learned a difference between
parallel sysplex (with CF) and basic sysplex (without). With CF supporting
XCF, other systems are notified when one member is truly down. Without a
CF, other systems *believe* a member is down but need operator
confirmation.

That difference matches our experience across the enterprise.

.
.
JO.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
626-302-7535 Office
323-715-0595 Mobile
[EMAIL PROTECTED]


   
 Mike Myers
 [EMAIL PROTECTED] 
 ICES.COM  To 
 Sent by: IBM  IBM-MAIN@BAMA.UA.EDU
 Mainframe  cc 
 Discussion List   
 [EMAIL PROTECTED] Subject 
 .EDU IXC102D and REPLY DOWN  
   
   
 04/27/2008 05:45  
 AM
   
   
 Please respond to 
   IBM Mainframe   
  Discussion List  
 [EMAIL PROTECTED] 
   .EDU   
   
   




Hi:

I'm looking to get clarification on whether or not the z/OS console
IXC102A message requesting that the operator confirms that a member of a
sysplex bas been reset always appears when a member is removed from the
sysplex. The message I am referring to is:

 IXC102A XCF IS WAITING FOR SYSTEM sysname DEACTIVATION. REPLY DOWN
 WHEN MVS ON sysname HAS BEEN SYSTEM RESET

I have been told that some installations never see it, and I suspect it
it would not be replied to by automation without somehow managing to
cause a system reset to occur on the member being removed. Not having
the luxury of being able to set up an experiment on every known hardware
and software configuration, I can't prove or disprove this contention.
Does anyone know for sure? If it sometimes does NOT occur, do you know why?

Mike Myers

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: How is SRBPTCB instantiated?

2008-04-27 Thread Peter

On Apr 27, 2008, at 12:20 PM, Binyamin Dissen wrote:

My query was more as to how something getting control in the  
context of SRB

mode can determine if there is an associated TCB.


SRBTCB is the associated TCB; the issuer of SCHEDULE must initialize it.

The SRB may elect to establish an FRR, but it is not required to do so.

Obviously, if an abnormal situation later occurs, the TCB pointed to  
by SRBTCB would be the one to ABTERM.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: How is SRBPTCB instantiated?

2008-04-27 Thread Binyamin Dissen
On Sun, 27 Apr 2008 13:33:57 -0700 Peter [EMAIL PROTECTED] wrote:

:On Apr 27, 2008, at 12:20 PM, Binyamin Dissen wrote:

: My query was more as to how something getting control in the  
: context of SRB
: mode can determine if there is an associated TCB.

:SRBTCB is the associated TCB; the issuer of SCHEDULE must initialize it.

:The SRB may elect to establish an FRR, but it is not required to do so.

:Obviously, if an abnormal situation later occurs, the TCB pointed to  
:by SRBTCB would be the one to ABTERM.

My issue was not how to set it, but how to detect it from the code running in
SRB mode.

It appears that LCCAPGTA may contain the data.

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: How is SRBPTCB instantiated?

2008-04-27 Thread Peter

On Apr 27, 2008, at 2:48 PM, Binyamin Dissen wrote:


:Obviously, if an abnormal situation later occurs, the TCB pointed to
:by SRBTCB would be the one to ABTERM.

My issue was not how to set it, but how to detect it from the code  
running in

SRB mode.

It appears that LCCAPGTA may contain the data.


Trace back from the LPSW in the dispatcher, and you'll certainly find  
your answer.


Not sure why you are seeking a derivative source, when the actual  
source (SRBTCB) is already known.


However, the dispatcher is known to play some very mean tricks, and  
perhaps that's what you're seeking.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: How is SRBPTCB instantiated?

2008-04-27 Thread Craddock, Chris
 How is SRB to TCB percolation instantiated?

RTM1 looks for and dispatches any FRRs that are active. When all of
those have percolated, it locates the designated victim TCB (hidden
under a rock at SCHEDULE time) and schedules an ABTERM to that task. 

That victim task's current recovery routine (if any) gets an SDWA with
the SDWAERRx flags set to indicate the task/RB wasn't in control at the
time of the error. If you don't spot those the error can be an utter
mystery.

 Is an automatic FRR added which does the percolation if nothing
recovers?

No. It is RTM itself that does all of that.

 Stored somewhere in memory?

Well obviously it must be, but it is not something you can change. The
identity of the victim is placed in SRBPTCB prior to the SCHEDULE macro
being issued. The system stores that under a rock prior to dispatching
the SRB and in the SSRB if the SRB is suspended. You can probably figure
out what rock that is, but it would be a bad idea to try to change it.

As an OBTW, I really don't like this particular behavior. It was a
cheesy way to indicate to the scheduler that the SRB had gone belly up.
It is a royal pain in the butt dealing with asynchronous abends arising
from this particular piece of arcana. I never set the purge TCB address
in SRBs that I use. Something a little more elegant is called for. 

CC

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: How is SRBPTCB instantiated?

2008-04-27 Thread Peter

On Apr 27, 2008, at 5:10 PM, Craddock, Chris wrote:


As an OBTW, I really don't like this particular behavior. It was a
cheesy way to indicate to the scheduler that the SRB had gone belly  
up.
It is a royal pain in the butt dealing with asynchronous abends  
arising
from this particular piece of arcana. I never set the purge TCB  
address

in SRBs that I use. Something a little more elegant is called for.


I strongly suspect the Basic IOS group had a lot to do with SCHEDULE  
and its weird behavior.


It was necessary to get IOS to work across all available CPUs and  
with the barest minimum being done under task mode and/or CPU dependent.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: CPACF performance info?

2008-04-27 Thread Greg Boyd
If you don't have a crypto coprocessor (CEX2 or PCIXCC) installed, then you 
won't have master keys and you can't store keys in the CKDS or PKDS.  ICSF 
will still start, and a few APIs are available, but on the CPACF based machines 
(z890/z990 and later) most of the APIs require the secure coprocessor.  You 
must have a secure coprocessor to store symmetric keys in the CKDS and 
asymmetric (public/private) keys in the PKDS.

And ICSF does not 'switch' to software encryption if it can't find the 
hardware.  The only encryption that ICSF will do in software is AES when 
running on a server that does not provide AES in hardware (AES-128 is 
supported on the CPACF in the z9, and AES-128, AES-192 and AES-256 in the 
CPACF on the z10).  You're probably thinking of System SSL which does 
provide software routines to perform encryption if ICSF or the appropriate 
hardware is not available.

For System SSL, PKA (public/private) keys are used to authenticate the 
parties and those keys may come from the PKDS.  After authentication, data 
is exchanged using a symmetric key established during the handshake, but 
those symmetric keys are not stored in the CKDS.

You might review some of the crypto related documents on the IBM TechDocs 
website (www.ibm.com/support/techdocs and search on Crypto).  Consider 
that a shameless plug, since I wrote some of those documents :-)

Greg Boyd
IBM WSC, System z Crypto 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: IBM-MAIN Digest - 26 Apr 2008 to 27 Apr 2008 (#2008-118)

2008-04-27 Thread gah

Someone wrote:


If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e.,



DOUBLE A,B

.

A = B+1.23



would use a short 1.23 rather than determining that the other operands were
double thus 1.23 should be treated as a double as well.



One had to do



A = B+1.23D0


Fortran traditionally used the exponent letter.

PL/I traditionally used the form as written to determine the
precision and scale.  That is, 123.000E0 would be FLOAT DECIMAL(10).
Binary used the suffix B, and the value was given in binary digits
(with a decimal exponent).
.011E3B  for FLOAT BINARY(7).

Some compilers now might support exponent letters other than E.

Also, there are PL/I intrinsic functions if one wants a different
base, scale, precision, or mode.

BINARY(123E0,50)  for example.

C uses the suffix f for float (single precision), the default
being double.

More recently, Fortran has KIND specified with a suffix with the
appropriate constant value, usually the result of an intrinsic function.

-- glen

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: IXC102D and REPLY DOWN

2008-04-27 Thread Barbara Nitz
I'm looking to get clarification on whether or not the z/OS console 
IXC102A message requesting that the operator confirms that a member of a 
sysplex bas been reset always appears when a member is removed from the 
sysplex.

No. In order for it NOT to appear,

1. You must have a parallel sysplex with at least one CF.
2. You must have an SFM policy active.

Then all but the last system can be system-reset automagically through the CF 
(initiated by SFM, and you don't see it). The last system in the sysplex has to 
be system-reset manually, as there is no one else around in the sysplex to do 
it. But then you wouldn't see that message, either.

As the message states, you may see IXC102A when both 1 and 2 above are 
fulfilled. The only time I ever saw it I followed up on it and it turned out 
that there was a bug somewhere in coexistence code between releases, and I 
should not have seen the message at all.

I have been told that some installations never see it, and I suspect it 
it would not be replied to by automation without somehow managing to 
cause a system reset to occur on the member being removed. 

Well, if you reply to it via automation and that automation is not capable of 
actually system-resetting the lpar before replying, then you may be in deep 
do-do, and it's all your fault. :-)

Regards, Barbara Nitz
-- 
GMX startet ShortView.de. Hier findest Du Leute mit Deinen Interessen!
Jetzt dabei sein: http://www.shortview.de/[EMAIL PROTECTED]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html