OS/390 2.10 TCPIP problem
Hi, First please forgive me to ask question regarding so outdated OS. I have a problem that we found the resolver in OS/390 2.10 resolve hostname to two IP address, one of them is never defined. FQN=: SDMF1 host_alias: host_addr: 171.17.0.3 host_addr: 3.211.230.193 Our hostname is SDMF1, first IP is defined by us, second one is unknown. My question is: How can I know where is it defined? How can we turn on RESOLVE trace to see what happen during gethostbyname socket API? Or is turning on RESOLVE trace enough? Any other suggestions? Regards Victor -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
John, all Has IBM established a standard in any of the various high-level languages for the representation of the various floating-point formats and precisions? I am specifically looking at both fixed-point and scientific notation. John P. Baker Here are some references and summary info I've collected: Standard Scientific Notation: General description and references: http://en.wikipedia.org/wiki/Scientific_notation IBM Hursley generalized description of scientific notation conversion: http://www2.hursley.ibm.com/decimal/daconvs.html#reftonum Arithmetic Model: http://www2.hursley.ibm.com/decimal/damodel.html Note this model is based on IEEE 854, ANSI X3-274 standards. Unfortunately these standards are only available in published form for a fee. (Commentary: It would be a tremendous service to the world if a non-profit organization could be started to move all standards publications to the public domain to help promote understanding and use of non-proprietary standards. Charging for them makes them all proprietary!) So in summary the standard form would appear to be: 1. Sign (+optional) 2. Mantissa (decimal digits with optional period up to maximum significant digits for binary format) 3. Exponent (optional) a. E (E or e optional if sign included) b. Sign (+optional if E or e) c. Power of ten (exponent digits with no decimal up to maximum exponent) The maximum limits for each IBM fixed and floating point HFP, BFP, and DFP format can be found in the latest Principles of Operations Manual here: http://publibfp.boulder.ibm.com/epubs/pdf/dz9zr006.pdf In summary the significant decimal digits and base 10 exponents are as follows: Summary of IBM Fixed and Floating Point Scientific Notation Limits Type of number 32 bit 64 bit 128 bit Fixed Point Integers Significant digits 10 19 39 HFP Hexadecimal FP Significant digits 7 15 34 Maximum exponent 75 75 75 BFP Binary IEEE 754 FP Significant digits 7 16 34 Maximum exponent 38 308 4932 DFP Decimal IEEE 754r FP Significant digits 7 16 34 Maximum exponent96 384 6144 All of these formats are supported by z390 on Windows and Linux with CTD and CFD conversion routine macros and supervisor calls for converting between EBCDIC/ASCII character scientific notation and any of the above binary formats. All corrections and comments welcome. Don Higgins [EMAIL PROTECTED] www.z390.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
IXC102D and REPLY DOWN
Hi: I'm looking to get clarification on whether or not the z/OS console IXC102A message requesting that the operator confirms that a member of a sysplex bas been reset always appears when a member is removed from the sysplex. The message I am referring to is: IXC102A XCF IS WAITING FOR SYSTEM sysname DEACTIVATION. REPLY DOWN WHEN MVS ON sysname HAS BEEN SYSTEM RESET I have been told that some installations never see it, and I suspect it it would not be replied to by automation without somehow managing to cause a system reset to occur on the member being removed. Not having the luxury of being able to set up an experiment on every known hardware and software configuration, I can't prove or disprove this contention. Does anyone know for sure? If it sometimes does NOT occur, do you know why? Mike Myers Mentor Services Corporation -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
The following message is a courtesy copy of an article that has been posted to bit.listserv.ibm-main as well. [EMAIL PROTECTED] (Don Higgins) writes: DFP Decimal IEEE 754r FP Significant digits 7 16 34 Maximum exponent96 384 6144 All of these formats are supported by z390 on Windows and Linux with CTD and CFD conversion routine macros and supervisor calls for converting between EBCDIC/ASCII character scientific notation and any of the above binary formats. All corrections and comments welcome. Don Higgins [EMAIL PROTECTED] www.z390.org Mike gave talk on 754r decimal FP, thursday at HILLGANG meeting ... included some interesting background and performance numbers about decimal FP justification (as well as how long things can get dragged out in standards process). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: zIIPs zAAP exploitation
Ed, Thanks for including this. These were the numbers from the August 2007 SHARE. Below I've included the results from Feb 2008, and you can see that it really hasn't changed much. I'm in the middle of writing now, so I've not been watching IBM-Main. If you ever need anything, just send me a post offline. You can get Cheryl's presentation from http://www.watsonwalker.com/PR080229.pdf. Slide 4 contains the survey questions: Current Server Type (now or within next 12 months) z800, z900, z890 (23% at last SHARE)? - 34% 2/08 z990 (23%)? - 18% z9-BC (24%)? - 19% z9-EC (38%)? - 32% Z10? - 8% Older Hardware (1%)? - 1% Using zAAP Processors (32)? - 34 Using zIIP Processors (40)? - 41 Have Used On/Off Capacity on Demand (21)? - 31 Using Variable WLC Pricing (31)? - 31 Doing Heavy Cryptographic Work (9)? - 10 Who is exploiting the full 65,520 cylinders of a 3390-54? - 7 Best regards, Cheryl Watson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: OS/390 2.10 TCPIP problem
Try posting to the TCPIP newsgroup For IBMTCP-L subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: INFO IBMTCP-L Lizette [] Snip [] First please forgive me to ask question regarding so outdated OS. I have a problem that we found the resolver in OS/390 2.10 resolve hostname to two IP address, one of them is never defined. FQN=: SDMF1 host_alias: host_addr: 171.17.0.3 host_addr: 3.211.230.193 Our hostname is SDMF1, first IP is defined by us, second one is unknown. My question is: How can I know where is it defined? How can we turn on RESOLVE trace to see what happen during gethostbyname socket API? Or is turning on RESOLVE trace enough? Any other suggestions? [] unsnip -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
Don, I appreciate the information. However, the clarifications I really need are: 1. How are we to distinguish between a binary floating-point literal, a decimal floating-point literal, and a hexadecimal floating-point literal? 2. How are we to distinguish between a four-byte floating-point literal, an eight-byte floating-point literal, and a sixteen-byte floating-point literal? Some examples I have seen use various letter suffixes to indicate length and format. But is there a standard? John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Don Higgins Sent: Sunday, April 27, 2008 8:41 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Fixed-Point and Scientific Notation John, all Here are some references and summary info I've collected: Standard Scientific Notation: General description and references: http://en.wikipedia.org/wiki/Scientific_notation IBM Hursley generalized description of scientific notation conversion: http://www2.hursley.ibm.com/decimal/daconvs.html#reftonum Arithmetic Model: http://www2.hursley.ibm.com/decimal/damodel.html Note this model is based on IEEE 854, ANSI X3-274 standards. Unfortunately these standards are only available in published form for a fee. (Commentary: It would be a tremendous service to the world if a non-profit organization could be started to move all standards publications to the public domain to help promote understanding and use of non-proprietary standards. Charging for them makes them all proprietary!) So in summary the standard form would appear to be: 1. Sign (+optional) 2. Mantissa (decimal digits with optional period up to maximum significant digits for binary format) 3. Exponent (optional) a. E (E or e optional if sign included) b. Sign (+optional if E or e) c. Power of ten (exponent digits with no decimal up to maximum exponent) The maximum limits for each IBM fixed and floating point HFP, BFP, and DFP format can be found in the latest Principles of Operations Manual here: http://publibfp.boulder.ibm.com/epubs/pdf/dz9zr006.pdf In summary the significant decimal digits and base 10 exponents are as follows: Summary of IBM Fixed and Floating Point Scientific Notation Limits Type of number 32 bit 64 bit 128 bit Fixed Point Integers Significant digits 10 19 39 HFP Hexadecimal FP Significant digits 7 15 34 Maximum exponent 75 75 75 BFP Binary IEEE 754 FP Significant digits 7 16 34 Maximum exponent 38 308 4932 DFP Decimal IEEE 754r FP Significant digits 7 16 34 Maximum exponent96 384 6144 All of these formats are supported by z390 on Windows and Linux with CTD and CFD conversion routine macros and supervisor calls for converting between EBCDIC/ASCII character scientific notation and any of the above binary formats. All corrections and comments welcome. Don Higgins [EMAIL PROTECTED] www.z390.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
On Sun, 27 Apr 2008 12:11:49 -0400 John P. Baker [EMAIL PROTECTED] wrote: : 1. How are we to distinguish between a binary floating-point literal, a :decimal floating-point literal, and a hexadecimal floating-point literal? What is a binary floating point literal? Or a hexadecimal floating point literal? They would tend to be simple data not converted by the compiler. : 2. How are we to distinguish between a four-byte floating-point literal, :an eight-byte floating-point literal, and a sixteen-byte floating-point :literal? Typically E is used for short, D is used for long and L is now being used for double long. :Some examples I have seen use various letter suffixes to indicate length and :format. But is there a standard? Should be. 1.5E+0 - short. 1.5D+0 - long. 1.5L+0 - double long. What are you trying to do? Determine an interchange format? :-Original Message- :From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf :Of Don Higgins :Sent: Sunday, April 27, 2008 8:41 AM :To: IBM-MAIN@BAMA.UA.EDU :Subject: Re: Fixed-Point and Scientific Notation : :John, all : :Here are some references and summary info I've collected: : :Standard Scientific Notation: : General description and references: :http://en.wikipedia.org/wiki/Scientific_notation : IBM Hursley generalized description of scientific notation conversion: :http://www2.hursley.ibm.com/decimal/daconvs.html#reftonum : Arithmetic Model: :http://www2.hursley.ibm.com/decimal/damodel.html : :Note this model is based on IEEE 854, ANSI X3-274 standards. :Unfortunately these standards are only available in published form for a :fee. (Commentary: It would be a tremendous service to the world if a :non-profit organization could be started to move all standards :publications to the public domain to help promote understanding and use of :non-proprietary standards. Charging for them makes them all proprietary!) : :So in summary the standard form would appear to be: : : 1. Sign (+optional) : : 2. Mantissa (decimal digits with optional period up to maximum :significant digits for binary format) : : 3. Exponent (optional) : a. E (E or e optional if sign included) : b. Sign (+optional if E or e) : c. Power of ten (exponent digits with no decimal up to maximum :exponent) : :The maximum limits for each IBM fixed and floating point HFP, BFP, and DFP :format can be found in the latest Principles of Operations Manual here: : :http://publibfp.boulder.ibm.com/epubs/pdf/dz9zr006.pdf : :In summary the significant decimal digits and base 10 exponents are as :follows: : : Summary of IBM Fixed and Floating Point Scientific Notation Limits : Type of number 32 bit 64 bit 128 bit : : Fixed Point Integers : Significant digits 10 19 39 : : HFP Hexadecimal FP : Significant digits 7 15 34 : Maximum exponent 75 75 75 : : : BFP Binary IEEE 754 FP : Significant digits 7 16 34 : Maximum exponent 38 308 4932 : : DFP Decimal IEEE 754r FP : Significant digits 7 16 34 : Maximum exponent96 384 6144 : :All of these formats are supported by z390 on Windows and Linux with CTD :and CFD conversion routine macros and supervisor calls for converting :between EBCDIC/ASCII character scientific notation and any of the above :binary formats. All corrections and comments welcome. -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
Actually, I am working on a lexical analyzer and parser for a future product. The issue is that we have three formats (binary, decimal, and hexadecimal) and three lengths (4, 8, and 16). Clearly, we must have a letter to indicate the start of the exponent. However, a numeric literal may not have an exponent. Therefore, it does not seem prudent to use that exponent initiator to specify either the length or the format. The best approach would seem to be to permit 0-2 suffix letters to a numeric literal which will identify the format and length. If we use E/e to indicate an exponent, then we cannot use E/e as a suffix character, since we are unable to distinguish the context properly. So we need to determine what characters should be used for the various formats and lengths. Should we care in which order the format and length characters are specified? If format and/or length characters are not specified, how should we determine what format and/or length should apply to the numeric literal? Obviously, we can look at the number of digits specified and the value of the exponent, if any. However, in many cases these will be insufficient. We can look and the surrounding context, but that adds a level of complexity which may not be necessary. Ideas and suggestions, please. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Binyamin Dissen Sent: Sunday, April 27, 2008 1:06 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Fixed-Point and Scientific Notation Typically E is used for short, D is used for long and L is now being used for double long. Should be. 1.5E+0 - short. 1.5D+0 - long. 1.5L+0 - double long. What are you trying to do? Determine an interchange format? -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: zIIPs zAAP exploitation
I may be wrong, but I believe the number of older hardware you quote below is much higher than 1%. I suspect that shops with hardware that old don't send people to Share very often. Eric Bielefeld On Sun, 27 Apr 2008 10:46:42 -0400, Cheryl Walker [EMAIL PROTECTED] wrote: Ed, Thanks for including this. These were the numbers from the August 2007 SHARE. Below I've included the results from Feb 2008, and you can see that it really hasn't changed much. I'm in the middle of writing now, so I've not been watching IBM-Main. If you ever need anything, just send me a post offline. You can get Cheryl's presentation from http://www.watsonwalker.com/PR080229.pdf. Slide 4 contains the survey questions: Current Server Type (now or within next 12 months) z800, z900, z890 (23% at last SHARE)? - 34% 2/08 z990 (23%)? - 18% z9-BC (24%)? - 19% z9-EC (38%)? - 32% Z10? - 8% Older Hardware (1%)? - 1% Using zAAP Processors (32)? - 34 Using zIIP Processors (40)? - 41 Have Used On/Off Capacity on Demand (21)? - 31 Using Variable WLC Pricing (31)? - 31 Doing Heavy Cryptographic Work (9)? - 10 Who is exploiting the full 65,520 cylinders of a 3390-54? - 7 Best regards, Cheryl Watson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
On Sun, 27 Apr 2008 13:35:35 -0400 John P. Baker [EMAIL PROTECTED] wrote: :Actually, I am working on a lexical analyzer and parser for a future :product. :The issue is that we have three formats (binary, decimal, and hexadecimal) :and three lengths (4, 8, and 16). :Clearly, we must have a letter to indicate the start of the exponent. :However, a numeric literal may not have an exponent. :Therefore, it does not seem prudent to use that exponent initiator to :specify either the length or the format. :The best approach would seem to be to permit 0-2 suffix letters to a numeric :literal which will identify the format and length. :If we use E/e to indicate an exponent, then we cannot use E/e as a :suffix character, since we are unable to distinguish the context properly. :So we need to determine what characters should be used for the various :formats and lengths. :Should we care in which order the format and length characters are :specified? :If format and/or length characters are not specified, how should we :determine what format and/or length should apply to the numeric literal? :Obviously, we can look at the number of digits specified and the value of :the exponent, if any. However, in many cases these will be insufficient. :We can look and the surrounding context, but that adds a level of complexity :which may not be necessary. But it would be the most reasonable way. If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e., DOUBLE A,B . A = B+1.23 would use a short 1.23 rather than determining that the other operands were double thus 1.23 should be treated as a double as well. One had to do A = B+1.23D0 It would behoove you to determine the context to generate the best values. If your parser will support scaled values, 1.23 may not even be a floating point number - it may be a fixed scaled value. In general it is best to make things easier for the carbon life forms creating and using the data rather than the silicon non-life forms processing the data (even if it does cause more initial work for the carbon life forms programming the silicon). :Ideas and suggestions, please. : :John P. Baker : :-Original Message- :From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf :Of Binyamin Dissen :Sent: Sunday, April 27, 2008 1:06 PM :To: IBM-MAIN@BAMA.UA.EDU :Subject: Re: Fixed-Point and Scientific Notation : :Typically E is used for short, D is used for long and L is now being used :for :double long. : :Should be. : :1.5E+0 - short. :1.5D+0 - long. :1.5L+0 - double long. : :What are you trying to do? Determine an interchange format? -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: zIIPs zAAP exploitation
On Sun, 27 Apr 2008 12:58:30 -0500 Eric Bielefeld [EMAIL PROTECTED] wrote: :I may be wrong, but I believe the number of older hardware you quote below is :much higher than 1%. I suspect that shops with hardware that old don't send :people to Share very often. There is the missing Don't know, which may skew the results or lead people to guess. :On Sun, 27 Apr 2008 10:46:42 -0400, Cheryl Walker :[EMAIL PROTECTED] wrote: :Thanks for including this. These were the numbers from the August 2007 :SHARE. Below I've included the results from Feb 2008, and you can see that :it really hasn't changed much. :I'm in the middle of writing now, so I've not been watching IBM-Main. If :you ever need anything, just send me a post offline. : You can get Cheryl's presentation from : http://www.watsonwalker.com/PR080229.pdf. Slide 4 contains the survey : questions: :Current Server Type (now or within next 12 months) : z800, z900, z890 (23% at last SHARE)? - 34% 2/08 : z990 (23%)? - 18% : z9-BC (24%)? - 19% : z9-EC (38%)? - 32% : Z10? - 8% : Older Hardware (1%)? - 1% : Using zAAP Processors (32)? - 34 : Using zIIP Processors (40)? - 41 : Have Used On/Off Capacity on Demand (21)? - 31 : Using Variable WLC Pricing (31)? - 31 : Doing Heavy Cryptographic Work (9)? - 10 : Who is exploiting the full 65,520 cylinders of a 3390-54? - 7 -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
How is SRBPTCB instantiated?
How is SRB to TCB percolation instantiated? Is an automatic FRR added which does the percolation if nothing recovers? Stored somewhere in memory? -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Floating Point Definitions
Speaking of Floating Point, I want to use some of the floating point registers for general register purposes. I was told I could do this but I don't understand how to define them in the assembler language program. For instance, I would define a general register with an equate such as: R10 EQ 2 Equate Register 2 to R10 However I would I do this for Floating point register 3. Hope my questions is clear. And do I have to normalize the floating point register to use it for normal addresses? Thanks. Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now. http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Floating Point Definitions
On Sun, 27 Apr 2008 11:28:00 -0700 Howard Rifkind [EMAIL PROTECTED] wrote: :I want to use some of the floating point registers for :general register purposes. I was told I could do this :but I don't understand how to define them in the :assembler language program. Only for some purposes. :For instance, I would define a general register with :an equate such as: :R10 EQ 2 Equate Register 2 to R10 :However I would I do this for Floating point register :3. :Hope my questions is clear. :And do I have to normalize the floating point register :to use it for normal addresses? You can't use them to address data. You can save a GPR in an FPR with the appropriate hardware, but it would lead to most confusing code (IMHO). You can use them for fixed point operations. -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
In many cases, the user may simply specify 1.75E+6, the context will determine both the format and the length, and everything will be fine. However, there are other computational situations where the use of a particular format and/or length is important, and the choice of an incorrect format and/or length may result in miniscule computational errors, which then grow into significant errors through a subsequent series of computations. It is therefore necessary that the capability to specify formats and lengths be present. I am currently considering suffix characters of B (binary), D (decimal), and H (hexadecimal). However, I need to come up with a scheme for the specification of length. S (single) and Q (quad) would seem to work, but D (double) would already be in use as D (decimal). John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Binyamin Dissen Sent: Sunday, April 27, 2008 2:20 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Fixed-Point and Scientific Notation If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e., DOUBLE A,B . A = B+1.23 would use a short 1.23 rather than determining that the other operands were double thus 1.23 should be treated as a double as well. One had to do A = B+1.23D0 It would behoove you to determine the context to generate the best values. If your parser will support scaled values, 1.23 may not even be a floating point number - it may be a fixed scaled value. In general it is best to make things easier for the carbon life forms creating and using the data rather than the silicon non-life forms processing the data (even if it does cause more initial work for the carbon life forms programming the silicon). -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Authorized Rexx Assembler Function
Not to overbeat this dead horse, but I thought I'd add another one to the list here of ways to call authorized commands from TSO or Rexx. By adding an authorized module name (in authorized library) to the IKJTSOxx AUTHCMD list and calling it from TSO or Rexx. CALL *(authmodule). It only kinda sorta fits because it really isn't a Rexx or TSO function per se and other than passing information to it through a file and retrieving the results from a file (or PUTLINEs) I can't think of any better way to interact with it. (Nothing better than the TSO service routine that is). Lindy -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Edward Jaffe Sent: 15. huhtikuuta 2008 20:42 To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Authorized Rexx Assembler Function Lindy Mayfield wrote: For completeness, since I started this whole, ah, thing, I'm curious what they are. Here are the techniques I've learned so far, including the one that violates system integrity: __ The standard acceptable method is to call TSO/E Service Facility, IKJEFTSR and pass it the name of an authorized module. __ Call an SVC that flips the JSCBAUTH bit back on. This is non-standard. If it is to be implemented even on a development system then added security needs to be built in to make sure it isn't misused. I don't believe it's possible to add security to ensure this method doesn't get misused. (I'm almost sorry you posted it as an option.) The whole issue of validating the SVC caller is a hairy one. And, the requirements -- for example, to not even preserve a single register or storage address across the call -- are onerous. But, even more of a problem is the idea of setting JSCBAUTH. That flag affects all TCBs in the job step tree. It would be a fairly trivial matter for a savvy programmer to ATTACH a TCB that loops waiting for this flag to be turned on by the SVC running your code in another TCB. To protect against this, you would essentially have to make all TCBs in the address space non-dispatchable *before* JSCBAUTH was turned on. And, leave things that way until after JSCBAUTH is turned off again. This is not unlike what is done with IKJEFTSR. Your program runs under the authorized leg of the TMP. All unauthorized TCBs are made non-dispatchable while the authorized code runs. Keep in mind that similar integrity issues apply to any action that offers additional privilege to unauthorized work running asynchronously in the address space. For example, AXSET. __ Simply put all the authorized stuff into an SVC or PC routine. That's all I've collected so far. Are there more ways? Lindy -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 [EMAIL PROTECTED] http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Authorized Rexx Assembler Function
I can't think of any, but Alex can, thanks. IKJCT441. I forgot, it has such a memorable name. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Lindy Mayfield Sent: 27. huhtikuuta 2008 21:52 To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Authorized Rexx Assembler Function other than passing information to it through a file and retrieving the results from a file (or PUTLINEs) I can't think of any better way to interact with it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fixed-Point and Scientific Notation
On Sun, 27 Apr 2008 14:37:10 -0400 John P. Baker [EMAIL PROTECTED] wrote: :In many cases, the user may simply specify 1.75E+6, the context will :determine both the format and the length, and everything will be fine. :However, there are other computational situations where the use of a :particular format and/or length is important, and the choice of an incorrect :format and/or length may result in miniscule computational errors, which :then grow into significant errors through a subsequent series of :computations. In which cases would it not be resolvable via context? :It is therefore necessary that the capability to specify formats and lengths :be present. :I am currently considering suffix characters of B (binary), D (decimal), :and H (hexadecimal). :However, I need to come up with a scheme for the specification of length. :S (single) and Q (quad) would seem to work, but D (double) would :already be in use as D (decimal). I would suggest that if the format cannot be determined by context, that the raw data as specified be retained with a flag indicating the situation. Then when finally used it can be properly handled. Such as FIELD1 = 1.23 Without knowing what FIELD1 is, the data cannot be properly stored to be used as is. But it can be retained as a scaled fixed field (which would be exact) and then when used in a floating point expression be properly converted to the correct form. But, all in all, it ain't my dog. :-Original Message- :From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf :Of Binyamin Dissen :Sent: Sunday, April 27, 2008 2:20 PM :To: IBM-MAIN@BAMA.UA.EDU :Subject: Re: Fixed-Point and Scientific Notation : :If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e., : :DOUBLE A,B :. :A = B+1.23 : :would use a short 1.23 rather than determining that the other operands were :double thus 1.23 should be treated as a double as well. : :One had to do : :A = B+1.23D0 : :It would behoove you to determine the context to generate the best values. : :If your parser will support scaled values, 1.23 may not even be a floating :point number - it may be a fixed scaled value. : :In general it is best to make things easier for the carbon life forms :creating :and using the data rather than the silicon non-life forms processing the :data :(even if it does cause more initial work for the carbon life forms :programming :the silicon). -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How is SRBPTCB instantiated?
On Apr 27, 2008, at 11:26 AM, Binyamin Dissen wrote: How is SRB to TCB percolation instantiated? Is an automatic FRR added which does the percolation if nothing recovers? Stored somewhere in memory? Its your obligation to initialize it. In the case of STARTIO, you do it this way: STARTIO SRB=,TCB= (original way) or STARTIO SRB=,TCB=0 (new way) in the second case, the IECIOSCN grabs the TCB address from PSATOLD. There are numerous cases where the first (and which was formerly the only) way is required: when I/O is started from within a process which itself is run under an SRB, or, possibly, is run in a disabled interrupt exit (DIE) and for which the TCB and the SRB currently dispatched are completely arbitrary (taken to mean indeterminate). In the basic case of a SCHEDULE, the user initializes the field to associate the SRB with its TCB. No automatic FRR that I am aware of. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How is SRBPTCB instantiated?
On Sun, 27 Apr 2008 12:05:46 -0700 Peter [EMAIL PROTECTED] wrote: :On Apr 27, 2008, at 11:26 AM, Binyamin Dissen wrote: : How is SRB to TCB percolation instantiated? : Is an automatic FRR added which does the percolation if nothing : recovers? : Stored somewhere in memory? :Its your obligation to initialize it. :In the case of STARTIO, you do it this way: :STARTIO SRB=,TCB= (original way) :or :STARTIO SRB=,TCB=0 (new way) :in the second case, the IECIOSCN grabs the TCB address from PSATOLD. :There are numerous cases where the first (and which was formerly the :only) way is required: when I/O is started from within a process :which itself is run under an SRB, or, possibly, is run in a disabled :interrupt exit (DIE) and for which the TCB and the SRB currently :dispatched are completely arbitrary (taken to mean indeterminate). :In the basic case of a SCHEDULE, the user initializes the field to :associate the SRB with its TCB. :No automatic FRR that I am aware of. But once the code associated with the SRB gets control the SRB becomes mere data. Upon abend the SRB contents cannot be used by the system to determine where/if to percolate. My query was more as to how something getting control in the context of SRB mode can determine if there is an associated TCB. -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IXC102D and REPLY DOWN
I put this question to IBM recently and learned a difference between parallel sysplex (with CF) and basic sysplex (without). With CF supporting XCF, other systems are notified when one member is truly down. Without a CF, other systems *believe* a member is down but need operator confirmation. That difference matches our experience across the enterprise. . . JO.Skip Robinson Southern California Edison Company Electric Dragon Team Paddler SHARE MVS Program Co-Manager 626-302-7535 Office 323-715-0595 Mobile [EMAIL PROTECTED] Mike Myers [EMAIL PROTECTED] ICES.COM To Sent by: IBM IBM-MAIN@BAMA.UA.EDU Mainframe cc Discussion List [EMAIL PROTECTED] Subject .EDU IXC102D and REPLY DOWN 04/27/2008 05:45 AM Please respond to IBM Mainframe Discussion List [EMAIL PROTECTED] .EDU Hi: I'm looking to get clarification on whether or not the z/OS console IXC102A message requesting that the operator confirms that a member of a sysplex bas been reset always appears when a member is removed from the sysplex. The message I am referring to is: IXC102A XCF IS WAITING FOR SYSTEM sysname DEACTIVATION. REPLY DOWN WHEN MVS ON sysname HAS BEEN SYSTEM RESET I have been told that some installations never see it, and I suspect it it would not be replied to by automation without somehow managing to cause a system reset to occur on the member being removed. Not having the luxury of being able to set up an experiment on every known hardware and software configuration, I can't prove or disprove this contention. Does anyone know for sure? If it sometimes does NOT occur, do you know why? Mike Myers -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How is SRBPTCB instantiated?
On Apr 27, 2008, at 12:20 PM, Binyamin Dissen wrote: My query was more as to how something getting control in the context of SRB mode can determine if there is an associated TCB. SRBTCB is the associated TCB; the issuer of SCHEDULE must initialize it. The SRB may elect to establish an FRR, but it is not required to do so. Obviously, if an abnormal situation later occurs, the TCB pointed to by SRBTCB would be the one to ABTERM. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How is SRBPTCB instantiated?
On Sun, 27 Apr 2008 13:33:57 -0700 Peter [EMAIL PROTECTED] wrote: :On Apr 27, 2008, at 12:20 PM, Binyamin Dissen wrote: : My query was more as to how something getting control in the : context of SRB : mode can determine if there is an associated TCB. :SRBTCB is the associated TCB; the issuer of SCHEDULE must initialize it. :The SRB may elect to establish an FRR, but it is not required to do so. :Obviously, if an abnormal situation later occurs, the TCB pointed to :by SRBTCB would be the one to ABTERM. My issue was not how to set it, but how to detect it from the code running in SRB mode. It appears that LCCAPGTA may contain the data. -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How is SRBPTCB instantiated?
On Apr 27, 2008, at 2:48 PM, Binyamin Dissen wrote: :Obviously, if an abnormal situation later occurs, the TCB pointed to :by SRBTCB would be the one to ABTERM. My issue was not how to set it, but how to detect it from the code running in SRB mode. It appears that LCCAPGTA may contain the data. Trace back from the LPSW in the dispatcher, and you'll certainly find your answer. Not sure why you are seeking a derivative source, when the actual source (SRBTCB) is already known. However, the dispatcher is known to play some very mean tricks, and perhaps that's what you're seeking. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How is SRBPTCB instantiated?
How is SRB to TCB percolation instantiated? RTM1 looks for and dispatches any FRRs that are active. When all of those have percolated, it locates the designated victim TCB (hidden under a rock at SCHEDULE time) and schedules an ABTERM to that task. That victim task's current recovery routine (if any) gets an SDWA with the SDWAERRx flags set to indicate the task/RB wasn't in control at the time of the error. If you don't spot those the error can be an utter mystery. Is an automatic FRR added which does the percolation if nothing recovers? No. It is RTM itself that does all of that. Stored somewhere in memory? Well obviously it must be, but it is not something you can change. The identity of the victim is placed in SRBPTCB prior to the SCHEDULE macro being issued. The system stores that under a rock prior to dispatching the SRB and in the SSRB if the SRB is suspended. You can probably figure out what rock that is, but it would be a bad idea to try to change it. As an OBTW, I really don't like this particular behavior. It was a cheesy way to indicate to the scheduler that the SRB had gone belly up. It is a royal pain in the butt dealing with asynchronous abends arising from this particular piece of arcana. I never set the purge TCB address in SRBs that I use. Something a little more elegant is called for. CC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How is SRBPTCB instantiated?
On Apr 27, 2008, at 5:10 PM, Craddock, Chris wrote: As an OBTW, I really don't like this particular behavior. It was a cheesy way to indicate to the scheduler that the SRB had gone belly up. It is a royal pain in the butt dealing with asynchronous abends arising from this particular piece of arcana. I never set the purge TCB address in SRBs that I use. Something a little more elegant is called for. I strongly suspect the Basic IOS group had a lot to do with SCHEDULE and its weird behavior. It was necessary to get IOS to work across all available CPUs and with the barest minimum being done under task mode and/or CPU dependent. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CPACF performance info?
If you don't have a crypto coprocessor (CEX2 or PCIXCC) installed, then you won't have master keys and you can't store keys in the CKDS or PKDS. ICSF will still start, and a few APIs are available, but on the CPACF based machines (z890/z990 and later) most of the APIs require the secure coprocessor. You must have a secure coprocessor to store symmetric keys in the CKDS and asymmetric (public/private) keys in the PKDS. And ICSF does not 'switch' to software encryption if it can't find the hardware. The only encryption that ICSF will do in software is AES when running on a server that does not provide AES in hardware (AES-128 is supported on the CPACF in the z9, and AES-128, AES-192 and AES-256 in the CPACF on the z10). You're probably thinking of System SSL which does provide software routines to perform encryption if ICSF or the appropriate hardware is not available. For System SSL, PKA (public/private) keys are used to authenticate the parties and those keys may come from the PKDS. After authentication, data is exchanged using a symmetric key established during the handshake, but those symmetric keys are not stored in the CKDS. You might review some of the crypto related documents on the IBM TechDocs website (www.ibm.com/support/techdocs and search on Crypto). Consider that a shameless plug, since I wrote some of those documents :-) Greg Boyd IBM WSC, System z Crypto -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IBM-MAIN Digest - 26 Apr 2008 to 27 Apr 2008 (#2008-118)
Someone wrote: If I recall correctly, FORTRAN/PLI needed explicit exponentiation, i.e., DOUBLE A,B . A = B+1.23 would use a short 1.23 rather than determining that the other operands were double thus 1.23 should be treated as a double as well. One had to do A = B+1.23D0 Fortran traditionally used the exponent letter. PL/I traditionally used the form as written to determine the precision and scale. That is, 123.000E0 would be FLOAT DECIMAL(10). Binary used the suffix B, and the value was given in binary digits (with a decimal exponent). .011E3B for FLOAT BINARY(7). Some compilers now might support exponent letters other than E. Also, there are PL/I intrinsic functions if one wants a different base, scale, precision, or mode. BINARY(123E0,50) for example. C uses the suffix f for float (single precision), the default being double. More recently, Fortran has KIND specified with a suffix with the appropriate constant value, usually the result of an intrinsic function. -- glen -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IXC102D and REPLY DOWN
I'm looking to get clarification on whether or not the z/OS console IXC102A message requesting that the operator confirms that a member of a sysplex bas been reset always appears when a member is removed from the sysplex. No. In order for it NOT to appear, 1. You must have a parallel sysplex with at least one CF. 2. You must have an SFM policy active. Then all but the last system can be system-reset automagically through the CF (initiated by SFM, and you don't see it). The last system in the sysplex has to be system-reset manually, as there is no one else around in the sysplex to do it. But then you wouldn't see that message, either. As the message states, you may see IXC102A when both 1 and 2 above are fulfilled. The only time I ever saw it I followed up on it and it turned out that there was a bug somewhere in coexistence code between releases, and I should not have seen the message at all. I have been told that some installations never see it, and I suspect it it would not be replied to by automation without somehow managing to cause a system reset to occur on the member being removed. Well, if you reply to it via automation and that automation is not capable of actually system-resetting the lpar before replying, then you may be in deep do-do, and it's all your fault. :-) Regards, Barbara Nitz -- GMX startet ShortView.de. Hier findest Du Leute mit Deinen Interessen! Jetzt dabei sein: http://www.shortview.de/[EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html