Re: 3270 Software for Mac

2008-06-11 Thread Mark Wilson
what 3270 software do you use to connect to your mainframes?

mark

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



EXCP access methos

2008-06-11 Thread Paul Ip
Hi,

Today, I was trying to have a DSORG=PS DASD dataset (output from 
ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where 
B8 means An OPEN was attempted against an extended-format data set with 
a DCB that specified EXCP. EXCP is not supported for extended-format data 
sets according to manul.

Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per 
volume limit.

However, I don't know that output file (DSORG=PS) from ADRDSSU is using 
EXCP access method and how do I know if a DASD dataset was proccessed by 
EXCP instead of QSAM access method??

Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
dataset was processed by EXCP access method??

Can anyone give me a hint? Thanks

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread shai hess
Every access method uses Excp, every Excp uses STARTIO and every STARTIO
uses SSCH.

On 6/11/08, Paul Ip [EMAIL PROTECTED] wrote:

 Hi,

 Today, I was trying to have a DSORG=PS DASD dataset (output from
 ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where
 B8 means An OPEN was attempted against an extended-format data set with
 a DCB that specified EXCP. EXCP is not supported for extended-format data
 sets according to manul.

 Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per
 volume limit.

 However, I don't know that output file (DSORG=PS) from ADRDSSU is using
 EXCP access method and how do I know if a DASD dataset was proccessed by
 EXCP instead of QSAM access method??

 Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the
 dataset was processed by EXCP access method??

 Can anyone give me a hint? Thanks

 Paul

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread R.S.

Paul Ip wrote:
[...]
Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
dataset was processed by EXCP access method??


EXCP is low level access method, so DSORG is not a clue.
In fact EXCP access method is a kind of general description for any 
untypical access methods and their possible untypical shortcomings.
It can be no support for extfmt-PS, it can be limitation to first 64k 
tracks on volume (afaik it existed in Adabas), it can be 
geometry-dependance etc. etc.


--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2008 r. kapita zakadowy BRE Banku SA  wynosi 
118.642.672 zote i zosta w caoci wpacony.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Vernooy, C.P. - SPLXM


R.S. [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]...
 Paul Ip wrote:
 [...]
  Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
  dataset was processed by EXCP access method??
 
 EXCP is low level access method, so DSORG is not a clue.
 In fact EXCP access method is a kind of general description for any 
 untypical access methods and their possible untypical shortcomings.
 It can be no support for extfmt-PS, it can be limitation to first 64k 
 tracks on volume (afaik it existed in Adabas), it can be 
 geometry-dependance etc. etc.
 
 -- 
 Radoslaw Skorupka

At a higher level, the difference between EXCP and an Access Methods is
that if 'you' do I/O with EXCP, 'you' build your own channel programs
i.s.o. the Access Method, so 'you' must enhance your application to
support extended format datasets, i.s.o. the Access Method. If you use
an Access Method you can expect IBM to enhance the Access Method to
support the new datasets.

Kees.
**
For information, services and offers, please visit our web site:
http://www.klm.com. This e-mail and any attachment may contain
confidential and privileged material intended for the addressee
only. If you are not the addressee, you are notified that no part
of the e-mail or any attachment may be disclosed, copied or
distributed, and that any other action related to this e-mail or
attachment is strictly prohibited, and may be unlawful. If you have
received this e-mail by error, please notify the sender immediately
by return e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries
and/or its employees shall not be liable for the incorrect or
incomplete transmission of this e-mail or any attachments, nor
responsible for any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal
Dutch Airlines) is registered in Amstelveen, The Netherlands, with
registered number 33014286 
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Paul Gilmartin
On Wed, 11 Jun 2008 08:03:27 -0400, Bob Shannon wrote:

In fact EXCP access method is a kind of general description for any 
untypical access methods and their possible untypical shortcomings.
It can be no support for extfmt-PS, it can be limitation to first 64k tracks 
on volume (afaik it existed in Adabas), it can be geometry-dependance etc. 
etc.

EXCP is a perfectly valid access method; it just requires more skill, and more 
detailed work, then using something such as QSAM. Regardless of the access 
method, CCWs are used to access data on a volume. This indicates that EXCP is 
used under the covers by the higher access methods. The only reason that EXCP 
cannot be used for extended format datasets or PDSEs is that IBM installed 
checks to prevent it. There is nothing inherent in EXCP itself that prevents 
it from being used for any data type.

I'm naive here.  I suspect many of my misconceptions will be
promptly corrected.

It's my understanding that for many decades EXCP has not executed
channel programs in place and as provided by the caller.  Rather,
they are moved to protected storage so the user can not modify
them on the fly; they are prefixed to prevent seeks to prohibited
tracks; virtual addresses are translated to real; etc.  I'd
further expect changes to CCW architecture to accommodate XA and
later 64-bit addressing and new I/O architecture.  So the checks
to prevent it may be a matter of IBM's resource allotment: rather
than continually update EXCP code to all new hardware features,
it's easier simply to prohibit use of EXCP for such purposes.

It has always struck me as bizarre that the OS supports running
channel programs built by problem-state programs.  This is secure
only if the channel programs are in effect interpreted rather than
executed directly.  A more rational layering of functions should
have channel programs built only by trustworthy supervisor-state
code.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Paul Ip
Thanks for the reply!

In fact, my target is to overome the 65536 tracks limit on a volume for SMS 
Datasets, so there are two approaches for me:
1. Extended Format
2. DSNTYPE=LARGE

At the beginning, I tried to apply Extended Format for all SMS datasets, if the 
dataset is an output of COBOL program, assigning Extended Format is ok 
(DSORG=PS-E). However, it is failed when I tried to apply the Extended 
Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it 
said ...a DCB that specified EXCP...

I should rephrase my question as: why the output of ADRDSSU DUMP can't be 
assigned with Extented Format? What is actually a DCB that specified EXCP 
means from IEC143I 213-B8 (I was wondering if it is talking about the dataset 
is under a dataset type of 'EXCP'...)?

...In addition, I don't know there is a dataset type called 'EXCP' until I 
found 
the following from DFDSSdss Storage Admin. Guide:
DFSMSdss can copy, dump, and restore data sets of the following types:  
DATABASE 2(TM) (DB2?;)
Direct access
EXCP (execute channel program)  Dataset Type = EXCP???
Partitioned, including:
PDS (partitioned data set)
PDSE (partitioned data set extended)
HFS (hierarchical file system) data set
Sequential, including extended-format data sets and Large Format data sets
VSAM data sets that are cataloged in an ICF catalog, including:
ESDS (entry-sequenced data set)
KSDS (key-sequenced data set)
KSDS with key ranges
LDS (linear data set)
RRDS (relative record data set)
VRRDS (variable relative record data set)
Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, 
KSDS, LDS, RRDS, and VRRDS
Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including 
striped ESDS, KSDS, LDS, RRDS, and VRRDS
zFS (zSeries? file system) data set
Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with 
OPTCD=A).

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Paul Gilmartin
Sent: Wednesday, June 11, 2008 8:26 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: EXCP access methos

On Wed, 11 Jun 2008 08:03:27 -0400, Bob Shannon wrote:

SNIP
I'm naive here.  I suspect many of my misconceptions will be promptly
corrected.

It's my understanding that for many decades EXCP has not executed
channel programs in place and as provided by the caller.  Rather, they
are moved to protected storage so the user can not modify them on the
fly; they are prefixed to prevent seeks to prohibited tracks; virtual
addresses are translated to real; etc.  I'd further expect changes to
CCW architecture to accommodate XA and later 64-bit addressing and new
I/O architecture.  So the checks to prevent it may be a matter of
IBM's resource allotment: rather than continually update EXCP code to
all new hardware features, it's easier simply to prohibit use of EXCP
for such purposes.

It has always struck me as bizarre that the OS supports running channel
programs built by problem-state programs.  This is secure only if the
channel programs are in effect interpreted rather than executed
directly.  A more rational layering of functions should have channel
programs built only by trustworthy supervisor-state code.
SNIP

Ok, here goes from about the 10,000' level. You are basically correct
when it comes to VM. If you are not a preferred guest, then expect ALL
your CCWs to be interpreted.

If you are a preferred guest, then you get dispatched with SIE (Start
Interpretive Execution, or some equivalent in the IEF, Interpretive
Execution Facility -- been gone from H/W for too long) where VM sets
certain masks And so some or all of your CCWs will basically be run
as written.

NOW for the MVS world. The system will start your CCWs AFTER it has
run its initial chain (by a TIC to your first CCW). Depending on the H/W
(devices, controllers, channels, etc.) will determine which of the
control CCWs will be executed to LIMIT what your CCW string is allowed
to do (such as setting CYL LIMITS where you can't seek outside of those
without getting your hand slapped).

I'm sure that others will be able to take you down to the settings of
the ORB, SCHIB, etc. should it be needed.

Regards,
Steve Thompson

-- All opinions expressed by me are my own and may not necessarily
reflect those of my employer. --

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Edward Jaffe

Paul Ip wrote:

Hi,

Today, I was trying to have a DSORG=PS DASD dataset (output from 
ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where 
B8 means An OPEN was attempted against an extended-format data set with 
a DCB that specified EXCP. EXCP is not supported for extended-format data 
sets according to manul.


Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per 
volume limit.


However, I don't know that output file (DSORG=PS) from ADRDSSU is using 
EXCP access method and how do I know if a DASD dataset was proccessed by 
EXCP instead of QSAM access method??


Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
dataset was processed by EXCP access method??


Can anyone give me a hint? Thanks
  


Technically, you can never really be sure if EXCP was used for a 
supported data set. The gentleman's agreement used by z/OS 
applications is the specification of MACRF=E on the DCB at OPEN time. 
For EF data sets, that triggers the abend you are seeing.


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: 3270 Software for Mac

2008-06-11 Thread Gerhard Postpischil

Mark Wilson wrote:

what 3270 software do you use to connect to your mainframes?


BlueZone from seagullsoftware.com for serious work (supports 
graphics, 3290 partitions, and a few other fancies). Inexpensive 
for the provided features and support.


Vista from Tom Brennan software. $30, doesn't support graphics 
nor partitions, but is easy and convenient to use, and a single 
user license is allows me to run it on all my machines.


I tried x3270 and qws3270, but found them lacking.

Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: 3270 Software for Mac

2008-06-11 Thread Howard Brazee
On 11 Jun 2008 07:15:18 -0700, [EMAIL PROTECTED] (Gerhard
Postpischil) wrote:

 what 3270 software do you use to connect to your mainframes?

BlueZone from seagullsoftware.com for serious work (supports 
graphics, 3290 partitions, and a few other fancies). Inexpensive 
for the provided features and support.

We use that for Windows - is there a Mac version as well?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methods

2008-06-11 Thread Ron Hawkins
Paul,

It is not the DSORG that has to support Extended Format, it is the ACCESS
METHOD. The DSORG defines and extended format dataset, but the Access Method
has to support IO to it.

As far as I know QSAM and BSAM are the only Access Methods that support
PS-E.

Before converting to PS-E on a large scale you need to check for datasets
that are being accessed by other Access Methods. You can find this in the
Type 14 and 15 SMF records. If you have MXG this is a relatively simple
exercise - sometimes the harder part is incorporating the results into your
ACS logic. 

Also be aware that some utilities like DFSORT and SYNCSORT will
automatically detect PS-E and use BSAM to process the files in place of
EXCP. You don't have to exclude datasets just because you sort them.

Ron

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Paul Ip
 Sent: Wednesday, June 11, 2008 6:51 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: [IBM-MAIN] EXCP access methos
 
 Thanks for the reply!
 
 In fact, my target is to overome the 65536 tracks limit on a volume for
 SMS
 Datasets, so there are two approaches for me:
 1. Extended Format
 2. DSNTYPE=LARGE
 
 At the beginning, I tried to apply Extended Format for all SMS
 datasets, if the
 dataset is an output of COBOL program, assigning Extended Format is ok
 (DSORG=PS-E). However, it is failed when I tried to apply the Extended
 Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it
 said ...a DCB that specified EXCP...
 
 I should rephrase my question as: why the output of ADRDSSU DUMP can't
 be
 assigned with Extented Format? What is actually a DCB that specified
 EXCP
 means from IEC143I 213-B8 (I was wondering if it is talking about the
 dataset
 is under a dataset type of 'EXCP'...)?
 
 ...In addition, I don't know there is a dataset type called 'EXCP'
 until I found
 the following from DFDSSdss Storage Admin. Guide:
 DFSMSdss can copy, dump, and restore data sets of the following types:
 DATABASE 2(TM) (DB2?;)
 Direct access
 EXCP (execute channel program)  Dataset Type = EXCP???
 Partitioned, including:
 PDS (partitioned data set)
 PDSE (partitioned data set extended)
 HFS (hierarchical file system) data set
 Sequential, including extended-format data sets and Large Format data
 sets
 VSAM data sets that are cataloged in an ICF catalog, including:
 ESDS (entry-sequenced data set)
 KSDS (key-sequenced data set)
 KSDS with key ranges
 LDS (linear data set)
 RRDS (relative record data set)
 VRRDS (variable relative record data set)
 Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped
 ESDS,
 KSDS, LDS, RRDS, and VRRDS
 Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including
 striped ESDS, KSDS, LDS, RRDS, and VRRDS
 zFS (zSeries? file system) data set
 Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with
 OPTCD=A).
 
 Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Moving RACF databases

2008-06-11 Thread Angel Tamayo
Hi,

I need to move RACF databases to another volume. From RACF System
programmers manual I read chapter Recovery Procedures that could be useful,
but I wonder if anybody of you guys has any other procedure that could be
better.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methods

2008-06-11 Thread David Andrews
On Wed, 2008-06-11 at 07:26 -0700, Ron Hawkins wrote:
 Before converting to PS-E on a large scale you need to check for datasets
 that are being accessed by other Access Methods.

Other problematic ones include:
- ISPF recovery datasets
- temporary datasets allocated by CA-ENF

-- 
David Andrews
A. Duda and Sons, Inc.
[EMAIL PROTECTED]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: 3270 Software for Mac

2008-06-11 Thread Mansell, George R.
Seagull Software acquired by Rocket Software, Bluezone. Goes through a
server providing encryption to the desktop. On Windows active x, other
platforms java. 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Mark Wilson
Sent: Wednesday, June 11, 2008 1:13 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: 3270 Software for Mac

what 3270 software do you use to connect to your mainframes?

mark

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
NOTICE:  This electronic mail message and any attached files are confidential.  
The information is exclusively for the use of the individual or entity intended 
as the recipient.  If you are not the intended recipient, any use, copying, 
printing, reviewing, retention, disclosure, distribution or forwarding of the 
message or any attached file is not authorized and is strictly prohibited.  If 
you have received this electronic mail message in error, please advise the 
sender by reply electronic mail immediately and permanently delete the original 
transmission, any attachments and any copies of this message from your computer 
system. Thank you.

==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: 3270 Software for Mac

2008-06-11 Thread Mansell, George R.
For Gerhard Postpischil
Any problems with Bluezone graphics?
Build v4.1C2 Build 838  

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Mark Wilson
Sent: Wednesday, June 11, 2008 1:13 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: 3270 Software for Mac

what 3270 software do you use to connect to your mainframes?

mark

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
NOTICE:  This electronic mail message and any attached files are confidential.  
The information is exclusively for the use of the individual or entity intended 
as the recipient.  If you are not the intended recipient, any use, copying, 
printing, reviewing, retention, disclosure, distribution or forwarding of the 
message or any attached file is not authorized and is strictly prohibited.  If 
you have received this electronic mail message in error, please advise the 
sender by reply electronic mail immediately and permanently delete the original 
transmission, any attachments and any copies of this message from your computer 
system. Thank you.

==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Rick Fochtman

-snip-
I'm naive here. I suspect many of my misconceptions will be promptly 
corrected.


It's my understanding that for many decades EXCP has not executed 
channel programs in place and as provided by the caller. Rather, they 
are moved to protected storage so the user can not modify them on the 
fly; they are prefixed to prevent seeks to prohibited tracks; virtual 
addresses are translated to real; etc. I'd further expect changes to CCW 
architecture to accommodate XA and later 64-bit addressing and new I/O 
architecture. So the checks to prevent it may be a matter of IBM's 
resource allotment: rather than continually update EXCP code to all new 
hardware features, it's easier simply to prohibit use of EXCP for such 
purposes.

-unsnip---
Don't forget adjustments made for non-contiguous real storage areas 
containing buffers, etc. (IDAW anyone?) :-)


snip
It has always struck me as bizarre that the OS supports running
channel programs built by problem-state programs. This is secure only if 
the channel programs are in effect interpreted rather than executed 
directly. A more rational layering of functions should have channel 
programs built only by trustworthy supervisor-state code.

--unsnip
Makes perfect sense to me. Under OS/360, we didn't have the protection 
that CCW translation gives us today and it was incredibly easy to 
destroy part of the OS. But EXCP is much of the mechanism for developing 
support for new or exotic devices, like the old MCR/OCR gear that was so 
doggone timing-sensitive.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Rick Fochtman

--snip-
Every access method uses Excp, every Excp uses STARTIO and every STARTIO 
uses SSCH.

--unsnip---
IIRC, VSAM and the VSAM-like access methods use STARTIO directly.

At least those AM's that are ACB/RPL based.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Moving RACF databases

2008-06-11 Thread John Laubenheimer
The official supported method to move a RACF database is by using the 
utility IRRUT400.  This utility provides the proper ENQ and locking mechanisms 
to prevent updates to the database while the copy is in progress.  And, it's 
simple enough to use.

However, if you can afford the downtime, and have a 2nd completely 
independent operating system image, the database can be moved using 
FDR/DFSMSdss and/or IEBGENER/ICEGENER/SYNCGENR.  This is 
officially unsupported, but works, provided the databases are not in use (in 
any way) while the copy is in progress.

My opinion, always use IRRUT400.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread (IBM Mainframe Discussion List)
 
 
In a message dated 6/11/2008 8:25:57 A.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:
It's my understanding that for many decades EXCP has not  executed
channel programs in place and as provided by the  caller.
 
Back in the days before paging systems, back when there was no virtual  or 
real storage, back when storage was just called storage, EXCP would execute  
the channel program in place and as provided by the caller, but with extra CCWs 
 in front of the caller's first CCW.  These extra CCWs were added to insure  
data set integrity; i.e., the caller's channel program cannot go to any track  
that is not in the list of allocated extents created by OPEN.  I don't  
remember for sure, but it was probably possible for a caller to have a read  
command executed with a storage address that would cause data being read to  
overlay 
storage that was outside his region, partition, or whatever the big  chunk of 
storage was called.  So you could clobber the operating system as  well as 
other users' central storage with read commands.  The various DASD  access 
methods on these systems (OS/360, DOS/360, TOS/360, and BPS/360) were  QSAM, 
BSAM, 
BPAM, BDAM, ISAM, and QISAM.  They all used EXCP internally to  do I/O 
requests, except for possibly ISAM which sometimes had a naked SIO  instruction 
(or 
so I was told).  I don't know very much about the other  access methods for 
devices other than DASD and tape (e.g., TCAM, QTAM, and  BTAM), but I would 
guess 
that they all also used EXCP internally.
 
With the advent of virtual and real storage, IBM chose to require that the  
data addresses inside CCWs be interpreted by the I/O hardware as real  
addresses.  Thus a scheme was needed to convert from virtual addresses to  real 
addresses in order to make the transition to the new systems transparent to  
customers.  The MVS architects decided to create a new I/O concept called  IOS 
Driver which is a new layer of software that performs I/O requests without  
having 
to use EXCP.  They also invented a new access method called  STARTIO which 
replaced EXCP as the lowest possible level access method.   The ancient DASD 
access methods, QSAM etc., still use EXCP, but EXCP was  redesigned to 
interface between the callers of EXCP (ancient access methods),  which present 
EXCP 
with channel programs containing virtual addresses, and the  new lower level 
and 
thus intermediate, internal access method called STARTIO,  which assumes 
that the channel program is in non-pageable storage, with real  addresses of 
data, and which was built by a trusted software component.   Many new functions 
in MVS were designed to use STARTIO directly themselves, such  as the paging 
supervisor, while some new MVS components were designed to use  EXCP, probably 
in order to get the new code written most quickly.  JES2,  e.g., originally 
used EXCP (I haven't dealt with JES2 internals now for 20+  years, so it may be 
different now), probably because JES2 was developed from  HASP, which used 
EXCP, and that code was already well debugged, so why rewrite  it?
 
Rather,
they are moved to protected storage so the user can not  modify
them on the fly
 
Yes, unless you have EXCP appendages, but these must be loaded from an  
authorized library, so the customer can control their use.
 
they are prefixed to prevent seeks to prohibited
tracks; virtual  addresses are translated to real; etc.  I'd
further expect changes to  CCW architecture to accommodate XA and
later 64-bit addressing and new I/O  architecture.
 
Correct on all counts.
 
So the checks
to prevent it may be a matter of IBM's resource  allotment: rather
than continually update EXCP code to all new hardware  features,
it's easier simply to prohibit use of EXCP for such  purposes.
 
I concur.  Also IBM would like to encourage users to migrate all  
applications to the latest and greatest software and hardware solutions; 
namely,  VSAM, 
DFSMS, ESS controllers, etc., so typically IBM adds support to strategic  
products and components first and then maybe, reluctantly and much later, to  
non-strategic components.  They, too, have limited resources for developing  
new products and adding support for new products into other, older, products  
that must interface with the new products.
 
It has always struck me as bizarre that the OS supports  running
channel programs built by problem-state programs.  This is  secure
only if the channel programs are in effect interpreted rather  than
executed directly.  A more rational layering of functions  should
have channel programs built only by trustworthy  supervisor-state
code.
 
I don't know to what you are referring here by the OS.   Problem-state 
programs in z/OS build channel programs which are then converted  to safe, 
trusted 
equivalent channel programs by trusted software components  before being 
started by IOS.
 
In VM, CCWs are not interpreted as far as I know, but rather the channel  
program is scanned before being 

Re: 3270 Software for Mac

2008-06-11 Thread Howard Brazee
On 11 Jun 2008 08:28:47 -0700, [EMAIL PROTECTED] (Mansell, George
R.) wrote:

Seagull Software acquired by Rocket Software, Bluezone. Goes through a
server providing encryption to the desktop. On Windows active x, other
platforms java.

When we first got it, it only used Active-X.   I was very glad when it
added Java support.   I have no idea why the company didn't go Java
altogether, instead of checking browsers to decide whether to go
Active-X or Java.   

Every time you run it, it creates an icon on the desktop that
remembers what browser you used and assumes you are using it again.  I
recommend that people don't use that icon (I dislike stuff on my
desktop anyway).   To create a bookmark, I want them to use our first
web site, not the one they get redirected to that uses Active-X or
Java.   It's a pain to set up that bookmark.

I tried using it with Firefox for Macintosh, but it didn't work. That
may be because of the web page deciding it doesn't work.

We have some people trying to get the new version of Bluezone working
so that we can support Vista machines.   Meanwhile we have a lot of
angry users who can't use BlueZone reliably nor our VPN.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: STK-SUN-Brocade switch--2032 IOdef

2008-06-11 Thread Glenn Miller
Hi Ron,

You can contact me off-list at the email address:

[EMAIL PROTECTED]


Glenn Miller

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: STK-SUN-Brocade switch--2032 IOdef

2008-06-11 Thread Ron Wells
thanks for looking at this...getting conflict msg's on this.
trying again this weekend...better warm confort feeling someone else 
looking at it...


fyi

switch I am connecting to is a brocade 5000..

they say out of the box there is no confuration   getting various info 
on that too...but another issue

--
Email Disclaimer
This  E-mail  contains  confidential  information  belonging to the sender, 
which  may be legally privileged information.  This information is intended 
only  for  the use of the individual or entity addressed above.  If you are not 
 the  intended  recipient, or  an  employee  or  agent responsible for 
delivering it to the intended recipient, you are hereby notified that any 
disclosure,  copying, distribution, or the taking of any action in reliance on 
the contents of the E-mail or attached files is strictly prohibited.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Poll about telecommuting

2008-06-11 Thread Corneel Booysen
Hello everybody,

With gas prices up so much we thought we would host a poll about the state
of telecommuting. It is available at CICS World: http://www.cicsworld.com/

Thanks.
Corneel.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: SSL Timeout

2008-06-11 Thread Mark Pace
Well that didn't work.  And I had the firewall guy check his settings.  He
specifically raised the time-out value on that port to 1 hour. No
difference, 10 mins, connection dies - S622.

I wonder if the TIMEMARK and the other setting can be changed via OBEY or if
I need to restart the TN3270 server.

On Mon, Jun 9, 2008 at 5:12 PM, Mark Pace [EMAIL PROTECTED] wrote:

 When I saw the defaults in the manual I thought so also.  I've raised the
 time-out values to the default and I'm waiting on the person with the issue
 to report back to me.


 On Mon, Jun 9, 2008 at 4:52 PM, Mansell, George R. [EMAIL PROTECTED]
 wrote:

 Our firewall inactive timeout is 1 hour. When it happened it was nasty;
 Tcpip  Vtam resources were not recovered. We have Tcpip inactive set to
 timeout just before the firewall does. Your 10 minutes sounds awfully
 short.

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Mark Pace
 Sent: Monday, June 09, 2008 7:52 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: SSL Timeout

 Is there a parameter somewhere that will time-out an SSL connected
 TN3270
 session?  I've just converted our users from standard TN3270 sessions to
 SSL/TLS TN3270 sessions.  All users are using PCOMM.
 After converting, one user has called me and says that he gets
 disconnected
 from the system after about 10 mins with a S622 (terminal error).  Our
 TSO
 timeout in JWT is set to 1 hour. No other user was having this problem
 so I
 thought this was probably a coincidence since that user had tornadoes in
 his
 area and some damage to his home.  So I had him revert to standard
 TELNET.
 1 hour later he timed out with a S522 (TSO time-out value reached).  I'm
 still convinced it's a network issue, but I don't have a leg to stand
 on.

 Anyone have an idea why a user might get disconnected when using SSL/TLS
 and
 not standard telnet?

 --
 Mark Pace
 Mainline Information Systems

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html



 --
 NOTICE:  This electronic mail message and any attached files are
 confidential.  The information is exclusively for the use of the individual
 or entity intended as the recipient.  If you are not the intended recipient,
 any use, copying, printing, reviewing, retention, disclosure, distribution
 or forwarding of the message or any attached file is not authorized and is
 strictly prohibited.  If you have received this electronic mail message in
 error, please advise the sender by reply electronic mail immediately and
 permanently delete the original transmission, any attachments and any copies
 of this message from your computer system. Thank you.


 ==

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




 --
 Mark Pace
 Mainline Information Systems




-- 
Mark Pace
Mainline Information Systems

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: SSL Timeout

2008-06-11 Thread Mansell, George R.
Obey.
My settings:

TelnetParms   
  Port 23 
  CodePage ISO8859-1 IBM-1047 
  PrtInactive 0   
INACTIVE 2400 
TIMEMARK  900 
SCANINTERVAL  900 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Mark Pace
Sent: Wednesday, June 11, 2008 2:22 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: SSL Timeout

Well that didn't work.  And I had the firewall guy check his settings.
He
specifically raised the time-out value on that port to 1 hour. No
difference, 10 mins, connection dies - S622.

I wonder if the TIMEMARK and the other setting can be changed via OBEY
or if
I need to restart the TN3270 server.

On Mon, Jun 9, 2008 at 5:12 PM, Mark Pace [EMAIL PROTECTED] wrote:

 When I saw the defaults in the manual I thought so also.  I've raised
the
 time-out values to the default and I'm waiting on the person with the
issue
 to report back to me.


 On Mon, Jun 9, 2008 at 4:52 PM, Mansell, George R.
[EMAIL PROTECTED]
 wrote:

 Our firewall inactive timeout is 1 hour. When it happened it was
nasty;
 Tcpip  Vtam resources were not recovered. We have Tcpip inactive set
to
 timeout just before the firewall does. Your 10 minutes sounds awfully
 short.

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Mark Pace
 Sent: Monday, June 09, 2008 7:52 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: SSL Timeout

 Is there a parameter somewhere that will time-out an SSL connected
 TN3270
 session?  I've just converted our users from standard TN3270 sessions
to
 SSL/TLS TN3270 sessions.  All users are using PCOMM.
 After converting, one user has called me and says that he gets
 disconnected
 from the system after about 10 mins with a S622 (terminal error).
Our
 TSO
 timeout in JWT is set to 1 hour. No other user was having this
problem
 so I
 thought this was probably a coincidence since that user had tornadoes
in
 his
 area and some damage to his home.  So I had him revert to standard
 TELNET.
 1 hour later he timed out with a S522 (TSO time-out value reached).
I'm
 still convinced it's a network issue, but I don't have a leg to stand
 on.

 Anyone have an idea why a user might get disconnected when using
SSL/TLS
 and
 not standard telnet?

 --
 Mark Pace
 Mainline Information Systems


--
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN
INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html





--
 NOTICE:  This electronic mail message and any attached files are
 confidential.  The information is exclusively for the use of the
individual
 or entity intended as the recipient.  If you are not the intended
recipient,
 any use, copying, printing, reviewing, retention, disclosure,
distribution
 or forwarding of the message or any attached file is not authorized
and is
 strictly prohibited.  If you have received this electronic mail
message in
 error, please advise the sender by reply electronic mail immediately
and
 permanently delete the original transmission, any attachments and any
copies
 of this message from your computer system. Thank you.




==


--
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN
INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




 --
 Mark Pace
 Mainline Information Systems




-- 
Mark Pace
Mainline Information Systems

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



SMP/E: Using BUILDMCS to copy a product

2008-06-11 Thread Chase, John
Hi, All,

We noticed that the XML Toolkit was not included in our z/OS 1.9
ServerPac, though we had to install it on 1.7 in order to install CICS
TS 3.2 last summer.  I ran a BUILDMCS job against the 1.7 target zone
from the 1.9 LPAR, with SMPPUNCH allocated to SYSOUT just to see what
it generates.  It looks really clean, and the report shows the target
and dlib zones are perfectly synchronized for the relevant FMIDs;
i.e., nothing is APPLY-ed that is not also ACCEPTed.

What should I expect if I RECEIVE, APPLY and ACCEPT the BUILDMCS output
on 1.9?  Will SMP/E attempt to do a full install of the product?  Or
just do the CSI stuff?

TIA,

-jc-


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread J R
 I don't 
 remember for sure, but it was probably possible for a caller to have a read 
 command executed with a storage address that would cause data being read to 
 overlay 
 storage that was outside his region, partition, or whatever the big chunk of 
 storage was called. So you could clobber the operating system as well as 
 other users' central storage with read commands. 
 
I don't think so.  I remember writing code for OS/360 that, during 
early testing, incorrectly calculated a buffer size requirement.  
Sure enough, when a subsequent READ CCW tried to read into 
beyond the end of the GETMAINed area, a S0C4 was the result 
because the following storage was in Key0.  
(This may have been either MFT or MVT -- can't remember.  I 
seem to remember that MVT was more robust in terms of storage 
keys for OS related control blocks, etc.)  
 
 
 
 Date: Wed, 11 Jun 2008 11:51:26 -0400
 From: [EMAIL PROTECTED]
 Subject: Re: EXCP access methos
 To: IBM-MAIN@BAMA.UA.EDU
 
 
 
 In a message dated 6/11/2008 8:25:57 A.M. Central Daylight Time, 
 [EMAIL PROTECTED] writes:
 It's my understanding that for many decades EXCP has not executed
 channel programs in place and as provided by the caller.
 
 Back in the days before paging systems, back when there was no virtual or 
 real storage, back when storage was just called storage, EXCP would execute 
 the channel program in place and as provided by the caller, but with extra 
 CCWs 
 in front of the caller's first CCW. These extra CCWs were added to insure 
 data set integrity; i.e., the caller's channel program cannot go to any track 
 that is not in the list of allocated extents created by OPEN. I don't 
 remember for sure, but it was probably possible for a caller to have a read 
 command executed with a storage address that would cause data being read to 
 overlay 
 storage that was outside his region, partition, or whatever the big chunk of 
 storage was called. So you could clobber the operating system as well as 
 other users' central storage with read commands. The various DASD access 
 methods on these systems (OS/360, DOS/360, TOS/360, and BPS/360) were QSAM, 
 BSAM, 
 BPAM, BDAM, ISAM, and QISAM. They all used EXCP internally to do I/O 
 requests, except for possibly ISAM which sometimes had a naked SIO 
 instruction (or 
 so I was told). I don't know very much about the other access methods for 
 devices other than DASD and tape (e.g., TCAM, QTAM, and BTAM), but I would 
 guess 
 that they all also used EXCP internally.
 
 With the advent of virtual and real storage, IBM chose to require that the 
 data addresses inside CCWs be interpreted by the I/O hardware as real 
 addresses. Thus a scheme was needed to convert from virtual addresses to real 
 addresses in order to make the transition to the new systems transparent to 
 customers. The MVS architects decided to create a new I/O concept called IOS 
 Driver which is a new layer of software that performs I/O requests without 
 having 
 to use EXCP. They also invented a new access method called STARTIO which 
 replaced EXCP as the lowest possible level access method. The ancient DASD 
 access methods, QSAM etc., still use EXCP, but EXCP was redesigned to 
 interface between the callers of EXCP (ancient access methods), which present 
 EXCP 
 with channel programs containing virtual addresses, and the new lower level 
 and 
 thus intermediate, internal access method called STARTIO, which assumes 
 that the channel program is in non-pageable storage, with real addresses of 
 data, and which was built by a trusted software component. Many new functions 
 in MVS were designed to use STARTIO directly themselves, such as the paging 
 supervisor, while some new MVS components were designed to use EXCP, probably 
 in order to get the new code written most quickly. JES2, e.g., originally 
 used EXCP (I haven't dealt with JES2 internals now for 20+ years, so it may 
 be 
 different now), probably because JES2 was developed from HASP, which used 
 EXCP, and that code was already well debugged, so why rewrite it?
 
 Rather,
 they are moved to protected storage so the user can not modify
 them on the fly
 
 Yes, unless you have EXCP appendages, but these must be loaded from an 
 authorized library, so the customer can control their use.
 
 they are prefixed to prevent seeks to prohibited
 tracks; virtual addresses are translated to real; etc. I'd
 further expect changes to CCW architecture to accommodate XA and
 later 64-bit addressing and new I/O architecture.
 
 Correct on all counts.
 
 So the checks
 to prevent it may be a matter of IBM's resource allotment: rather
 than continually update EXCP code to all new hardware features,
 it's easier simply to prohibit use of EXCP for such purposes.
 
 I concur. Also IBM would like to encourage users to migrate all 
 applications to the latest and greatest software and hardware solutions; 
 namely, VSAM, 
 DFSMS, ESS controllers, etc., so typically IBM adds support to 

Re: SMP/E: Using BUILDMCS to copy a product

2008-06-11 Thread e'Silva, Joaquim J
John,

SMP/E will do a full install of the product, at the level the XML
toolkit was when the BuildMCS was run on your target zone.  


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Chase, John
Sent: Wednesday, June 11, 2008 10:55 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: SMP/E: Using BUILDMCS to copy a product

Hi, All,

We noticed that the XML Toolkit was not included in our z/OS 1.9
ServerPac, though we had to install it on 1.7 in order to install CICS
TS 3.2 last summer.  I ran a BUILDMCS job against the 1.7 target zone
from the 1.9 LPAR, with SMPPUNCH allocated to SYSOUT just to see what
it generates.  It looks really clean, and the report shows the target
and dlib zones are perfectly synchronized for the relevant FMIDs;
i.e., nothing is APPLY-ed that is not also ACCEPTed.

What should I expect if I RECEIVE, APPLY and ACCEPT the BUILDMCS output
on 1.9?  Will SMP/E attempt to do a full install of the product?  Or
just do the CSI stuff?

TIA,

-jc-


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

_

Standard Bank email Disclaimer and confidentiality note

This e-mail, its attachments and any rights attaching hereto are, unless the 
content clearly indicates otherwise, the property of 
Standard Bank Group Limited and its subsidiaries. It is confidential, private 
and intended for only the addressee. 

Should you not be the addressee and receive this e-mail by mistake, kindly 
notify the sender, and delete this e-mail immediately.
Do not disclose or use it in any way. Views and opinions expressed in this 
e-mail are those of the sender unless clearly stated as 
those of Standard Bank Group. 

Standard Bank Group accepts no liability for any loss or damages howsoever 
incurred, or suffered, resulting, or arising, 
from the use of this email or its attachments. 

Standard Bank Group does not warrant the integrity of this e-mail nor that it 
is free of errors, viruses, interception or interference. 

Licensed divisions of the Standard Bank Group are authorised financial services 
providers in terms of the Financial Advisory and 
Intermediary Services Act, No 37 of 2002 (FAIS).

For information about the Standard Bank Group visit our website 
http://www.standardbank.com


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Gerhard Postpischil

(IBM Mainframe Discussion List) wrote:
Back in the days before paging systems, back when there was no virtual or  
real storage, back when storage was just called storage, EXCP would execute


You had storage?  All of our programmers had core, and 
persisted in that usage even into the late seventies.


remember for sure, but it was probably possible for a caller to have a read  
command executed with a storage address that would cause data being read to  overlay 
storage that was outside his region, partition, or whatever the big  chunk of 


Potential storage overlays were controlled by protect keys, 
providing the hardware supported them and the operating system 
set them correctly. In PCP all of storage was fair game, in MFT 
and MVT it was harder (there were a couple of loopholes in SVC 
parameter validity checking that IBM fixed eventually). I do 
remember clobbering storage in MVT reading a 2314 sized track 
buffer from a 3330, and lucking out with an add-on memory whose 
protection capability had not been configured correctly.


Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: 3270 Software for Mac

2008-06-11 Thread Gerhard Postpischil

Mansell, George R. wrote:

For Gerhard Postpischil
Any problems with Bluezone graphics?
Build v4.1C2 Build 838  


I've only tested single and triple plane graphics, and explicit 
partitions, and that for debugging, not for production use. The 
main problem I found is that the configuration process uses the 
initial buffer size as the maximum, so you can't switch to a 
larger partition size later on. So for funny sizes you must 
define the largest one ever used for start-up.


Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Anne Lynn Wheeler
The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.


[EMAIL PROTECTED] (, IBM Mainframe Discussion List) writes:
 In VM, CCWs are not interpreted as far as I know, but rather the channel  
 program is scanned before being executed in order to determine how to let it 
 run  
 safely on its own.  The only way I can think of to execute a channel  program 
 interpretively is to do a separate I/O request for each CCW in the  channel 
 program (of course, with the necessary CCWs in front of it for it to  work 
 correctly).  Then if a CCW reads data, the data would be read  somewhere that 
 VM 
 could trust, and then move that data into the caller's  buffer.  This is 
 similar to how interpretive machine instruction is  handled.  But the 
 overhead in 
 interpreting channel programs would be  prohibitive, I believe, so they are 
 not 
 really interpreted.  They are first  made safe with the proper CCWs in front 
 of those supplied by the problem-state  caller and then allowed to run on 
 their 
 own.

CCWTRANS was the CP67 routine that created a shadow copy of virtual
machine channel program.

channels run with real data transfer addresses. virtual machine (and
VS system application EXCP ) channel programs have virtual address.

CCWTRANS scanned the virtual machine channel program ... creating a
shadow copy of the virtual machine channel program ... fetching/fixing
the related virtual addresses ... and replacing the virtual addresses
with real addresses.

The original translation of os/360 to virtual storage operation included
crafting a copy of (cp67's) CCWTRANS into the side of VS2 ... to perform
the equivalent function of EXCP channel programs (whether application or
access methods). VS2 (SVS  then MVS) has had the same problem with
access methods (and other applications) creating channel programs with
virtual addresses ... and then issuing EXCP. At that point, EXCP
processing has the same problem as virtual machine emulation ...
translating channel programs built with virtual addresses into shadow
copy that has real addresses. 

EXCPVR was introduced to indicate that a channel program with real
addresses was being used (rather than traditional EXCP channel program).
A discussion of EXCPVR:
http://publib.boulder.ibm.com/infocenter/zos/v1r9/topic/com.ibm.zos.r9.idas300/efcprs.htm#efcprs

disk seek channel commands ... for virtual machine non-full-pack
minidisks would have also result in a shadow made of the seek argument
... adjusting it as appropriate (i.e. a minidisk could be for 30 cyls
starting at real cylinder 100 ... the shadow would have cylinder numbers
adjusted by 100 ... unless it attempted to access more than 30 cyls
... which would result in shadow being adjusted to an invalid cylinder
number).

OS360 used 3 channel command prefix ... SEEK, followed by set file
mask command and then TIC (transferred) to the channel program
referenced by EXCP (didn't need to scan/translate the passed channel
program ... just position the arm and then prevent the passed channel
program from moving the arm again.

There was a version of CP67 that was converted to run on 370s (CP67-I
system) ... which was used extensively inside IBM pending availability
of VM370 product. In the morph of CP67 to VM370 product, the CCWTRANS
channel program translation routine became DMKCCW.

past posts mentioning VS2 effort started out by crafting cp67 CCWTRANS
to get channel program translation for EXCP:
http://www.garlic.com/~lynn/2000.html#68 Mainframe operating systems
http://www.garlic.com/~lynn/2000c.html#34 What level of computer is needed for 
a computer to Love?
http://www.garlic.com/~lynn/2001i.html#37 IBM OS Timeline?
http://www.garlic.com/~lynn/2001i.html#38 IBM OS Timeline?
http://www.garlic.com/~lynn/2001l.html#36 History
http://www.garlic.com/~lynn/2002c.html#39 VAX, M68K complex instructions (was 
Re: Did Intel Bite Off More Than It Can Chew?)
http://www.garlic.com/~lynn/2002j.html#70 hone acronym (cross post)
http://www.garlic.com/~lynn/2002l.html#65 The problem with installable 
operating systems
http://www.garlic.com/~lynn/2002l.html#67 The problem with installable 
operating systems
http://www.garlic.com/~lynn/2002n.html#62 PLX
http://www.garlic.com/~lynn/2003b.html#0 Disk drives as commodities. Was Re: 
Yamhill
http://www.garlic.com/~lynn/2003g.html#13 Page Table - per OS/Process
http://www.garlic.com/~lynn/2003k.html#27 Microkernels are not all or 
nothing. Re: Multics Concepts For
http://www.garlic.com/~lynn/2004.html#18 virtual-machine theory
http://www.garlic.com/~lynn/2004c.html#59 real multi-tasking, multi-programming
http://www.garlic.com/~lynn/2004g.html#50 Chained I/O's
http://www.garlic.com/~lynn/2004n.html#26 PCIe as a chip-to-chip interconnect
http://www.garlic.com/~lynn/2004n.html#54 CKD Disks?
http://www.garlic.com/~lynn/2004o.html#57 Integer types for 128-bit addressing
http://www.garlic.com/~lynn/2005b.html#49 The 

oedit/obrowse invalid directory: Errno=81x

2008-06-11 Thread Smith, Sean M
I sent this to the IBM-UNIX listserv as well but thought us regular
users might have some insights.

-

I am hoping someone one this list has seen this problem and has a
solution.

When I use oedit or obrowse in OMVS I get an error back stating:

Errno=81x No such file or directory exists; Reason=0594003Dx A directory
in the pathname was not found.  Press Enter to continue.

The Directory field has been substituted with:

Directory  === -u10560572 pathname

When I am superuser, then it puts in -u0 before the pathname.

I had the security folks check my OMVS segment and I even tried deleting
my ISPF profile and creating a new one.  Nothing seems to be helping.

Anyone have any ideas?

Sean Smith
Bank of America

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Anne Lynn Wheeler
The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.


Anne  Lynn Wheeler [EMAIL PROTECTED] writes:
 There was a version of CP67 that was converted to run on 370s (CP67-I
 system) ... which was used extensively inside IBM pending availability
 of VM370 product. In the morph of CP67 to VM370 product, the CCWTRANS
 channel program translation routine became DMKCCW.

re:
http://www.garlic.com/~lynn/2008i.html#68 EXCP access methos

an early use of the internal network was distributed development
project between the science center and endicott.

the internal network technology was created at the science center
(as well as cp67, gml, lots of other stuff)
http://www.garlic.com/~lynn/subtopic.html#545tech

the internal network was larger than the arpanet/internet from just
about the beinning to possibly mid-85
http://www.garlic.com/~lynn/subtopic.html#internalnet

the 370 virtual memory hardware architecture was well specified ...  and
endicott approached the science center about providing 370 virtual
machine support for early software testing ... i.e. in addition to
providing 360 and 360/67 virtual memory emulation ... cp67 would be
modified to also provide option for 370 and 370 virtual memory
emulation.

the original cms multi-level source maintenance system was developed as
part of this effort (cms  cp67 had source maintenance but was single
level update).

part of the issue was that this would run on the science center cp67
time-sharing system which including access by numerous non-employees
(many from various educational institutions in the cambridge/boston
area). 370 virtual memory was a closely held corporate secret and so
there had to be a lot of (security) measures to prevent it being
divulged.

the basic cambridge cp67 time-sharing system ran CP67-L.

eventually, in a 360/67 virtual machine, a CP67-H kernel ran which had
the modifications to provide 370 virtual machines as an option. This
provided isolation, preventing the general time-sharing users from being
exposed to any of the 370 features.

then a set of updates were created that modified the CP67 kernel to run
on 370 hardware  a CP67-I kernel would then run in a 370 virtual
machine provided by a CP67-H kernel running in a 360/67 virtual
machine.

CP67-I was in regular operation a year before the first engineeing 370
machine with virtual memory hardware was working. In fact, CP67-I was
used as a test case when that first engineering machine became
operational.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Andy Wood
On Wed, 11 Jun 2008 10:41:11 -0500, Rick Fochtman [EMAIL PROTECTED] 
wrote:

. . .
IIRC, VSAM and the VSAM-like access methods use STARTIO directly.


Directly? I thought that the move had been to use the Media Manager.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: IPL Text

2008-06-11 Thread Yukus, Mary J CIV USMEPCOM
One more question on this subject, once this job executes, is there a data
set that gets updated that I can verify it worked?  Will it always reside on
the RES volume? (somewhere in the back of my memory I seem to remember my old
boss mentioning that we put it on a different volume, not the RES)  I may be
thinking of something else, but would like to feel a little more confident.
How do I know it was successful?  I know (think) that SYS1.NUCLEUS fits in
here somewhere.



-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Jim Mulder
Sent: Tuesday, June 10, 2008 5:03 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: IPL Text

IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 06/10/2008 
05:34:36 PM:

 - Original Message - 
 From: Ken Porowski [EMAIL PROTECTED]
 Newsgroups: bit.listserv.ibm-main
 Sent: Tuesday, June 10, 2008 4:37 PM
 Subject: Re: IPL Text
 
 
  Here is what I have for z/OS 1.8, I doubt the level of ICKDSF matters,
  just use the correct SAMPLIB.
 
  This does look a little different from what John McKown sent.  Mine 
came
  from the Serverpac installation, z/OS 1.7 was the same and IIRC so 
were
  earlier versions.
 
  //IPLTXT  EXEC PGM=ICKDSF
  //SYSPRINT DD SYSOUT=*
  //IPLVOL   DD DISP=SHR,
  //VOL=SER=RSAR8A,
  //UNIT=3390
  //IPLTEXT  DD DSN=LS0AR8.SYS1.SAMPLIB(IPLRECS),DISP=SHR
  // DD DSN=LS0AR8.SYS1.SAMPLIB(IEAIPL00),DISP=SHR
  //SYSINDD  *
   REFORMAT DDNAME(IPLVOL) IPLDD(IPLTEXT) NOVERIFY BOOTSTRAP
  /*
 
 
 I'll just chip in that this example is the correct one to use, as you 
must 
 have both IPLRECS and IEAIPL00 in the IPLDD.
 

  If you specify NOBOOTSTRAP, or  avoid specifying BOOTSTRAP so that the 
default of NOBOOTSTRAP is used, then ICKDSF supplies the bootstrap 
records, and 
IPLRECS is not needed. 


Jim Mulder   z/OS System Test   IBM Corp.  Poughkeepsie,  NY

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread (IBM Mainframe Discussion List)
 
 
On Wed, 11 Jun 2008 10:41:11 -0500, Rick Fochtman [EMAIL PROTECTED]  
wrote:_ (mailto:[EMAIL PROTECTED] wrote:) 
IIRC, VSAM and the VSAM-like access methods use STARTIO  directly.
 
In a message dated 6/11/2008 5:36:57 P.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:
Directly? I thought that the move had been to use the Media  Manager.
 
I don't know what VSAM-like access methods are.  For the last 15  years or 
so (or more) IBM has used the Media Manager to do DASD I/O in its new,  
strategic software products (e.g., DB2).  VSAM has been an official access  
method 
since the introduction of paging operating systems in the  mid-1970s.  The 
Media Manager uses STARTIO to do its I/O.
 
Bill  Fairchild
Rocket Software





**Vote for your city's best dining and nightlife. City's Best 
2008.  (http://citysbest.aol.com?ncid=aolacg0005000102)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: SMP/E: Using BUILDMCS to copy a product

2008-06-11 Thread Mark Zelden
And in case it is not obvious, this also means you need to allocate
new / empty target and distribution libraries.   In this case it is 
a z/OS UNIX file system (HFS or zFS) for the target libs.  You also
need to add the DDDEFs with library names / path names.  Check
the program directory from your last install.  You probably also 
need to run one of those MKDIR execs to create all the directories
in your HFS / zFS before the apply.   

Actually... it might be just as easy (especially if you don't have the pgmdir)
to re-download the entire thing from the web and install it.

http://www-03.ibm.com/servers/eserver/zseries/software/xml

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:[EMAIL PROTECTED]
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html



On Wed, 11 Jun 2008 23:25:17 +0200, e'Silva, Joaquim J
[EMAIL PROTECTED] wrote:

John,

SMP/E will do a full install of the product, at the level the XML
toolkit was when the BuildMCS was run on your target zone.


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Chase, John
Sent: Wednesday, June 11, 2008 10:55 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: SMP/E: Using BUILDMCS to copy a product

Hi, All,

We noticed that the XML Toolkit was not included in our z/OS 1.9
ServerPac, though we had to install it on 1.7 in order to install CICS
TS 3.2 last summer.  I ran a BUILDMCS job against the 1.7 target zone
from the 1.9 LPAR, with SMPPUNCH allocated to SYSOUT just to see what
it generates.  It looks really clean, and the report shows the target
and dlib zones are perfectly synchronized for the relevant FMIDs;
i.e., nothing is APPLY-ed that is not also ACCEPTed.

What should I expect if I RECEIVE, APPLY and ACCEPT the BUILDMCS output
on 1.9?  Will SMP/E attempt to do a full install of the product?  Or
just do the CSI stuff?

TIA,

-jc-


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

_

Standard Bank email Disclaimer and confidentiality note

This e-mail, its attachments and any rights attaching hereto are, unless
the content clearly indicates otherwise, the property of
Standard Bank Group Limited and its subsidiaries. It is confidential,
private and intended for only the addressee.

Should you not be the addressee and receive this e-mail by mistake, kindly
notify the sender, and delete this e-mail immediately.
Do not disclose or use it in any way. Views and opinions expressed in this
e-mail are those of the sender unless clearly stated as
those of Standard Bank Group.

Standard Bank Group accepts no liability for any loss or damages howsoever
incurred, or suffered, resulting, or arising,
from the use of this email or its attachments.

Standard Bank Group does not warrant the integrity of this e-mail nor that
it is free of errors, viruses, interception or interference.

Licensed divisions of the Standard Bank Group are authorised financial
services providers in terms of the Financial Advisory and
Intermediary Services Act, No 37 of 2002 (FAIS).

For information about the Standard Bank Group visit our website
http://www.standardbank.com


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Can DB/2 use standard KSDS VSAM datasets?

2008-06-11 Thread David Logan
We have a dataset that has a single (integer) key followed by a big block of
binary data. We want access to this data via a DB/2 enabled program, using a
SELECT statement.

 

My question is this: Do we need to actually CREATE TABLE and load our data
into the DB/2 internal formats, or can we just ask DB/2 to read the KSDS
directly as a two-field table? (IMS allows this, for example.)

 

Thanks!

 

 

David Logan

Manager of Product Development, Pitney Bowes Business Insight

http://centrus.com http://centrus.com/ 

 

4750 Walnut St, Suite 200

Boulder, CO  80301

 

W: (720) 564-3056

C: (303) 818-8222

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: IPL Text

2008-06-11 Thread Richard Peurifoy

Yukus, Mary J CIV USMEPCOM wrote:

One more question on this subject, once this job executes, is there a data
set that gets updated that I can verify it worked?  Will it always reside on
the RES volume? (somewhere in the back of my memory I seem to remember my old
boss mentioning that we put it on a different volume, not the RES)  I may be
thinking of something else, but would like to feel a little more confident.
How do I know it was successful?  I know (think) that SYS1.NUCLEUS fits in
here somewhere.


The IPL text is written onto track 0 of the RES volume. SYS1.NUCLEUS
must also be on this volume. When you IPL the machine will start
an I/O operation to read the bootstrap from track 0. This bootstrap
consists of  a PSW and CCW's to read the IPL text (including more
CCW's), and then commnand chain to the newly read CCW's. After the
CCW chain is complete, the PSW will be loaded and start executing the
loaded program. This in turn will search for SYS1.NUCLEUS and start
loading the system. Gets much more complicated, but this is a basic
overview.

If the ICKDSF completed normally, it should have written the IPL text.

You should be doing this on a clone of your system so that if there is
a problem you still have a RES volume you can IPL.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: IPL Text

2008-06-11 Thread Yukus, Mary J CIV USMEPCOM
Okay, thanks!  (I appreciate your overview it is very helpful - I hate flying
blind. :-) )  It will be on a cloned RES maintenance pack which will be
swapped when we try to implement all the maintenance we just put on.

Thanks again! 
Mary
 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Richard Peurifoy
Sent: Wednesday, June 11, 2008 6:00 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: IPL Text

Yukus, Mary J CIV USMEPCOM wrote:
 One more question on this subject, once this job executes, is there a data
 set that gets updated that I can verify it worked?  Will it always reside
on
 the RES volume? (somewhere in the back of my memory I seem to remember my
old
 boss mentioning that we put it on a different volume, not the RES)  I may
be
 thinking of something else, but would like to feel a little more confident.
 How do I know it was successful?  I know (think) that SYS1.NUCLEUS fits in
 here somewhere.

The IPL text is written onto track 0 of the RES volume. SYS1.NUCLEUS
must also be on this volume. When you IPL the machine will start
an I/O operation to read the bootstrap from track 0. This bootstrap
consists of  a PSW and CCW's to read the IPL text (including more
CCW's), and then commnand chain to the newly read CCW's. After the
CCW chain is complete, the PSW will be loaded and start executing the
loaded program. This in turn will search for SYS1.NUCLEUS and start
loading the system. Gets much more complicated, but this is a basic
overview.

If the ICKDSF completed normally, it should have written the IPL text.

You should be doing this on a clone of your system so that if there is
a problem you still have a RES volume you can IPL.

-- 
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Controlling the execution sequence of dependant jobs in JES2 (the details)

2008-06-11 Thread Jeno Vago

David Cole wrote:
Ok, just FYI, here's my specific situation. My need is for controlling 
the updates, assemblies and linkedits that I need to run when 
regenerating z/XDC. (It has nothing to do with the installation process 
at customer sites.)


My typical gen jobstream is:
   * One update job.
   * Followed by from 1 to 175 assemblies.
   * Followed by one multi-step linkedit job.
The assemblies may run in any order, but none may run prior to the 
update job, and they all must run one at a time, and all must run before 
the linkedit job.


Hi Dave,

a very simple solution that GUTS have used to compile several hundred 
csects in the old MVT and OS/VS1 times was about this. The whole product 
was compiled and linked in a single job, containing only a few steps.


step1: build a huge temp seq dataset from the source PDS containing all 
csects, embedded with pseudo-csects to punch lked control cards using a 
single '  punch name xxx(r)' statement (and asm END stmt)


step2: a single-step assembler with option 'batch' producing a single 
syspunch containing all the csects and a trailing ' name xxx(r)' for 
each csect.


step3: linkedit each single csect into a separate member using option 
NCAL into an intermediate load library


step4: final linkedit only the composite modules into the final loadlib, 
using the final lked control statements, using option CALL to let 
autocall do the job.


---

Notes: I have adopted a similar method for other smaller projects. 
Depending on the number of csects, either generating the sequential data 
automatically, or, for smaller projects, preparing the big assembler 
manually without such utilities and rather concatenate the source members.

Here are some detais as far as memory serves:

Step1 used a small utility, generating each member of the source pds to 
the same single temporary seq dataset, and added the lked control 
statements after each csect, as follows:


source member A  (including the ASM END stmt)
  PUNCH '  NAME A(R)'
  END
member B
  PUNCH '  NAME B(R)'
  END
...

Step2: ASM-G was quick enough for several hundred CSECTS although using 
plenty of AMODGEN macros. This is since using the BATCH option, macros 
actually referenced were kept by the compiler pre-processed. Thus, the 
complete assembly time was only a fraction of assembling each csect in a 
separate step. This was acceptable on 370 machines, so must not be 
problem for you today, even re-running the whole big assembly just for 
an error in a single csect. Such errors were rare anyway, since this big 
compile was only to prepare a consistent distribution version.
For development changes, only the changed single csect was compiled and 
link-edited into the intermediate loadlib, and the final loadmod 
reconstructed.


Note that there was also a small utility that split the biq sequential 
sysprint into separate members, one for each csect into a SYSPRINT PDS.


Step3: was to split the single sequential SYSPUNCH into separate members 
again.


Step4: For each final composite loadmod, there was a separate LKDEIN 
member manually prepared. Again, the LKED syslin was generated with 
putting each member of this LKEDIN PDS into a temp seq lkedin syslin, like

   INCLUDE LOADLIB(A)
   INCLUDE LOADLIB(B)
   ORDER A,B
   NAME  MAINPGM(R)


I hope it is clear enough, in spite of being quite late here.
Sorry for the late reply, I can't keep up with the volume on the list.

Best regards, Jenoe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Rick Fochtman

-snip-.


IIRC, VSAM and the VSAM-like access methods use STARTIO directly.

   



Directly? I thought that the move had been to use the Media Manager.
 


unsnip--
You may well be right, today. But Media Manager didn't exist, as such, 
until long after VSAM and VTAM. In all honesty, I'm not real sure what 
the sequence of development was, but I have some OLD VSAM source code 
that uses STARTIO, rather than EXCP, because of the channel programs it 
creates. It also contains PAGEFIX and PAGEFREE code, so I'm assuming 
that it's a step above your basic EXCP code.


Dear God, how I wish there was a documented interface to STARTIO; I'd 
like to play around with Format-1 CCW's. :-)


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Paul Ip
Hi all,

Can anyone give me another hint on this?? I am confused with what makes an 
output of ADRDSSU DUMP can't be Extended Format?  

On Wed, 11 Jun 2008 08:51:26 -0500, Paul Ip [EMAIL PROTECTED] wrote:

Thanks for the reply!

In fact, my target is to overome the 65536 tracks limit on a volume for SMS
Datasets, so there are two approaches for me:
1. Extended Format
2. DSNTYPE=LARGE

At the beginning, I tried to apply Extended Format for all SMS datasets, if the
dataset is an output of COBOL program, assigning Extended Format is ok
(DSORG=PS-E). However, it is failed when I tried to apply the Extended
Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it
said ...a DCB that specified EXCP...

I should rephrase my question as: why the output of ADRDSSU DUMP can't be
assigned with Extented Format? What is actually a DCB that specified EXCP
means from IEC143I 213-B8 (I was wondering if it is talking about the dataset
is under a dataset type of 'EXCP'...)?

...In addition, I don't know there is a dataset type called 'EXCP' until I 
found
the following from DFDSSdss Storage Admin. Guide:
DFSMSdss can copy, dump, and restore data sets of the following types:
DATABASE 2(TM) (DB2?;)
Direct access
EXCP (execute channel program)  Dataset Type = EXCP???
Partitioned, including:
PDS (partitioned data set)
PDSE (partitioned data set extended)
HFS (hierarchical file system) data set
Sequential, including extended-format data sets and Large Format data sets
VSAM data sets that are cataloged in an ICF catalog, including:
ESDS (entry-sequenced data set)
KSDS (key-sequenced data set)
KSDS with key ranges
LDS (linear data set)
RRDS (relative record data set)
VRRDS (variable relative record data set)
Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS,
KSDS, LDS, RRDS, and VRRDS
Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including
striped ESDS, KSDS, LDS, RRDS, and VRRDS
zFS (zSeries? file system) data set
Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with
OPTCD=A).

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Can DB/2 use standard KSDS VSAM datasets?

2008-06-11 Thread Blaicher, Chris
The short answer is NO.  DB/2 only understands VSAM linear data sets
formatted as DB/2 objects, data or index.

I do not believe that their LOAD utility understands KSDS input, but I
could be very wrong on that point.

Chris Blaicher

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of David Logan
Sent: Wednesday, June 11, 2008 5:58 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Can DB/2 use standard KSDS VSAM datasets?

We have a dataset that has a single (integer) key followed by a big
block of
binary data. We want access to this data via a DB/2 enabled program,
using a
SELECT statement.

 

My question is this: Do we need to actually CREATE TABLE and load our
data
into the DB/2 internal formats, or can we just ask DB/2 to read the KSDS
directly as a two-field table? (IMS allows this, for example.)

 

Thanks!

 

 

David Logan

Manager of Product Development, Pitney Bowes Business Insight

http://centrus.com http://centrus.com/ 

 

4750 Walnut St, Suite 200

Boulder, CO  80301

 

W: (720) 564-3056

C: (303) 818-8222

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Can DB/2 use standard KSDS VSAM datasets?

2008-06-11 Thread David Logan
That's what I was afraid of. Thanks.

David Logan
Manager of Product Development, Pitney Bowes Business Insight
http://centrus.com
4750 Walnut St, Suite 200
Boulder, CO  80301
W: (720) 564-3056

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Blaicher, Chris
Sent: Wednesday, June 11, 2008 9:28 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Can DB/2 use standard KSDS VSAM datasets?

The short answer is NO.  DB/2 only understands VSAM linear data sets
formatted as DB/2 objects, data or index.

I do not believe that their LOAD utility understands KSDS input, but I
could be very wrong on that point.

Chris Blaicher

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of David Logan
Sent: Wednesday, June 11, 2008 5:58 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Can DB/2 use standard KSDS VSAM datasets?

We have a dataset that has a single (integer) key followed by a big
block of
binary data. We want access to this data via a DB/2 enabled program,
using a
SELECT statement.

 

My question is this: Do we need to actually CREATE TABLE and load our
data
into the DB/2 internal formats, or can we just ask DB/2 to read the KSDS
directly as a two-field table? (IMS allows this, for example.)

 

Thanks!

 

 

David Logan

Manager of Product Development, Pitney Bowes Business Insight

http://centrus.com http://centrus.com/ 

 

4750 Walnut St, Suite 200

Boulder, CO  80301

 

W: (720) 564-3056

C: (303) 818-8222

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html